ISO 27001 does not explicitly require a penetration test – but every experienced auditor will expect one as evidence for several Annex A controls. Going into an audit without a current pentest report is a problem.
Annex A of ISO 27001 contains 93 controls. Several of them are difficult to evidence without a penetration test – particularly around vulnerability management, access controls, and network security. A missing or outdated pentest report is one of the most common reasons for findings and non-conformities in the audit.
Unlike NIS2 or KRITIS, ISO 27001 applies across all industries. Certification is pursued by those who choose it – or those who must, because customers or clients require it.
Most common trigger: a major client sets ISO 27001 certification as a supplier requirement. After that, the clock is ticking.
Annex A of ISO 27001:2022 contains 93 controls across four categories. A penetration test is the most direct evidence instrument for these six:
Aligned with your certification status, your audit date, and the relevant Annex A controls.
We analyse your ISMS scope and clarify which systems, processes, and locations fall within the certification boundary – so the pentest covers exactly what your auditor examines.
Based on your ISMS, we define the pentest scope and map it to the relevant Annex A controls. No extra work for you at the audit.
Manual penetration tests on agreed systems and areas. We document every step completely – auditors value traceability.
Every finding is assessed by severity and ISMS relevance. Critical findings are communicated immediately – so you can act before the audit.
Complete report with Annex A mapping, management summary, and technical appendix. Structured so your auditor finds all answers – without follow-up questions.
The right scope depends on your ISMS. These three modules cover the most common Annex A requirements.
The core module for ISO 27001: vulnerability scans, network segmentation, exposed services, firewall rules. Directly relevant for A.8.8, A.8.20, and A.8.11.
Learn moreFor organisations with physical ISMS assets: we test whether access controls for server rooms, data centres, and sensitive areas actually work (A.7.2).
Learn moreAccess control is one of the most common audit topics. We test whether permissions, role concepts, and privileged accounts meet the ISO 27001 requirement A.5.15.
Learn more