SECURITY DOCUMENTS
Penetration Testing Protocol
Last updated: 01 December 2022
Ref: 81f8a208-49d0-4496-92a9-5fab874297ae
Introduction:
1. Penetration testing is a critical process that helps identify potential vulnerabilities in the network, operating systems, applications, hardware, and other components of an organization's information system. At Liqvid PTE. LTD, we take this process seriously and have implemented the following policy and procedures to ensure that we are conducting effective and efficient penetration testing in accordance with the ISO 27001 standard:
2. Policy:
Liqvid PTE. LTD will conduct regular penetration testing to identify potential vulnerabilities in our information system.
Penetration testing will be conducted in accordance with ISO 27001 standards and best practices.
The penetration testing team will follow a defined and documented process for conducting penetration testing. 
Results from penetration testing will be used to improve our information security posture.
3. Procedure: 
3.1. Planning and Preparation:
- The IT Security team will identify the scope of the penetration testing and identify the resources required for the testing.
- The IT Security team will develop a testing plan that outlines the objectives, approach, and methods for the testing.
- The IT Security team will notify relevant stakeholders of the testing plan, including the date and time of the testing.
3.2. Conducting Penetration Testing: 
- The IT Security team will conduct the penetration testing using appropriate tools and techniques. 
- The team will document all findings, including any vulnerabilities that are identified.
- The team will document all findings, including any vulnerabilities that are identified.
3.3. Reporting and Remediation: 
- The IT Security team will provide a detailed report of the penetration testing results to the management team.
- The report will include a summary of the findings, risk ratings, and recommendations for remediation.
- The management team will review the report and prioritize remediation efforts based on the risk ratings. 
- The IT Security team will work with relevant stakeholders to remediate identified vulnerabilities. 
3.4. Follow-up Testing:
- The IT Security team will conduct follow-up testing to confirm that identified vulnerabilities have been remediated. 
- The team will document the results of follow-up testing and report any outstanding vulnerabilities to the management team.
Liqvid PTE. LTD recognizes the importance of penetration testing in identifying potential vulnerabilities in our information system. By following this policy and procedure, we can ensure that we are maintaining a strong information security posture and protecting our assets against potential threats. 
Download Liqvid Penetration Testing Protocol