Tech Due Diligence SEC-3: Vulnerability Management and Penetration Testing
What This Control Requires
The assessor evaluates the vulnerability management programme, including automated scanning practices, penetration testing frequency and scope, vulnerability remediation SLAs, and the overall maturity of the security testing programme.
In Plain Language
Every system has vulnerabilities. What separates mature organisations from the rest is whether they find those vulnerabilities proactively and fix them before someone else exploits them.
In a tech DD review, we evaluate how thoroughly and how often you scan for security weaknesses, what your most recent penetration test uncovered, how quickly you remediate findings, and whether there is a genuine system behind the effort rather than ad-hoc fixes. We look for automated scanning integrated into CI/CD, regular external penetration testing (annually at minimum, ideally semi-annually), clearly defined remediation SLAs tied to severity, a vulnerability tracking system that gives real visibility into the security backlog, and evidence that findings actually get fixed rather than just acknowledged.
The penetration test report is one of the most closely examined documents in any DD review. We evaluate not just the findings themselves but the scope of the test (was it comprehensive or cherry-picked?), the methodology used, and how the organisation responded. A clean report is good. A report with critical findings that were promptly remediated is also good. A report with old, unresolved critical findings is a serious red flag.
How to Implement
Build automated security scanning into multiple stages of your development and deployment pipeline. Run SAST (Static Application Security Testing) in CI to catch code-level issues, DAST (Dynamic Application Security Testing) against staging environments, SCA (Software Composition Analysis) for dependency vulnerabilities, and infrastructure scanning for servers and cloud configurations.
Commission external penetration testing at least once a year from a reputable firm with experience in your technology stack and industry. Make the scope comprehensive: web application testing (OWASP Top 10), API testing, authentication and authorisation testing, infrastructure and network testing, and social engineering where relevant.
Define remediation SLAs based on severity and hold the team to them. Critical vulnerabilities (CVSS 9.0+) should be remediated or mitigated within 48 hours. High (CVSS 7.0-8.9) within one week. Medium (CVSS 4.0-6.9) within 30 days. Low (CVSS 0.1-3.9) within 90 days.
Track every vulnerability in a centralised system with clear ownership, due dates, and status updates. Produce regular reports showing total open vulnerabilities by severity, SLA compliance rates, new versus remediated trends (burn-down chart), and age analysis of open items.
Once your product and processes are mature enough, consider a bug bounty programme through HackerOne or Bugcrowd. Start with a private programme and widen it as your response processes prove reliable.
Make security testing part of the development culture, not just a compliance exercise. Invest in developer security training, include security in code review checklists, and treat security improvements as genuine wins rather than overhead.
Evidence Your Auditor Will Request
- Automated security scanning configuration and recent reports (SAST, DAST, SCA)
- Most recent external penetration test report
- Vulnerability remediation SLAs and compliance metrics
- Vulnerability tracking system with current open findings
- Bug bounty programme details (if applicable)
Common Mistakes
- No penetration testing ever conducted or last test was over 2 years ago
- Penetration test findings remain unresolved months after the engagement
- Automated scanning produces findings but no one reviews or acts on them
- Vulnerability scanning only covers external-facing systems; internal systems unassessed
- No defined SLAs for vulnerability remediation; fixes happen when convenient
Related Controls Across Frameworks
Frequently Asked Questions
Will a penetration test with findings be a problem for due diligence?
Is automated scanning sufficient or do we need manual penetration testing?
Track Tech Due Diligence compliance in one place
AuditFront helps you manage every Tech Due Diligence control, collect evidence, and stay audit-ready.
Start Free Assessment