Establish and maintain a penetration testing program appropriate to the size, complexity, industry,
and maturity of the enterprise. Penetration testing program characteristics include scope, such as
network, web application, Application Programming Interface (API), hosted services, and physical
premise controls; frequency; limitations, such as acceptable hours, and excluded attack types; point
of contact information; remediation, such as how findings will be routed internally; and retrospective
requirements.
The vulnerability management process is regularly tested at intervals specified by the organization to ensure that it is up-to-date, functional, and effective.