search menu icon-carat-right cmu-wordmark

Plan, Do, Check, Act

July 2013 White Paper
Julia H. Allen

In this paper, Ken van Wyk provides a primer on the most commonly used tools for traditional penetration testing.


This article describes a tried and true approach to security improvement that can be effectively used during deployment and operations. It identifies prerequisites that must be in place to sustain a desired state of security. It provides a set of minimum requirements for security hygiene and several security implementation frameworks that can be used in concert with the other articles in this content area.