{"id":71946,"date":"2024-06-03T20:59:44","date_gmt":"2024-06-03T20:59:44","guid":{"rendered":"https:\/\/www.azul.com\/?post_type=glossary&#038;p=71946"},"modified":"2025-04-07T13:55:12","modified_gmt":"2025-04-07T13:55:12","slug":"penetration-testing","status":"publish","type":"glossary","link":"https:\/\/www.azul.com\/ja\/glossary\/penetration-testing\/","title":{"rendered":"Penetration Testing"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"what-is\">What is Penetration Testing?<\/h2>\n\n\n\n<p>Penetration Testing is an attack on one&#8217;s own software in a controlled manner to find vulnerabilities that a malicious hacker might exploit. A &#8220;pen test,&#8221; as its often known, is usually conducted by a third party that owns the software to better represent what the attacker knows and doesn&#8217;t know. However, in some high-risk scenarios, an internal group would know more about how to attack the system.<\/p>\n\n\n\n\n\n<section    class=\"c-smart-content c-smart-content--color-dark c-smart-content--mt-default c-smart-content--mb-default c-smart-content--pt-default c-smart-content--pb-default c-smart-content--color-1 o-component o-component--color-dark o-component--mt-default o-component--mb-default o-component--pt-default o-component--pb-default\"\n\n            id=\"block_2521ae43ae22bb53222e4874d00a11d1\"\n    \n    >\n    \n    <div class=\"o-component__wrap\">\n                    <div class=\"o-container\">\n        \n\n    \n    <div class=\"c-smart-content__grid c-smart-content__grid--3-cols\">\n        \n<a    class=\"c-smart-content__grid-item o-card o-card--has-image o-card--text-dark\"\n\n    \n            href=\"https:\/\/www.azul.com\/wp-content\/uploads\/Code-Inventory-FINAL.pdf\"\n        target=\"_blank\"\n    >\n    \n            \n    <span class=\"o-card__image o-picture o-picture--card\">\n\n<picture>\n                        \n            \n            <source\n                media=\"(max-width: 425px)\"\n                srcset=\"https:\/\/azul.imgix.net\/wp-content\/uploads\/Code-Inventory-Accurately-identify-dead-code-for-removal-to-save-time-and-money-min.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=377&#038;s=b6ac2b4511a229c98dde2e32b942b525 1x, https:\/\/azul.imgix.net\/wp-content\/uploads\/Code-Inventory-Accurately-identify-dead-code-for-removal-to-save-time-and-money-min.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=754&#038;s=3ecc6ff80ba4e7e3a6ab3ec83ba2f15c 2x\"\n            >\n                    \n            \n            <source\n                media=\"(max-width: 767px)\"\n                srcset=\"https:\/\/azul.imgix.net\/wp-content\/uploads\/Code-Inventory-Accurately-identify-dead-code-for-removal-to-save-time-and-money-min.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=719&#038;s=f06ad6b9a5fdb37b7d680a303fcb7ce9 1x, https:\/\/azul.imgix.net\/wp-content\/uploads\/Code-Inventory-Accurately-identify-dead-code-for-removal-to-save-time-and-money-min.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=1438&#038;s=e533a1edbe5bc967cafca13c4a4d6fd9 2x\"\n            >\n                    \n            \n            <source\n                media=\"(max-width: 1023px)\"\n                srcset=\"https:\/\/azul.imgix.net\/wp-content\/uploads\/Code-Inventory-Accurately-identify-dead-code-for-removal-to-save-time-and-money-min.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=309&#038;s=a8822c9d496e4b7a695bbc6114d51440 1x, https:\/\/azul.imgix.net\/wp-content\/uploads\/Code-Inventory-Accurately-identify-dead-code-for-removal-to-save-time-and-money-min.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=618&#038;s=8ad97597f08bb35387e9738e4bae5c27 2x\"\n            >\n                    \n            \n            <source\n                media=\"(max-width: 1440px)\"\n                srcset=\"https:\/\/azul.imgix.net\/wp-content\/uploads\/Code-Inventory-Accurately-identify-dead-code-for-removal-to-save-time-and-money-min.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=357&#038;s=59bcde9503f2fb0a8a9ae13a9285f227 1x, https:\/\/azul.imgix.net\/wp-content\/uploads\/Code-Inventory-Accurately-identify-dead-code-for-removal-to-save-time-and-money-min.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=714&#038;s=311fb944901a364159706f804eb6e545 2x\"\n            >\n            \n    <img alt=\"Code Inventory - Accurately identify dead code for removal to save time and money-min\" class=\"o-picture__image\" height=\"275\" loading=\"lazy\" onerror=\"this.onerror=null;this.srcset=&quot;https:\/\/www.azul.com\/wp-content\/uploads\/Code-Inventory-Accurately-identify-dead-code-for-removal-to-save-time-and-money-min.jpg&quot;;while(this.parentNode.getElementsByTagName(&quot;source&quot;).length){this.parentNode.getElementsByTagName(&quot;source&quot;)[0].remove();}\" onload=\"if (this.parentNode.previousElementSibling) this.parentNode.previousElementSibling.remove()\" srcset=\"https:\/\/azul.imgix.net\/wp-content\/uploads\/Code-Inventory-Accurately-identify-dead-code-for-removal-to-save-time-and-money-min.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=357&#038;s=59bcde9503f2fb0a8a9ae13a9285f227 1x, https:\/\/azul.imgix.net\/wp-content\/uploads\/Code-Inventory-Accurately-identify-dead-code-for-removal-to-save-time-and-money-min.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=714&#038;s=311fb944901a364159706f804eb6e545 2x\" width=\"357\">\n<\/picture>\n\n\n    <\/span>\n    \n    <div class=\"o-card__content\">\n                    \n<div  class=\"o-card__text-overline o-overline o-overline--pill\"\n  style=\"--setting--overline-bg-color: #FEEBFD; --setting--overline-text-color: #74299E;\">\n  Data Sheets<\/div>\n        \n                    \n<h3  class=\"o-card__text-headline o-headline o-headline--h5 s-medium\"\n    >\n  Code Inventory\u00ae &#8211; Accurately Identify Unused and Dead Code for Removal to Save Time and Money<\/h3>\n        \n        \n        \n                    <div class=\"o-card__button\">\n                \n<button  class=\"o-card__button-cta o-button o-button--navy-900 o-button--text o-button--next\"\n\n  \n  >\n  \n  \n  <span class=\"o-button__label\">Read Now<\/span>\n\n      \n<i\n  class=\"o-button__icon o-icon\"\n  >east<\/i>\n  \n  <\/button>\n            <\/div>\n            <\/div>\n<\/a>\n\n<a    class=\"c-smart-content__grid-item o-card o-card--id-1 o-card--has-image o-card--text-dark\"\n\n    \n            href=\"https:\/\/www.azul.com\/blog\/revolutionary-approach-to-java-application-security\/\"\n        target=\"_self\"\n    >\n    \n            \n    <span class=\"o-card__image o-picture o-picture--card\">\n\n<picture>\n                        \n            \n            <source\n                media=\"(max-width: 425px)\"\n                srcset=\"https:\/\/azul.imgix.net\/wp-content\/uploads\/11-2-why-avd.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=377&#038;s=e3717a547047c7dee0fffceb23406cfc 1x, https:\/\/azul.imgix.net\/wp-content\/uploads\/11-2-why-avd.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=754&#038;s=ff7e575ae22fa7eec23e501119ea31a4 2x\"\n            >\n                    \n            \n            <source\n                media=\"(max-width: 767px)\"\n                srcset=\"https:\/\/azul.imgix.net\/wp-content\/uploads\/11-2-why-avd.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=719&#038;s=e539e1d96ad8e3ce8ddd5bbfa2d0ee1a 1x, https:\/\/azul.imgix.net\/wp-content\/uploads\/11-2-why-avd.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=1438&#038;s=f354c1aa5009f47dd011e4827f79eddf 2x\"\n            >\n                    \n            \n            <source\n                media=\"(max-width: 1023px)\"\n                srcset=\"https:\/\/azul.imgix.net\/wp-content\/uploads\/11-2-why-avd.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=309&#038;s=448b14e67d4198940ffb1e57ecd32bc6 1x, https:\/\/azul.imgix.net\/wp-content\/uploads\/11-2-why-avd.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=618&#038;s=fbb698b1f63a9f9fcefe31304d6c8bd7 2x\"\n            >\n                    \n            \n            <source\n                media=\"(max-width: 1440px)\"\n                srcset=\"https:\/\/azul.imgix.net\/wp-content\/uploads\/11-2-why-avd.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=357&#038;s=83072b04336c5298ff8e1af88d320481 1x, https:\/\/azul.imgix.net\/wp-content\/uploads\/11-2-why-avd.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=714&#038;s=a9b82fc3eb68c3af75f1ad16868faa7e 2x\"\n            >\n            \n    <img class=\"o-picture__image\" height=\"139\" loading=\"lazy\" onerror=\"this.onerror=null;this.srcset=&quot;https:\/\/www.azul.com\/wp-content\/uploads\/11-2-why-avd.jpg&quot;;while(this.parentNode.getElementsByTagName(&quot;source&quot;).length){this.parentNode.getElementsByTagName(&quot;source&quot;)[0].remove();}\" onload=\"if (this.parentNode.previousElementSibling) this.parentNode.previousElementSibling.remove()\" srcset=\"https:\/\/azul.imgix.net\/wp-content\/uploads\/11-2-why-avd.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=357&#038;s=83072b04336c5298ff8e1af88d320481 1x, https:\/\/azul.imgix.net\/wp-content\/uploads\/11-2-why-avd.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=714&#038;s=a9b82fc3eb68c3af75f1ad16868faa7e 2x\" width=\"357\">\n<\/picture>\n\n\n    <\/span>\n    \n    <div class=\"o-card__content\">\n                    \n<div  class=\"o-card__text-overline o-overline o-overline--pill\"\n  style=\"--setting--overline-bg-color: #FEEBFD; --setting--overline-text-color: #74299E;\">\n  Security<\/div>\n        \n                    \n<h3  class=\"o-card__text-headline o-headline o-headline--h5 s-medium\"\n    >\n  A Revolutionary Approach to Java Application Security<\/h3>\n        \n                    <div class=\"o-card__text-subheadline s-wysiwyg o-card__text-subheadline--image\">\n                Scott Sellers \/ 11\u6708 2, 2022            <\/div>\n        \n        \n                    <div class=\"o-card__button\">\n                \n<button  class=\"o-card__button-cta o-button o-button--navy-900 o-button--text o-button--next\"\n\n  \n  >\n  \n  \n  <span class=\"o-button__label\">Read Now<\/span>\n\n      \n<i\n  class=\"o-button__icon o-icon\"\n  >east<\/i>\n  \n  <\/button>\n            <\/div>\n            <\/div>\n<\/a>\n\n<a    class=\"c-smart-content__grid-item o-card o-card--id-2 o-card--has-image o-card--text-dark\"\n\n    \n            href=\"https:\/\/www.azul.com\/ebook\/cve-detection-landscape\/\"\n        target=\"_self\"\n    >\n    \n            \n    <span class=\"o-card__image o-picture o-picture--card\">\n\n<picture>\n                        \n            \n            <source\n                media=\"(max-width: 425px)\"\n                srcset=\"https:\/\/azul.imgix.net\/wp-content\/uploads\/Assessing-the-CVE-Detection-Landscape-min.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=377&#038;s=179ad9b0a73a6657072ca6aa6da9b23e 1x, https:\/\/azul.imgix.net\/wp-content\/uploads\/Assessing-the-CVE-Detection-Landscape-min.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=754&#038;s=2052a981b5c9bdec5c12e37fe22b4867 2x\"\n            >\n                    \n            \n            <source\n                media=\"(max-width: 767px)\"\n                srcset=\"https:\/\/azul.imgix.net\/wp-content\/uploads\/Assessing-the-CVE-Detection-Landscape-min.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=719&#038;s=c72947727d92dc289514d78313981993 1x, https:\/\/azul.imgix.net\/wp-content\/uploads\/Assessing-the-CVE-Detection-Landscape-min.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=1438&#038;s=7522009b1a20a387e8870df24cac1244 2x\"\n            >\n                    \n            \n            <source\n                media=\"(max-width: 1023px)\"\n                srcset=\"https:\/\/azul.imgix.net\/wp-content\/uploads\/Assessing-the-CVE-Detection-Landscape-min.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=309&#038;s=d5e0e3228e7ea0774d005edadc9ea184 1x, https:\/\/azul.imgix.net\/wp-content\/uploads\/Assessing-the-CVE-Detection-Landscape-min.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=618&#038;s=16b9ff448c108ff4392d874a1f4a5ad1 2x\"\n            >\n                    \n            \n            <source\n                media=\"(max-width: 1440px)\"\n                srcset=\"https:\/\/azul.imgix.net\/wp-content\/uploads\/Assessing-the-CVE-Detection-Landscape-min.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=357&#038;s=e4b4bc210830d847fdeb9af765814cfd 1x, https:\/\/azul.imgix.net\/wp-content\/uploads\/Assessing-the-CVE-Detection-Landscape-min.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=714&#038;s=35f2dea6f694f8691be3a3c1f9a60908 2x\"\n            >\n            \n    <img alt=\"Assessing the CVE Detection Landscape-min\" class=\"o-picture__image\" height=\"275\" loading=\"lazy\" onerror=\"this.onerror=null;this.srcset=&quot;https:\/\/www.azul.com\/wp-content\/uploads\/Assessing-the-CVE-Detection-Landscape-min.jpg&quot;;while(this.parentNode.getElementsByTagName(&quot;source&quot;).length){this.parentNode.getElementsByTagName(&quot;source&quot;)[0].remove();}\" onload=\"if (this.parentNode.previousElementSibling) this.parentNode.previousElementSibling.remove()\" srcset=\"https:\/\/azul.imgix.net\/wp-content\/uploads\/Assessing-the-CVE-Detection-Landscape-min.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=357&#038;s=e4b4bc210830d847fdeb9af765814cfd 1x, https:\/\/azul.imgix.net\/wp-content\/uploads\/Assessing-the-CVE-Detection-Landscape-min.jpg?auto=format&#038;crop=faces,entropy&#038;fit=crop&#038;q=80&#038;ar=1.91082802548&#038;w=714&#038;s=35f2dea6f694f8691be3a3c1f9a60908 2x\" width=\"357\">\n<\/picture>\n\n\n    <\/span>\n    \n    <div class=\"o-card__content\">\n                    \n<div  class=\"o-card__text-overline o-overline o-overline--pill\"\n  style=\"--setting--overline-bg-color: #DCFEFF; --setting--overline-text-color: #035E5E;\">\n  Research &#038; White Papers<\/div>\n        \n                    \n<h3  class=\"o-card__text-headline o-headline o-headline--h5 s-medium\"\n    >\n  Assessing the CVE Detection Landscape<\/h3>\n        \n        \n        \n                    <div class=\"o-card__button\">\n                \n<button  class=\"o-card__button-cta o-button o-button--navy-900 o-button--text o-button--next\"\n\n  \n  >\n  \n  \n  <span class=\"o-button__label\">Read Now<\/span>\n\n      \n<i\n  class=\"o-button__icon o-icon\"\n  >east<\/i>\n  \n  <\/button>\n            <\/div>\n            <\/div>\n<\/a>\n    <\/div>\n\n\n          <\/div>\n      <\/div>\n<\/section>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"purpose\">What is the purpose of penetration testing?<\/h2>\n\n\n\n<p>By acting like an attacker, a pentester provides a better view of the system\u2019s security and reliability and gives a clearer picture of what avenues of attack an attacker might take. This provides a roadmap for the enterprise to secure the system. It is an act of &#8220;ethical hacking,&#8221; also known as &#8220;gray hat hacking,&#8221; where an individual with the appropriate skillset breaks into a computer system to make the system more secure.\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"why-important\">Why is penetration testing important?<\/h2>\n\n\n\n<p>Penetration testing (or &#8220;pentesting&#8221;) gives an enterprise an attacker\u2019s view of their systems, which can differ drastically from the traditional &#8220;defender&#8221; mindset that can be blind to obvious attack vectors (including social engineering attacks). Pentesting a system can provide a more realistic assessment of the system&#8217;s ability to withstand attack, which can lead to considering additional defenses to protect those assets.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"stakeholders\">Who are the key stakeholders?<\/h2>\n\n\n\n<p>In any pentest, several people must be involved for the exercise to be successful.&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Security:<\/strong> Primarily, the enterprise IT security team must know the system isn\u2019t really in danger because a competent pentester will appear and act like a real attacker. ITSec will likely have strong opinions about where and how the pentest is executed (either with full knowledge of the internal systems (\u201cwhite box&#8221; pentest\u201d) or without it (&#8220;black box&#8221; pentest). After the pentest, the ITSec team uses the findings to help secure the system against further attack, working explicitly with the pentester to make sure vulnerabilities are fully closed.&nbsp;<\/li>\n\n\n\n<li><strong>Executives:<\/strong> High-level executive support is often needed to secure the resources (scheduled time and money) for the pentest and to ensure the activity actually takes place. The Chief Information Security Officer (CISO) is usually the principal stakeholder in the pentesting exercise.&nbsp;<\/li>\n\n\n\n<li><strong>Developers:<\/strong> Developers may be consulted for information on how the system works or what servers are involved (in the case of a white box pentest) by the pentester before the activity.&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"risks\">What risks are involved with penetration testing?<\/h2>\n\n\n\n<p>One of the risks new technology executives fear most is the pentester. &#8220;If we give them leave to hack our systems, how do we know they won&#8217;t suddenly turn on us and hold us for ransom?&#8221; While such fears make for good movies or spy thrillers, this happens rarely in practice, so long as the enterprise uses a reputable firm or consultant to carry out the pentest. It is a risk, however, and CISOs are encouraged to communicate with one another across company boundaries to find trusted hackers.<\/p>\n\n\n\n<p>Typically the pentester attacks a running system, which is often in the production environment, and must take care to not accidentally damage or modify any of the production data or servers. For safety&#8217;s sake, it may be tempting to have the pentester attack an environment other than production. But if the environments aren&#8217;t identical, the pentest loses some of its validity. Even for the most conscientious pentester, &#8220;accidents happen.&#8221; (Also keep in mind that in some industries, the pentester even viewing production data could be grounds for regulatory action against the company!)<\/p>\n\n\n\n<p>No matter how thoroughly the pentester tries to scan and explore the system, there is zero guarantee that the pentester has found every vulnerability in the system. Like any effort of its kind, the pentest can only describe the vulnerabilities found in the parts of the system that were tested. There is no guarantee that the pentester explored 100% of the system or found all the vulnerabilities in the parts that they tested. If a pentest comes back clean, don\u2019t assume that there are no vulnerabilities. (This can be a hard realization for an ITSec team, who will want to celebrate at a clean pentest result.)<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"how-azul-helps\">How does Azul help with penetration testing?<\/h2>\n\n\n\n<p>Azul Vulnerability Detection, a feature of Azul Intelligennce Cloud, focuses scarce human effort where vulnerable code is or has been used versus simply present, to help reduce issue backlogs. Intelligence Cloud retains component and code-use history, focusing forensic efforts to determine if vulnerable code was actually exploited prior to it being known as vulnerable.&nbsp;<\/p>\n\n\n\n<p>Inefficient prioritization of vulnerabilities &amp; unused code wastes effort, hampers agility, and reduces developer productivity due to constant context switching and unproductive code maintenance tasks. Azul Vulnerability Detection is not another dashboard for&nbsp;<\/p>\n\n\n\n<p>customers to look at. Users can access data on which components are in use, and vulnerable, using either the product\u2019s API or an intuitive UI. The role of the web UI is to show the information we have and guide customers to the REST API.&nbsp;<\/p>\n\n\n\n\n\n<section    class=\"c-cta-band c-cta-band--color-light c-cta-band--mt-default c-cta-band--mb-default c-cta-band--pt-default c-cta-band--pb-default c-cta-band--color-1 o-component o-component--color-light o-component--mt-default o-component--mb-default o-component--pt-default o-component--pb-default\"\n\n            id=\"block_24ca9ee87a304600417aede995b9076c\"\n    \n    >\n    \n    <div class=\"o-component__wrap\">\n                    <div class=\"o-container\">\n        \n<div class=\"c-cta-band__wrap c-cta-band__wrap--shadow c-cta-band__wrap--bg-white\" id=\"c-cta-band__wrap--block_24ca9ee87a304600417aede995b9076c\">\n            \n    <span class=\"o-picture o-picture--background o-picture--cover o-picture--no-radius\">\n\n<picture>\n    \n    <img decoding=\"async\" alt=\"avd-banner\" class=\"o-picture__image\" height=\"228\" loading=\"lazy\" src=\"https:\/\/www.azul.com\/wp-content\/uploads\/avd-banner.svg?no_imgix=true\" width=\"1120\">\n<\/picture>\n\n\n    <\/span>\n    \n    <div class=\"c-cta-band__content\">\n        <div class=\"c-cta-band__text\" id=\"c-cta-band__text--block_24ca9ee87a304600417aede995b9076c\">\n                            \n<h2  class=\"c-cta-band__headline o-headline o-headline--h2 s-medium\"\n    >\n  Azul Intelligence Cloud<\/h2>\n            \n                            \n<div  class=\"c-cta-band__description o-description o-description--body s-wysiwyg s-wysiwyg--description\"\n\n  >\n  <p>Boost DevOps Productivity with Actionable Intelligence from Production Java Runtime Data from any JVM.<\/p>\n<\/div>\n                    <\/div>\n\n                    <div class=\"c-cta-band__cta\">\n                \n<a  class=\"c-cta-band__cta-btn o-button o-button--fuchsia-900 o-button--white-solid\"\n\n  data-cta-band-modal-id=\"cta-band-form-modal-block_24ca9ee87a304600417aede995b9076c\" href='https:\/\/www.azul.com\/products\/intelligence-cloud\/' target=''\n  >\n  \n  \n  <span class=\"o-button__label\">Learn More<\/span>\n\n  \n  <\/a>\n            <\/div>\n        \n            <\/div>\n<\/div>\n\n\n          <\/div>\n      <\/div>\n<\/section>\n\n<style>\n            #block_24ca9ee87a304600417aede995b9076c,\n        #block_24ca9ee87a304600417aede995b9076c input::placeholder {\n            color: light;\n        }\n    <\/style>\n","protected":false},"template":"","class_list":["post-71946","glossary","type-glossary","status-publish","hentry"],"acf":{"header_title":"Penetration Testing","sidebar_nav_items":[{"link":{"title":"What is Penetration Testing?","url":"#what-is","target":""}},{"link":{"title":"What is the purpose of penetration testing?","url":"#purpose","target":""}},{"link":{"title":"Why is penetration testing important?","url":"#why-important","target":""}},{"link":{"title":"Who are the key stakeholders?","url":"#stakeholders","target":""}},{"link":{"title":"What risks are involved with penetration testing?","url":"#risks","target":""}},{"link":{"title":"How does Azul help with penetration testing?","url":"#how-azul-helps","target":""}}]},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.7 (Yoast SEO v26.9) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What is Penetration Testing? - Azul | Better Java Performance, Superior Java Support<\/title>\n<meta name=\"description\" content=\"Penetrating testing is a sanctioned attack on a system by a security expert to identify vulnerabilities to improve the overall security of the system.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.azul.com\/glossary\/penetration-testing\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Penetration Testing\" \/>\n<meta property=\"og:description\" content=\"Penetrating testing is a sanctioned attack on a system by a security expert to identify vulnerabilities to improve the overall security of the system.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.azul.com\/glossary\/penetration-testing\/\" \/>\n<meta property=\"og:site_name\" content=\"Azul | Better Java Performance, Superior Java Support\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/AzulSystemsInc\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-07T13:55:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.azul.com\/wp-content\/uploads\/what-is-penetration-testing-min.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@azulsystems\" \/>\n<meta name=\"twitter:label1\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data1\" content=\"4\u5206\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.azul.com\/glossary\/penetration-testing\/\",\"url\":\"https:\/\/www.azul.com\/glossary\/penetration-testing\/\",\"name\":\"What is Penetration Testing? - Azul | Better Java Performance, Superior Java Support\",\"isPartOf\":{\"@id\":\"https:\/\/www.azul.com\/#website\"},\"datePublished\":\"2024-06-03T20:59:44+00:00\",\"dateModified\":\"2025-04-07T13:55:12+00:00\",\"description\":\"Penetrating testing is a sanctioned attack on a system by a security expert to identify vulnerabilities to improve the overall security of the system.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.azul.com\/glossary\/penetration-testing\/#breadcrumb\"},\"inLanguage\":\"ja\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.azul.com\/glossary\/penetration-testing\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.azul.com\/glossary\/penetration-testing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.azul.com\/ja\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Glossary\",\"item\":\"https:\/\/www.azul.com\/glossary\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Penetration Testing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.azul.com\/#website\",\"url\":\"https:\/\/www.azul.com\/\",\"name\":\"Azul | Better Java Performance, Superior Java Support\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.azul.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.azul.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ja\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.azul.com\/#organization\",\"name\":\"Azul\",\"alternateName\":\"Azul Systems\",\"url\":\"https:\/\/www.azul.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/www.azul.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.azul.com\/wp-content\/uploads\/2021\/01\/logo.svg\",\"contentUrl\":\"https:\/\/www.azul.com\/wp-content\/uploads\/2021\/01\/logo.svg\",\"width\":112,\"height\":48,\"caption\":\"Azul\"},\"image\":{\"@id\":\"https:\/\/www.azul.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/AzulSystemsInc\",\"https:\/\/x.com\/azulsystems\",\"https:\/\/www.youtube.com\/channel\/UCSoJZa--HhjV9iXtbHUmm8A\",\"https:\/\/www.linkedin.com\/company\/azul-systems\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What is Penetration Testing? - Azul | Better Java Performance, Superior Java Support","description":"Penetrating testing is a sanctioned attack on a system by a security expert to identify vulnerabilities to improve the overall security of the system.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.azul.com\/glossary\/penetration-testing\/","og_locale":"ja_JP","og_type":"article","og_title":"Penetration Testing","og_description":"Penetrating testing is a sanctioned attack on a system by a security expert to identify vulnerabilities to improve the overall security of the system.","og_url":"https:\/\/www.azul.com\/glossary\/penetration-testing\/","og_site_name":"Azul | Better Java Performance, Superior Java Support","article_publisher":"https:\/\/www.facebook.com\/AzulSystemsInc","article_modified_time":"2025-04-07T13:55:12+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.azul.com\/wp-content\/uploads\/what-is-penetration-testing-min.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@azulsystems","twitter_misc":{"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"4\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.azul.com\/glossary\/penetration-testing\/","url":"https:\/\/www.azul.com\/glossary\/penetration-testing\/","name":"What is Penetration Testing? - Azul | Better Java Performance, Superior Java Support","isPartOf":{"@id":"https:\/\/www.azul.com\/#website"},"datePublished":"2024-06-03T20:59:44+00:00","dateModified":"2025-04-07T13:55:12+00:00","description":"Penetrating testing is a sanctioned attack on a system by a security expert to identify vulnerabilities to improve the overall security of the system.","breadcrumb":{"@id":"https:\/\/www.azul.com\/glossary\/penetration-testing\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.azul.com\/glossary\/penetration-testing\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.azul.com\/glossary\/penetration-testing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.azul.com\/ja\/"},{"@type":"ListItem","position":2,"name":"Glossary","item":"https:\/\/www.azul.com\/glossary\/"},{"@type":"ListItem","position":3,"name":"Penetration Testing"}]},{"@type":"WebSite","@id":"https:\/\/www.azul.com\/#website","url":"https:\/\/www.azul.com\/","name":"Azul | Better Java Performance, Superior Java Support","description":"","publisher":{"@id":"https:\/\/www.azul.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.azul.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/www.azul.com\/#organization","name":"Azul","alternateName":"Azul Systems","url":"https:\/\/www.azul.com\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/www.azul.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.azul.com\/wp-content\/uploads\/2021\/01\/logo.svg","contentUrl":"https:\/\/www.azul.com\/wp-content\/uploads\/2021\/01\/logo.svg","width":112,"height":48,"caption":"Azul"},"image":{"@id":"https:\/\/www.azul.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/AzulSystemsInc","https:\/\/x.com\/azulsystems","https:\/\/www.youtube.com\/channel\/UCSoJZa--HhjV9iXtbHUmm8A","https:\/\/www.linkedin.com\/company\/azul-systems"]}]}},"_links":{"self":[{"href":"https:\/\/www.azul.com\/ja\/wp-json\/wp\/v2\/glossary\/71946","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.azul.com\/ja\/wp-json\/wp\/v2\/glossary"}],"about":[{"href":"https:\/\/www.azul.com\/ja\/wp-json\/wp\/v2\/types\/glossary"}],"wp:attachment":[{"href":"https:\/\/www.azul.com\/ja\/wp-json\/wp\/v2\/media?parent=71946"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}