{"id":40318,"date":"2023-06-01T09:14:57","date_gmt":"2023-06-01T07:14:57","guid":{"rendered":"https:\/\/www.usd.de\/?page_id=40318"},"modified":"2025-12-03T16:35:44","modified_gmt":"2025-12-03T15:35:44","slug":"pentest-approach","status":"publish","type":"page","link":"https:\/\/www.usd.de\/en\/pentest\/pentest-approach\/","title":{"rendered":"Pentest Approach"},"content":{"rendered":"<p>[et_pb_section fb_built=\"1\" fullwidth=\"on\" disabled_on=\"on|on|off\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_fullwidth_slider _builder_version=\"4.21.0\" max_height=\"350px\" custom_padding=\"80px||80px||true|false\" hover_transition_duration=\"2000ms\" global_colors_info=\"{}\" button_bg_color__hover=\"#CA650D\" button_bg_color__hover_enabled=\"on|desktop\" button_bg_enable_color=\"on\"][et_pb_slide heading=\"Pentest\" button_text=\"We are happy to help\" button_link=\"https:\/\/www.usd.de\/en\/contact-form-analysis-pentests\/\" content_tablet=\"<\/p>\n<p>Guaranteed quality &amp; transparency<\/p>\n<p>\" content_phone=\"<\/p>\n<p>Guaranteed quality &amp; transparency<\/p>\n<p>\" content_last_edited=\"on|tablet\" _builder_version=\"4.21.0\" header_level=\"h1\" header_font=\"|300|||||||\" header_text_align=\"center\" header_text_color=\"#F07F1D\" header_font_size=\"56px\" body_font=\"|300|||||||\" body_font_size=\"25px\" body_line_height=\"1.4em\" background_enable_color=\"off\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/pentest-usd-ag-vorgehen-header.jpg\" background_enable_image=\"on\" background_blend=\"overlay\" button_text_size=\"20px\" button_text_color=\"#F6F6F6\" button_border_width=\"1px\" button_border_color=\"#F07F1D\" button_font=\"Roboto|300|||||||\" button_use_icon=\"off\" button_alignment=\"center\" button_custom_padding_tablet=\"\" button_custom_padding_phone=\"8px||8px||true|true\" button_custom_padding_last_edited=\"on|phone\" text_orientation=\"center\" width=\"60%\" max_width=\"1080%\" header_font_size_tablet=\"45px\" header_font_size_phone=\"45px\" header_font_size_last_edited=\"on|phone\" body_font_tablet=\"Roboto|300|||||||\" body_font_phone=\"Roboto|300|||||||\" body_font_last_edited=\"on|phone\" body_font_size_tablet=\"20px\" body_font_size_phone=\"20px\" body_font_size_last_edited=\"on|phone\" body_line_height_tablet=\"\" body_line_height_phone=\"\" body_line_height_last_edited=\"on|phone\" button_text_size_tablet=\"18px\" button_text_size_phone=\"18px\" button_text_size_last_edited=\"on|phone\" button_border_width_tablet=\"0px\" button_border_width_phone=\"0px\" button_border_width_last_edited=\"on|phone\" global_colors_info=\"{}\" sticky_transition=\"on\"]<\/p>\n<p>The Methodology of usd AG<\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_slide][\/et_pb_fullwidth_slider][\/et_pb_section][et_pb_section fb_built=\"1\" disabled_on=\"on|on|off\" _builder_version=\"4.21.0\" _module_preset=\"default\" background_color=\"#F6F6F6\" custom_padding=\"0%||0%||false|false\" background_color_gradient_stops_tablet=\"#f07f1d 0%|#f8ab22 100%\" background_color_gradient_stops_phone=\"#f07f1d 0%|#f8ab22 100%\" saved_tabs=\"all\" collapsed=\"off\" global_colors_info=\"{}\"][et_pb_row admin_label=\"Zeile\" _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"|auto|12px|auto||\" custom_padding=\"0px||3px|||\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/pentest\/\" button_text=\"Go to the Pentest overview\" button_alignment=\"center\" _builder_version=\"4.21.0\" _module_preset=\"14cdac1e-928d-489e-a145-4005439caaa9\" button_text_size=\"140%\" button_text_color=\"#2E353D\" button_bg_color=\"RGBA(0,0,0,0)\" button_border_width=\"1px\" button_border_color=\"RGBA(255,255,255,0)\" button_use_icon=\"on\" button_icon=\"&#xf053;||fa||900\" button_icon_color=\"#2E353D\" button_icon_placement=\"left\" button_on_hover=\"off\" button_text_size_tablet=\"\" button_text_size_phone=\"\" button_text_size_last_edited=\"on|phone\" button_icon_tablet=\"\" button_icon_phone=\"\" button_icon_last_edited=\"on|tablet\" locked=\"off\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\"1\" disabled_on=\"off|off|on\" _builder_version=\"4.21.0\" _module_preset=\"default\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/pentest-usd-ag-vorgehen-header.jpg\" custom_padding=\"91px||91px||true|false\" locked=\"off\" collapsed=\"off\" global_colors_info=\"{}\"][et_pb_row _builder_version=\"4.21.0\" _module_preset=\"default\" width=\"80%\" max_height=\"350px\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"default\" text_font_size=\"20px\" text_line_height=\"1.4em\" header_font=\"|300|||||||\" header_font_size=\"30px\" header_line_height=\"1.4em\" background_layout=\"dark\" custom_margin_tablet=\"\" custom_margin_phone=\"\" custom_margin_last_edited=\"on|tablet\" custom_padding_tablet=\"\" custom_padding_phone=\"\" custom_padding_last_edited=\"on|desktop\" header_font_size_tablet=\"25px\" header_font_size_phone=\"\" header_font_size_last_edited=\"on|tablet\" global_colors_info=\"{}\"]<\/p>\n<h1 style=\"text-align: center\"><span style=\"color: #f07f1d;font-size: 190%;font-weight: 300;margin-bottom: 20%\">Pentest<\/span><\/h1>\n<h2><span style=\"color: #fffff;font-size: 120%;font-weight: 300;line-height: 120%\"><\/span><\/h2>\n<p style=\"text-align: center\"><span style=\"font-size: 120%;font-weight: 300;line-height: 120%;color: #ffffff\">The Methodology of usd AG<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\"1\" disabled_on=\"off|off|on\" _builder_version=\"4.21.0\" _module_preset=\"default\" background_color=\"#F07F1D\" use_background_color_gradient=\"on\" background_color_gradient_direction=\"153deg\" background_color_gradient_stops=\"#f07f1d 0%|#f8ab22 100%\" background_color_gradient_start=\"#f07f1d\" background_color_gradient_end=\"#f8ab22\" custom_padding=\"0%||0%||false|false\" background_color_gradient_stops_tablet=\"#f07f1d 0%|#f8ab22 100%\" background_color_gradient_stops_phone=\"#f07f1d 0%|#f8ab22 100%\" saved_tabs=\"all\" collapsed=\"off\" global_colors_info=\"{}\"][et_pb_row admin_label=\"Zeile\" _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"|auto|12px|auto||\" custom_padding=\"0px||3px|||\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/contact-form-analysis-pentests\/\" button_text=\"We are happy to help\" button_alignment=\"center\" _builder_version=\"4.21.0\" _module_preset=\"14cdac1e-928d-489e-a145-4005439caaa9\" button_text_size=\"140%\" button_text_color=\"#FFFFFF\" button_bg_color=\"RGBA(0,0,0,0)\" button_border_width=\"1px\" button_border_color=\"RGBA(255,255,255,0)\" button_use_icon=\"on\" button_icon=\"&#xf0e0;||fa||900\" button_icon_color=\"#FFFFFF\" button_icon_placement=\"left\" button_on_hover=\"off\" button_text_size_tablet=\"\" button_text_size_phone=\"\" button_text_size_last_edited=\"on|phone\" button_icon_tablet=\"\" button_icon_phone=\"\" button_icon_last_edited=\"on|tablet\" locked=\"off\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\"1\" disabled_on=\"off|off|on\" _builder_version=\"4.21.0\" _module_preset=\"default\" background_color=\"#F6F6F6\" custom_padding=\"0%||0%||false|false\" background_color_gradient_stops_tablet=\"#f07f1d 0%|#f8ab22 100%\" background_color_gradient_stops_phone=\"#f07f1d 0%|#f8ab22 100%\" saved_tabs=\"all\" collapsed=\"off\" global_colors_info=\"{}\"][et_pb_row admin_label=\"Zeile\" _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"|auto|12px|auto||\" custom_padding=\"0px||3px|||\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/pentest\/\" button_text=\"Go to the Pentest overview\" button_alignment=\"center\" _builder_version=\"4.21.0\" _module_preset=\"14cdac1e-928d-489e-a145-4005439caaa9\" button_text_size=\"140%\" button_text_color=\"#2E353D\" button_bg_color=\"RGBA(0,0,0,0)\" button_border_width=\"1px\" button_border_color=\"RGBA(255,255,255,0)\" button_use_icon=\"on\" button_icon=\"&#xf053;||fa||900\" button_icon_color=\"#2E353D\" button_icon_placement=\"left\" button_on_hover=\"off\" button_text_size_tablet=\"\" button_text_size_phone=\"\" button_text_size_last_edited=\"on|phone\" button_icon_tablet=\"\" button_icon_phone=\"\" button_icon_last_edited=\"on|tablet\" locked=\"off\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\"1\" _builder_version=\"4.21.0\" _module_preset=\"default\" custom_padding=\"||||false|false\" locked=\"off\" collapsed=\"off\" global_colors_info=\"{}\"][et_pb_row column_structure=\"1_3,2_3\" _builder_version=\"4.21.0\" _module_preset=\"default\" width=\"85%\" max_width_tablet=\"\" max_width_phone=\"\" max_width_last_edited=\"on|phone\" custom_padding=\"10px|||||\" collapsed=\"on\" global_colors_info=\"{}\"][et_pb_column type=\"1_3\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-kachel-leistung-pentest-2.jpg\" alt=\"Harmonisierung mit BAIT\" title_text=\"usd-kachel-leistung-pentest-2\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"2_3\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"default\" background_color=\"RGBA(0,0,0,0)\" custom_margin=\"0px|0px|0px|0px|true|true\" global_colors_info=\"{}\"]<\/p>\n<h2>How Does usd AG Start Your Pentest Project Together with You?<\/h2>\n<p>Some preparatory steps are necessary before the actual Penetration Test (Pentest) can be conducted to ensure an analysis that is tailored to your company in the best possible way. Important criteria for defining your scope are the <a href=\"https:\/\/www.usd.de\/en\/news-pentest-scope\/\">need for protection<\/a>, possible impact of a compromise and the time allocated for the Pentest. Based on these preliminary considerations, we define the <a href=\"https:\/\/www.usd.de\/en\/news-pentest-scope\/\">scope<\/a> together.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.21.0\" _module_preset=\"default\" width=\"85%\" custom_padding=\"||50px|||\" collapsed=\"on\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.19.5\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"||||false|false\" custom_padding=\"0px||||false|false\" hover_enabled=\"0\" global_colors_info=\"{}\" sticky_enabled=\"0\"]<\/p>\n<h2>What Security Standards Does usd AG Take Into Account When Conducting Penetration Tests?<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p>\n<p><span>When conducting Penetration Tests, we take the following international standards and best practices into account:<\/span><\/p>\n<ul>\n<li>Payment Card Industry Data Security Standard (PCI DSS)<\/li>\n<li>Open Source Security Testing Methodology Manual (OSSTMM)<\/li>\n<li>Technical Guide to Information Security Testing and Assessment (NIST SP800-115)<\/li>\n<li>Recommendations of the German Federal Office for Information Security (BSI)<\/li>\n<li>Open Web Application Security Project (OWASP)<\/li>\n<\/ul>\n<p><span>We will be happy to tailor our process model to the requirements of your company and help you to meet your regulatory requirements.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.21.0\" _module_preset=\"default\" width=\"85%\" min_height=\"18px\" custom_padding=\"0px||0px|||\" collapsed=\"on\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"9px|||||\" hover_enabled=\"0\" global_colors_info=\"{}\" sticky_enabled=\"0\"]<\/p>\n<h2>How Does usd AG Approach the Implementation of Penetration Tests?<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_4,3_4\" _builder_version=\"4.21.0\" _module_preset=\"default\" width=\"85%\" custom_margin=\"||0px||false|false\" collapsed=\"on\" global_colors_info=\"{}\"][et_pb_column type=\"1_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/\/red-team-assessment-kick-off-workshop.svg\" alt=\"PCI Zertifizierungsprozess Kick-off\" title_text=\"red-team-assessment-kick-off-workshop\" align=\"center\" _builder_version=\"4.20.2\" _module_preset=\"default\" background_color=\"RGBA(0,0,0,0)\" width=\"45%\" width_tablet=\"20%\" width_phone=\"30%\" width_last_edited=\"on|desktop\" global_colors_info=\"{}\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p>\n<h3>Preparation and kick-off<\/h3>\n<p>Our Pentest Service Management supports you in the acquisition of information and documents relevant for the kick-off meeting. We prepare the Pentest at a kick-off meeting with the technical and organizational specialists of your company. In this meeting, we specify the IT infrastructure to be tested, agree on the necessary user accounts and access paths, and define contact persons and escalation paths. Furthermore, we discuss project-specific details with you such as the metrics for the vulnerability assessment or the language of the report.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_4,3_4\" _builder_version=\"4.21.0\" _module_preset=\"default\" width=\"85%\" custom_margin=\"||0px||false|false\" custom_padding=\"0px||||false|false\" collapsed=\"on\" global_colors_info=\"{}\"][et_pb_column type=\"1_4\" _builder_version=\"4.19.5\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.19.5\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_text][\/et_pb_column][et_pb_column type=\"3_4\" _builder_version=\"4.19.5\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"default\" custom_padding=\"20px|20px|20px|20px|true|true\" border_width_all=\"2px\" border_color_all=\"#F07F1D\" global_colors_info=\"{}\"]<\/p>\n<p><span data-contrast=\"none\" xml:lang=\"DE-DE\" lang=\"DE-DE\" class=\"TextRun SCXW206429245 BCX0\"><span class=\"NormalTextRun SCXW206429245 BCX0\">We conduct our Pentests primarily on the basis of a <a href=\"https:\/\/www.usd.de\/en\/news-pentest-analysis-approaches\/\">grey-box approach<\/a>. This approach combines the advantages of an attacker's perspective with those of an insider and thus helps to obtain meaningful results in a relatively short time. On request, we can conduct our Pentests on the basis of a <a href=\"https:\/\/www.usd.de\/en\/news-pentest-analysis-approaches\/\">black<\/a>- or <a href=\"https:\/\/www.usd.de\/en\/news-pentest-analysis-approaches\/\">white-box approach<\/a>.<\/span><\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_4,3_4\" _builder_version=\"4.21.0\" _module_preset=\"default\" width=\"85%\" custom_margin=\"15px||||false|false\" custom_padding=\"0px||||false|false\" collapsed=\"on\" global_colors_info=\"{}\"][et_pb_column type=\"1_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/\/red-team-assessment-durchfuehrung.svg\" alt=\"PCI Zertifizierungsprozess Kick-off\" title_text=\"red-team-assessment-durchfuehrung\" align=\"center\" _builder_version=\"4.20.2\" _module_preset=\"default\" background_color=\"RGBA(0,0,0,0)\" width=\"45%\" width_tablet=\"20%\" width_phone=\"30%\" width_last_edited=\"on|tablet\" global_colors_info=\"{}\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"default\" custom_margin=\"||-4px|||\" global_colors_info=\"{}\"]<\/p>\n<h3>Examination<\/h3>\n<p>We will inform you in time about the start date and send you a reminder in advance. Subsequently, our <a href=\"https:\/\/herolab.usd.de\/en\/our-experts\/\" target=\"_blank\" rel=\"noopener\">security analysts<\/a> will start the Pentest in consideration of the criteria specified in the kick-off. The Pentest can be conducted on your site or remotely via the Internet from usd's network or via a VPN tunnel. If you are unable to provide network access for the Pentest, we offer you the <a href=\"https:\/\/www.usd.de\/en\/news-remote-pentests-via-usd-orangebox\/\">usd OrangeBox<\/a>, a simple and secure way to perform the Pentest remotely with usd. We stay in constant dialogue with you throughout the entire analysis and, on request, keep you informed about the start and end time of the test activities, progress and status on a daily basis. If we find critical vulnerabilities during the test, we will inform you immediately.<\/p>\n<p>First of all, the systems and applications to be tested are analyzed for their attack surface. Potential vulnerabilities can be identified and verified by using different techniques and applying our <a href=\"https:\/\/herolab.usd.de\/en\/our-platforms-and-tools\/#toolchain\" target=\"_blank\" rel=\"noopener\">usd HeroLab toolchain<\/a> and well-established tools. Thanks to our toolchain, we have more time for extensive, manual analysis. The exploitation of identified, potential vulnerabilities, which could with a high probability affect the availability of IT systems and applications, is discussed with you on a case-by-case basis and only carried out after your explicit approval.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_4,3_4\" _builder_version=\"4.21.0\" _module_preset=\"default\" width=\"85%\" custom_margin=\"15px||||false|false\" custom_padding=\"0px||||false|false\" collapsed=\"on\" global_colors_info=\"{}\"][et_pb_column type=\"1_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/\/red-team-assessment-berichterstellung.svg\" alt=\"PCI Zertifizierungsprozess Kick-off\" title_text=\"red-team-assessment-berichterstellung\" align=\"center\" _builder_version=\"4.20.2\" _module_preset=\"default\" background_color=\"RGBA(0,0,0,0)\" width=\"45%\" width_tablet=\"20%\" width_phone=\"30%\" width_last_edited=\"on|tablet\" global_colors_info=\"{}\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p>\n<h3>Report<\/h3>\n<p>Our security analysts will inform you about the results of the Pentest once the analysis has been completed. You will receive a comprehensive report comprising an executive summary and a technical report in either German or English. This gives you a thorough overview of potential threats and vulnerabilities in your IT infrastructure. This report contains the identified risks and recommendations for corrective measures, so that you can sustainably increase your security level and minimize your risks.<\/p>\n<p>Besides our own risk rating, we offer the vulnerability scoring according to internationally recognized metrics (for example Common Weakness Scoring System (CWSS) or Common Vulnerability Scoring System (CVSS). We are happy to consider your individual customization requests for the report, such as your own risk rating or adaptation to special regulatory requirements.<\/p>\n<p>During PCI DSS pentests, we identify relevant vulnerabilities for your PCI DSS v4.0.1 compliance and provide detailed information on the affected requirements.<\/p>\n<p>We discuss the results together in a final telephone call and clarify any open questions.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_4,3_4\" _builder_version=\"4.21.0\" _module_preset=\"default\" width=\"85%\" custom_margin=\"||0px||false|false\" custom_padding=\"0px||||false|false\" collapsed=\"on\" global_colors_info=\"{}\"][et_pb_column type=\"1_4\" _builder_version=\"4.19.5\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.19.5\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_text][\/et_pb_column][et_pb_column type=\"3_4\" _builder_version=\"4.19.5\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"default\" custom_padding=\"20px|20px|20px|20px|true|true\" border_width_all=\"2px\" border_color_all=\"#F07F1D\" global_colors_info=\"{}\"]<\/p>\n<p><strong>Optional: Test report<\/strong><\/p>\n<p>Our <a href=\"https:\/\/www.usd.de\/en\/next-level-pentest-reporting\/\">test report<\/a> is an additional document and goes beyond the final report. It summarizes the scope as well as the results of the analysis. Here we show, which attack vectors were tested in connection with which functions and with which result - even if no vulnerabilities were identified. This gives you greater transparency, allows you to evaluate the quality of our analysis and, for example, meets BaFin's requirements for your Pentest report.<span><\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_4,3_4\" _builder_version=\"4.21.0\" _module_preset=\"default\" width=\"85%\" custom_margin=\"15px||||false|false\" custom_padding=\"0px|||||\" collapsed=\"on\" global_colors_info=\"{}\"][et_pb_column type=\"1_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/\/red-team-assessment-debriefing.svg\" alt=\"PCI Zertifizierungsprozess Kick-off\" title_text=\"red-team-assessment-debriefing\" align=\"center\" _builder_version=\"4.20.2\" _module_preset=\"default\" background_color=\"RGBA(0,0,0,0)\" width=\"45%\" width_tablet=\"20%\" width_phone=\"30%\" width_last_edited=\"on|tablet\" global_colors_info=\"{}\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p>\n<h3>Remediation<\/h3>\n<p>The Remediation phase comprises the most important steps after Pentests and technical security analyses have been conducted. Here, your company eliminates the identified vulnerabilities based on the recommendations of our security analysts. This is an integral part of improving or enhancing your IT security level.<\/p>\n<p>The remediation of a vulnerability can vary in complexity depending on its nature or on applicable operational requirements. Optionally, we provide the best possible support for you in this important phase - for example, as part of our <a href=\"https:\/\/www.usd.de\/en\/security-analysis-pentests\/vulnerability-management-services\/\">Vulnerability Management Services<\/a>.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_4,3_4\" _builder_version=\"4.21.0\" _module_preset=\"default\" width=\"85%\" custom_margin=\"15px||||false|false\" custom_padding=\"0px|||||\" collapsed=\"on\" global_colors_info=\"{}\"][et_pb_column type=\"1_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/\/finanzwesen-projektunterstuetzung-1.svg\" alt=\"Unterst\u00fctzung bei Informationssicherheitsprojekten 1\" title_text=\"finanzwesen-projektunterstuetzung-1\" align=\"center\" _builder_version=\"4.20.2\" _module_preset=\"default\" background_color=\"RGBA(0,0,0,0)\" width=\"45%\" width_tablet=\"20%\" width_phone=\"30%\" width_last_edited=\"on|tablet\" global_colors_info=\"{}\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p>\n<h3>Re-test and report adjustment<\/h3>\n<p>Optionally, you can verify the correct implementation of the corrective measures with a selective re-test. Especially if the Penetration Test is performed for compliance reasons (e.g., due to PCI DSS requirements), the re-test is a necessary part of the Penetration Test. You will receive the results of the re-test in the form of an updated comprehensive report. If all vulnerabilities have been eliminated and your Pentest meets the PCI DSS requirements, we will gladly issue you with our security certificate. This enables you to demonstrate to third parties that you take security seriously.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.21.0\" _module_preset=\"default\" width=\"85%\" custom_margin=\"-8px||||false|false\" custom_padding=\"||2px|||\" collapsed=\"on\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_divider color=\"#d8d8d8\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\"1\" _builder_version=\"4.20.4\" _module_preset=\"default\" custom_padding=\"0px|||||\" global_colors_info=\"{}\"][et_pb_row column_structure=\"2_5,3_5\" _builder_version=\"4.21.0\" _module_preset=\"default\" width=\"85%\" collapsed=\"on\" global_colors_info=\"{}\"][et_pb_column type=\"2_5\" _builder_version=\"4.19.5\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-ag-agile-softwareentwicklung-pentest.jpg\" title_text=\"usd-ag-agile-softwareentwicklung-pentest\" _builder_version=\"4.20.4\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_5\" _builder_version=\"4.19.5\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" hover_enabled=\"0\" global_colors_info=\"{}\" sticky_enabled=\"0\"]<\/p>\n<h2>How Does usd AG Conduct Pentests in Your Agile Software Development Process?<\/h2>\n<p>An increasing number of companies are using agile methods of software development for applications and apps. Consequently, the environment to be tested is constantly evolving. Implementing IT security effectively can thus quickly become a challenge. Before a major release, we recommend using a Pentest to check the security of the entire application - however, this is not practical in the agile software development cycle. In this case, an incremental security check using a Delta Pentest should be integrated into the DevSecOps workflow.<\/p>\n<p>For example, we can only check the modified code for its security or a test environment for a specific vulnerability during the agile development process.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.21.0\" _module_preset=\"default\" width=\"85%\" custom_margin=\"-8px||||false|false\" custom_padding=\"||2px|||\" collapsed=\"on\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_divider color=\"#d8d8d8\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\"1\" _builder_version=\"4.20.2\" _module_preset=\"default\" custom_padding=\"0px|||||\" collapsed=\"off\" global_colors_info=\"{}\"][et_pb_row _builder_version=\"4.21.0\" _module_preset=\"default\" width=\"85%\" custom_margin=\"|auto|18px|auto||\" custom_padding=\"0px||1px|||\" collapsed=\"on\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.20.2\" _module_preset=\"default\" width=\"95%\" max_width=\"1500%\" custom_padding=\"9px|||||\" global_colors_info=\"{}\"]<\/p>\n<h2><span style=\"font-size: 26px\">usd News: Get More Insights<\/span><\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,1_3,1_3\" use_custom_gutter=\"on\" gutter_width=\"2\" make_equal=\"on\" _builder_version=\"4.21.0\" _module_preset=\"default\" background_color=\"RGBA(0,0,0,0)\" width=\"85%\" custom_margin=\"4px|auto||auto||\" custom_padding=\"16px|7px|42px|7px|false|true\" border_radii=\"on|5px|5px|5px|5px\" collapsed=\"on\" global_colors_info=\"{}\"][et_pb_column type=\"1_3\" _builder_version=\"4.21.0\" _module_preset=\"default\" background_color=\"rgba(46,53,61,0.86)\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-ag-interview-vulnerability-management-services-1.jpg\" background_blend=\"multiply\" background_enable_video_mp4=\"off\" custom_padding=\"0px|0px|0px|0px|true|true\" background_last_edited=\"off|desktop\" border_radii=\"on|5px|5px|5px|5px\" border_width_all=\"1px\" border_color_all=\"#F6F6F6\" global_colors_info=\"{}\" background__hover_enabled=\"off|hover\" background_enable_color__hover=\"off\" background_image__hover=\"https:\/\/www.usd.de\/wp-content\/uploads\/news-success-story-cashpoint.jpeg\" background_enable_image__hover=\"on\"][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"51ae1141-d3aa-4d8e-88be-0448f8284f54\" background_color=\"RGBA(0,0,0,0)\" custom_padding=\"47px|30px|25px|30px|false|true\" global_colors_info=\"{}\"]<\/p>\n<h3><span style=\"color: #ffffff\">How to Efficiently Manage the Results of Technical Security Analyses <\/span><\/h3>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/how-to-manage-results-of-technical-security-analyses\/\" url_new_window=\"on\" button_text=\"To the article\" button_alignment=\"center\" _builder_version=\"4.21.0\" _module_preset=\"7244f902-5e49-458a-9554-eef332089ce2\" custom_margin=\"||26px||false|false\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"4.20.2\" _module_preset=\"default\" background_color=\"rgba(46,53,61,0.86)\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-ag-news-security-scans.jpg\" background_blend=\"multiply\" background_enable_video_mp4=\"off\" custom_padding=\"0px|0px|0px|0px|true|true\" background_last_edited=\"off|desktop\" border_radii=\"on|5px|5px|5px|5px\" border_width_all=\"1px\" border_color_all=\"#F6F6F6\" global_colors_info=\"{}\" background__hover_enabled=\"off|hover\" background_enable_color__hover=\"off\" background_image__hover=\"https:\/\/www.usd.de\/wp-content\/uploads\/news-success-story-cashpoint.jpeg\" background_enable_image__hover=\"on\"][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"51ae1141-d3aa-4d8e-88be-0448f8284f54\" background_color=\"RGBA(0,0,0,0)\" custom_padding=\"47px|30px|25px|30px|false|true\" global_colors_info=\"{}\"]<\/p>\n<h3><span style=\"color: #ffffff\">Security Scan and Pentest: What are the Differences?<\/span><\/h3>\n<p><\/br>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/security-scan-and-pentest-what-are-the-differences\/\" url_new_window=\"on\" button_text=\"To the article\" button_alignment=\"center\" _builder_version=\"4.21.0\" _module_preset=\"7244f902-5e49-458a-9554-eef332089ce2\" custom_margin=\"||26px||false|false\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"4.20.2\" _module_preset=\"default\" background_color=\"rgba(46,53,61,0.86)\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-AG-news-pentest-pruefbericht.jpg\" background_blend=\"multiply\" background_enable_video_mp4=\"off\" custom_padding=\"0px|0px|0px|0px|true|true\" background_last_edited=\"off|desktop\" border_radii=\"on|5px|5px|5px|5px\" border_width_all=\"1px\" border_color_all=\"#F6F6F6\" global_colors_info=\"{}\" background__hover_enabled=\"off|hover\" background_enable_color__hover=\"off\" background_image__hover=\"https:\/\/www.usd.de\/wp-content\/uploads\/news-success-story-cashpoint.jpeg\" background_enable_image__hover=\"on\"][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"51ae1141-d3aa-4d8e-88be-0448f8284f54\" background_color=\"RGBA(0,0,0,0)\" custom_padding=\"47px|30px|25px|30px|false|true\" global_colors_info=\"{}\"]<\/p>\n<h3><span style=\"color: #ffffff\">Next Level Reporting - Our test report makes Pentest results transparent<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/next-level-pentest-reporting\/\" url_new_window=\"on\" button_text=\"To the article\" button_alignment=\"center\" _builder_version=\"4.21.0\" _module_preset=\"7244f902-5e49-458a-9554-eef332089ce2\" custom_margin=\"||26px||false|false\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,1_3,1_3\" use_custom_gutter=\"on\" gutter_width=\"2\" make_equal=\"on\" _builder_version=\"4.21.0\" _module_preset=\"default\" background_color=\"RGBA(0,0,0,0)\" width=\"85%\" custom_margin=\"4px|auto||auto||\" custom_padding=\"16px|7px|42px|7px|false|true\" border_radii=\"on|5px|5px|5px|5px\" global_colors_info=\"{}\"][et_pb_column type=\"1_3\" _builder_version=\"4.20.2\" _module_preset=\"default\" background_color=\"rgba(46,53,61,0.86)\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/news-herolab-interview-dh.jpeg\" background_blend=\"multiply\" background_enable_video_mp4=\"off\" custom_padding=\"0px|0px|0px|0px|true|true\" background_last_edited=\"off|desktop\" border_radii=\"on|5px|5px|5px|5px\" border_width_all=\"1px\" border_color_all=\"#F6F6F6\" global_colors_info=\"{}\" background__hover_enabled=\"off|hover\" background_enable_color__hover=\"off\" background_image__hover=\"https:\/\/www.usd.de\/wp-content\/uploads\/news-success-story-cashpoint.jpeg\" background_enable_image__hover=\"on\"][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"51ae1141-d3aa-4d8e-88be-0448f8284f54\" background_color=\"RGBA(0,0,0,0)\" custom_padding=\"47px|30px|25px|30px|false|true\" global_colors_info=\"{}\"]<\/p>\n<h3><span style=\"color: #ffffff\">What You Should Consider When Ordering Pentests<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/news-order-penetrationtests\/\" url_new_window=\"on\" button_text=\"To the article\" button_alignment=\"center\" _builder_version=\"4.21.0\" _module_preset=\"7244f902-5e49-458a-9554-eef332089ce2\" custom_margin=\"||26px||false|false\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"4.20.2\" _module_preset=\"default\" background_color=\"rgba(46,53,61,0.86)\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/news-pentestplanung.jpeg\" background_blend=\"multiply\" global_colors_info=\"{}\" background__hover_enabled=\"off|hover\"][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"51ae1141-d3aa-4d8e-88be-0448f8284f54\" background_color=\"RGBA(0,0,0,0)\" custom_padding=\"47px|30px|25px|30px|false|true\" global_colors_info=\"{}\"]<\/p>\n<h3><span style=\"color: #ffffff\">Get started with planning your Pentest with these 4 questions<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/news-pentest-planning-tips\/\" url_new_window=\"on\" button_text=\"To the article\" button_alignment=\"center\" _builder_version=\"4.21.0\" _module_preset=\"7244f902-5e49-458a-9554-eef332089ce2\" custom_margin=\"||26px||false|false\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"4.20.2\" _module_preset=\"default\" background_color=\"rgba(46,53,61,0.86)\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-news-herolab-pentest-1219.jpeg\" background_blend=\"multiply\" global_colors_info=\"{}\" background__hover_enabled=\"off|hover\"][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"51ae1141-d3aa-4d8e-88be-0448f8284f54\" background_color=\"RGBA(0,0,0,0)\" custom_padding=\"47px|30px|25px|30px|false|true\" global_colors_info=\"{}\"]<\/p>\n<h3><span style=\"color: #ffffff\">What are the Pentest analysis approaches?<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/news-pentest-analysis-approaches\/\" url_new_window=\"on\" button_text=\"To the article\" button_alignment=\"center\" _builder_version=\"4.21.0\" _module_preset=\"7244f902-5e49-458a-9554-eef332089ce2\" custom_margin=\"||26px||false|false\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\"1\" disabled_on=\"on|on|off\" _builder_version=\"4.21.0\" _module_preset=\"default\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-ag-fusszeile-kontakt-pentest.jpg\" global_colors_info=\"{}\"][et_pb_row _builder_version=\"4.21.0\" _module_preset=\"default\" width=\"85%\" custom_padding=\"|||0px||\" collapsed=\"off\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"default\" text_orientation=\"center\" global_colors_info=\"{}\"]<\/p>\n<p style=\"text-align: left\"><span style=\"line-height: 140%;font-size: 28px;color: #f07f1d\"><span><span class=\"ui-provider hc b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak\" dir=\"ltr\">Do you have any questions or need support?<\/span><\/span><\/span><\/p>\n<h3><\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"default\" width=\"100%\" max_width=\"1080px\" module_alignment=\"center\" min_height=\"168.6px\" custom_margin=\"||16px|||\" custom_padding=\"0px|0px|0px|||\" border_color_all=\"RGBA(255,255,255,0)\" global_colors_info=\"{}\"]<\/p>\n<table border=\"0\" style=\"border-collapse: collapse;width: 100%;border-style: hidden\">\n<tbody>\n<tr>\n<td style=\"width: 17.122%\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.usd.de\/wp-content\/uploads\/kontakt-dh_rund.png\" alt=\"\" width=\"157\" height=\"157\" style=\"color: #ffffff;font-size: 20px\" \/><\/td>\n<td style=\"width: 47.8142%\">\n<p><span style=\"color: #ffffff;line-height: 140%;font-size: 20px\">\"We are happy to advice you on your options for having your systems and applications checked by our experienced security analysts.\"<\/span><\/p>\n<p><span style=\"color: #ffffff;font-size: 16px\">Daniel Heyne, usd Team Lead Sales, Security Consultant Pentest, OSCP, OSCE<br \/><\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/contact-form-analysis-pentests\/\" url_new_window=\"on\" button_text=\"Contact us\" button_alignment=\"center\" _builder_version=\"4.21.0\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" button_bg_use_color_gradient=\"on\" button_bg_color_gradient_direction=\"153deg\" button_bg_color_gradient_stops=\"#ef861c 0%|#f29c1d 100%\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\"1\" disabled_on=\"off|off|on\" _builder_version=\"4.21.0\" _module_preset=\"default\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-ag-fusszeile-kontakt-pentest.jpg\" global_colors_info=\"{}\"][et_pb_row _builder_version=\"4.21.0\" _module_preset=\"default\" width=\"85%\" custom_padding=\"|||0px||\" collapsed=\"off\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"default\" text_orientation=\"center\" global_colors_info=\"{}\"]<\/p>\n<p style=\"text-align: left\"><span style=\"line-height: 140%;font-size: 28px;color: #f07f1d\"><span><span class=\"ui-provider hc b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak\" dir=\"ltr\">Do you have any questions or need support?<\/span><\/span><\/span><\/p>\n<h3><\/h3>\n<p>[\/et_pb_text][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/kontakt-dh_rund.png\" title_text=\"kontakt-dh_rund\" align=\"center\" _builder_version=\"4.21.0\" _module_preset=\"default\" max_width=\"30%\" max_width_tablet=\"30%\" max_width_phone=\"30%\" max_width_last_edited=\"on|tablet\" global_colors_info=\"{}\"][\/et_pb_image][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"default\" width=\"100%\" max_width=\"1080px\" module_alignment=\"center\" min_height=\"168.6px\" custom_margin=\"||16px|||\" custom_padding=\"0px|0px|0px|||\" border_color_all=\"RGBA(255,255,255,0)\" global_colors_info=\"{}\"]<span style=\"color: #ffffff;line-height: 140%;font-size: 20px\">\"We are happy to advice you on your options for having your systems and applications checked by our experienced security analysts.\"<\/span><\/p>\n<p><span style=\"color: #ffffff;font-size: 16px\">Daniel Heyne, usd Team Lead Sales, Security Consultant Pentest, OSCP, OSCE<\/span>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/contact-form-analysis-pentests\/\" url_new_window=\"on\" button_text=\"Contact us\" button_alignment=\"center\" _builder_version=\"4.21.0\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" button_bg_use_color_gradient=\"on\" button_bg_color_gradient_direction=\"153deg\" button_bg_color_gradient_stops=\"#ef861c 0%|#f29c1d 100%\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Methodology of usd AG &nbsp;Pentest The Methodology of usd AGHow Does usd AG Start Your Pentest Project Together with You? Some preparatory steps are necessary before the actual Penetration Test (Pentest) can be conducted to ensure an analysis that is tailored to your company in the best possible way. Important criteria for defining your [&hellip;]<\/p>\n","protected":false},"author":112,"featured_media":43731,"parent":40183,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-40318","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/40318","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/users\/112"}],"replies":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/comments?post=40318"}],"version-history":[{"count":4,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/40318\/revisions"}],"predecessor-version":[{"id":62815,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/40318\/revisions\/62815"}],"up":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/40183"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/media\/43731"}],"wp:attachment":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/media?parent=40318"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}