Software Secured Company Logo.
Services
Services
WEB, API & MOBILE SECURITY

Manual reviews expose logic flaws, chained exploits, and hidden vulnerabilities

Web Application Pentesting
Mobile Application Pentesting
Secure Code Review
Infrastructure & Cloud Security

Uncovers insecure networks, lateral movement, and segmentation gaps

External Network Pentesting
Internal Network Pentesting
Secure Cloud Review
AI, IoT & HARDWARE SECURITY

Specialized testing validates AI, IoT, and hardware security posture

AI Pentesting
IoT Pentesting
Hardware Pentesting
ADVANCED ADVERSARY SIMULATIONS

We simulate attackers, exposing systemic risks executives must address

Red Teaming
Social Engineering
Threat Modelling
PENETRATION TESTING AS A SERVICE

PTaaS provides continuous manual pentests, aligned with release cycles

Penetration Testing as a Service
OWASP TOP 10 TRAINING

Practical security training strengthens teams, shifting security left effectively

Secure Code Training
Ready to get started?
Identify real vulnerabilities confidently with zero-false-positive penetration testing
Learn More
Industries
Industries
INDUSTRIES
Data and AI

AI pentesting uncovers adversarial threats, ensuring compliance and investor trust

Healthcare

Penetration testing protects PHI, strengthens compliance, and prevents healthcare breaches

Finance

Manual pentests expose FinTech risks, securing APIs, cloud, and compliance

Security

Penetration testing validates SecurTech resilience, compliance, and customer trust

SaaS

Pentesting secures SaaS platforms, proving compliance and accelerating enterprise sales

CASE STUDY

“As custodians of digital assets, you should actually custodize assets, not outsource. Software Secured helped us prove that our custody technology truly delivers on that promise for our clients in both the cryptocurrency and traditional finance”

Nicolas Stalder,
CEO & Co-Founder, Cordial Systems
Ready to get started?
Our comprehensive penetration testing and actionable reports have 0 false positives so you can identify
Learn More
Compliance
Compliance
COMPLIANCE
SOC 2 Penetration Testing

Pentesting validates SOC 2 controls, proving real security to auditors and customers

HIPAA Penetration Testing

Manual pentesting proves HIPAA controls protect PHI beyond documentation

ISO 27001 Penetration Testing

Pentests uncover risks audits miss, securing certification and enterprise trust

PCI DSS Penetration Testing

Pentesting validates PCI DSS controls, protecting sensitive cardholder data

GDPR Penetration Testing

GDPR-focused pentests reduce breach risk, regulatory fines, and reputational loss

CASE STUDY

“Software Secured’s comprehensive approach to penetration testing and mobile expertise led to finding more vulnerabilities than our previous vendors.”

Kevin Scully,
VP of Engineering, CompanyCam
Ready to get started?
Our comprehensive penetration testing and actionable reports have 0 false positives so you can identify
Learn More
PricingPortal
Resources
Resources
COMPLIANCE
Blogs
Case Studies
Events & Webinars
Partners
Customer Testimonials
News & Press
Whitepapers
API & Web Application Security Testing

15 Risks & Rewards of Pentesting in a Production Environment

Warren Moynihan
November 1, 2021
Ready to get started?
Our comprehensive penetration testing and actionable reports have 0 false positives so you can identify
Learn More
Login
Book a Consultation
Contact
Blog
/
Penetration Test Reports & ROI
/

Aligning Pen Tests with NIST SP 800-115: A Pragmatic Guide for CTOs & Compliance Teams

Explore how NIST SP 800-115 provides a structured methodology for penetration testing. Learn how to apply its phases in real-world SaaS environments, satisfy compliance auditors, and turn pentesting into a strategic risk tool.

By Sherif Koussa
・
8 min read
Table of contents
Text Link
Text Link

Penetration testing is more than a checkbox in your security program—it’s a strategic investment in identifying real-world attack paths before adversaries do. NIST SP 800-115, the Technical Guide to Information Security Testing and Assessment, provides a structured, repeatable methodology that aligns with most modern development lifecycles and compliance regimes. For CTOs, it offers risk visibility and decision-making data; VPs of Engineering gain a clear roadmap for integrating security testing into DevOps; and Compliance Managers receive robust documentation and evidence for audits.

“The purpose of this document is to assist organizations in planning and conducting technical information security tests and examinations, analyzing findings, and developing mitigation strategies.” NIST Computer Security Resource Center

‍

1. What Is NIST SP 800-115—and Why Should You Care?

Originally released on September 30, 2008, SP 800-115 codifies best practices for:

  • Vulnerability Scanning
  • Penetration Testing
  • Protocol Assessments

It breaks testing into five core phases, Planning, Information Gathering, Vulnerability Analysis, Exploitation, and Post-Testing Activities, ensuring nothing falls through the cracks . Though federal in origin, its flexible framework scales from lean startups to global enterprises.

Key Benefits

  • Standardized Methodology: Eliminates ambiguity across successive test engagements.
  • Audit-Ready Artifacts: Test plans, raw logs, and formal reports directly satisfy multiple compliance requirements.
  • Customizable Techniques: Organizations choose tools and tactics aligned with their tech stack and risk profile.

“When it comes to penetration testing, NIST SP 800-115 is a valuable guide that can be used to influence the methodology pen testers use when testing for organizational vulnerabilities.”

‍

2. The Five Phases of SP 800-115 in Practice

‍

1. Planning & Preparation: A comprehensive Test Plan, listing IP ranges, app endpoints, data-handling rules, and escalation paths—is essential to prevent scope creep and unintended service outages.

2. Information Gathering: While automated tools can enumerate thousands of hosts in minutes, manual exploration often uncovers hidden assets (e.g., forgotten dev servers) that off-the-shelf scanners miss.‍

3. Vulnerability Analysis & Exploitation: SP 800-115 stresses validating scanner output manually to eliminate false positives. Only then do testers craft controlled exploits, emulating attacker creativity within agreed safety constraints .‍

4. Post-Testing Activities Split your report into:‍

  1. Executive Summary: High-level risk overview for leadership.‍
  2. Technical Appendix: Step-by-step exploit reconstructions for engineers.

‍

‍

3. The Important Value of Manual Penetration Testing

Automated scanners excel at breadth, identifying known misconfigurations and common vulnerabilities. Manual testing, however, brings expert judgment, contextual analysis, and creativity:

“Manual pen testing allows the tester to make real-time decisions and adapt to circumstances that develop throughout the course of a test.”

“Manual penetration testing offers a depth of analysis that automated tools struggle, and usually fail, to match... The ability to customise test scenarios based on a holistic understanding of target systems allows for a more tailored and thorough assessment.”

‍

Key Advantages

1. Contextual Intelligence: Humans recognize business logic flaws, such as abuse of multi-step workflows—that tools simply can’t.

2. Adaptive Strategy: Testers pivot on the fly when encountering custom encryption, proprietary APIs, or unusual business flows.

3. Complex Chaining: Craft multi-stage exploits (e.g., SSRF → RCE → lateral movement) that demonstrate end-to-end impact.

4. Social Engineering & Physical Checks: When in-scope, manual tests can include phishing simulations or office walk-throughs to validate real-world controls.

‍

When to Prioritize Manual Testing

  • High-Value Assets: Critical customer data, financial systems, or proprietary IP.
  • Regulated Environments: Healthcare, finance, and government often mandate manual verification.
  • Complex Architectures: Microservices, serverless functions, and heavy use of custom code.

Learn more about our Manual Penetration Testing services and how they go beyond automated scans.

‍

4. Embedding Pen Testing into Your SDLC

DevOps demands both speed and security. SP 800-115 phases align naturally with modern pipelines:

  1. Shift-Left Testing
    • Integrate automated scans and threat modeling into pull requests.
    • Use lightweight OSINT checks (e.g., domain reconnaissance) in early CI stages.
  2. Event-Driven & Time-Based Cadence
    • Event-Driven: Trigger manual pen tests for major feature launches or environment changes.
    • Time-Based: Quarterly or bi-annual full-scope assessments ensure regular health checks.
  3. Cross-Functional Collaboration
    • Embed security champions in Agile squads.
    • Automate ticket creation (Jira, GitHub Issues) per finding, tagging owners and severities .

‍

5. Compliance & Audit Alignment

Leverage a single SP 800-115 engagement to satisfy multiple frameworks:

  • NIST CSF
    • Detect (ID.RA-2): Vulnerability assessments feed risk identification.
    • Respond (RS.CO): Documented test outcomes inform incident response.
  • ISO 27001 Annex A.12.6
    • Mandates “management of technical vulnerabilities” SP 800-115 delivers the methodology.
  • SOC 2 CC 3 (Risk Assessment)
    • Detailed Test Plans and findings populate risk registers and control evidence.

Audit Artifact Best Practices

  • Retain raw scan logs and exploit scripts for at least one audit cycle (12–24 months).
  • Version-control all Test Plan and RoE documents to demonstrate review histories.

‍

6. Metrics That Matter: Quantifying ROI & Risk Reduction

To secure budget and executive buy-in, move beyond raw finding counts:

  • Mean Time to Remediation (MTTR): A shrinking MTTR signals improving cross-team workflows.
  • Critical Finding Closure Rate: % of high-severity issues closed within SLA windows.
  • Vulnerability Recurrence Rate: Falling recurrence indicates systemic process improvements.
  • Financial Risk Reduction: Frameworks like FAIR can translate vulnerability data into projected loss-avoidance.

“70% of organizations view the NIST Cybersecurity Framework as a best practice, noting that implementation often requires upfront investment but yields long-term risk reduction.”

Dive deeper in our blog post on Measuring Pen Test ROI.

‍

7. Selecting a Pen Test Partner

Not all vendors deliver equal value. In your RFP, demand:

1. Manual Expertise: Proof of hands-on validation for top-tier findings, avoid tool-only scans.

2. Domain Knowledge: Experience with your stack (e.g., container orchestration, serverless).

3. Reporting Rigor: Both concise executive briefings and detailed technical appendices.

4. Compliance Track Record: Client references in regulated sectors who’ve passed real audits under NIST, HIPAA, or PCI-DSS.

‍

See why leading enterprises choose Software Secured for Enterprise Penetration Testing.

‍

8. Real-World Case Study: Applying SP 800-115 at Scale

AcmeFin Corp., a mid-market SaaS provider in finance, faced a looming SOC 2 Type II deadline. After adopting SP 800-115:

  • 45% reduction in critical vulnerabilities within six months.
  • MTTR fell from 30 days to 12 days, thanks to automated ticketing and structured remediation sprints.
  • Passed SOC 2 audit on first attempt, citing NIST-aligned Test Plans and raw data archives.

Read the full MoveSpring Case Study for details.

‍

9. Common Pitfalls & How to Avoid Them

  1. Ambiguous Scoping
    • Clearly enumerate IP ranges, application endpoints, and data classifications in your RoE.
  2. One-Off Mindset
    • Pen tests must evolve into a continuous program, not a yearly ritual.
  3. Poor Remediation Follow-Up
    • Always schedule retests on remediated items to confirm fixes.
  4. Weak Communication
    • Use dual-track reporting: high-level summaries for leadership and deep-dive appendices for engineers.

10. Next Steps & Strategic Recommendations

‍

1. Baseline Assessment: Launch a full-scope pen test under SP 800-115 to map your initial risk landscape.

2. Roadmap Integration: Embed SP-aligned testing milestones into quarterly release plans.

3. Team Enablement: Host hands-on workshops for developers and ops staff on interpreting and triaging pen-test findings.

4. Continuous Improvement: Transition from annual tests to event-driven or quarterly assessments as your infrastructure scales.

‍

By prioritizing manual penetration testing within the NIST SP 800-115 framework, and leveraging Software Secured’s expertise, you’ll transform pen testing from a compliance exercise into a strategic lever that drives faster remediation, deeper risk insights, and greater stakeholder confidence.

‍

‍

About the author

Sherif Koussa

Sherif Koussa is a cybersecurity expert and entrepreneur with a rich software building and breaking background. In 2006, he founded the OWASP Ottawa Chapter, contributed to WebGoat and OWASP Cheat Sheets, and helped launch SANS/GIAC exams. Today, as CEO of Software Secured, he helps hundreds of SaaS companies continuously ship secure code.

Continue your reading with these value-packed posts

PCI DSS Penetration Testing

Data Breach Fines: What You Need to Know

Cate Callegari
Cate Callegari
12 min read
March 27, 2023
Penetration Testing Services

The Best of Both Worlds: Combining Pentesting and Bug Bounties for Maximum Security

Cate Callegari
Cate Callegari
8 min read
November 21, 2024
API & Web Application Security Testing

7 Steps to Comprehensive Penetration Testing

Cate Callegari
Cate Callegari
7 min read
May 16, 2022

Get security insights straight to your inbox

Helping companies identify, understand, and solve their security gaps so their teams can sleep better at night

Book a Consultation
Centralize pentest progress in one place
Canadian based, trusted globally
Actionable remediation support, not just findings
Web, API, Mobile Security
Web App PentestingMobile App PentestingSecure Code Review
Infrastructure & Cloud Security
External Network PentestingInternal Network PentestingSecure Cloud Review
AI, IoT & Hardware Security
AI PentestingIoT PentestingHardware Pentesting
More
PricingPortalPartnersContact UsAbout UsOur TeamCareers
More Services
Pentesting as a ServiceSecure Code Training
Industries
Data and AIFinanceHealthcareSecuritySaaS
Compliance
GDPR PentestingHIPAA PentestingISO 27001 PentestingPCI DSS PentestingSOC 2 Pentesting
Resources
BlogsCase StudiesEvents & WebinarsCustomer TestimonialsNews & PressWhitepapers
More
PricingPortalPartnersContact UsAbout UsOur TeamCareers
Resources
BlogsCase StudiesEvents & WebinarsCustomer TestimonialsNews & PressWhitepapers
Security & CompliancePrivacy PolicyTerms & Conditions
2025 ©SoftwareSecured