How to prepare for a security pentest?
Last updated: May 21, 2025
Context
A security pentest (penetration test) is an important security assessment of your application. To ensure a smooth pentest process, certain preparations and access requirements need to be met.
Answer
Here are the key steps to prepare for your security pentest:
Sign Authorization Document
You will receive a document via YouSign that needs to be signed to authorize access to your application. This should be reviewed and signed by appropriate stakeholders (e.g., CEO, CTO).Prepare Test Environments
You need to provide the following test accounts. Ensure you input the credentials in the app at https://app.bastion.tech/compliance/penetration-testing:If you have admin role capabilities:
Organization A with Admin 1 access
Organization B with Admin 2 access
If you don't have admin roles:
Organization A with User 1 access
Organization B with User 2 access
Organization B with User 3 access
Application Access
Provide standard user-level access credentials to your application for the pentester. They will use these to access your application like a normal client.Timeline Coordination
The pentest duration varies based on application complexity. Work with your vendor contact to schedule a suitable time window. Be prepared for potential follow-up questions or a brief call with the pentester to help them understand your application functionality.
Note: During the pentest, ensure your test environment contains representative data but avoid including sensitive production data. If using a demo environment, communicate any specific data preservation requirements to the pentester.