Rules is a set of security requirements that allows you to parameterize a pentest according to the risk appetite of your organization. Rules allows you to determine what is tested and what is not, and what is considered a vulnerability and what is not. It is also the basis for determining how rigorous a pentest was, based on tested and untested requirements. The security requirements are independent of the type of technology being used and are written as specific and understandable objectives. They are the security demands that you agree to follow and comply with. In our hacking services, we determine if these are met or not.
You can access the product
Rules is based on several standards related to information security, including:
Want to know more about our products? Do not hesitate to.