handbook/handbook/security/secure-development-and-operations/penetration-testing-policy.md
This policy establishes the requirements for regular penetration testing of Tuist GmbH's systems, applications, and infrastructure to identify security vulnerabilities that could potentially be exploited by malicious actors. Penetration testing provides an essential security assessment that goes beyond automated vulnerability scanning by simulating real-world attack scenarios to validate the effectiveness of security controls.
This policy applies to all systems, applications, and infrastructure owned, operated, or maintained by Tuist GmbH that are business-critical and/or process, store, or transmit Confidential data. It applies to all employees, contractors, and third parties involved in planning, conducting, or responding to penetration testing activities.
This policy operates within Tuist's shared responsibility model, recognizing that infrastructure providers (Render, Supabase, Tigris, and Cloudflare) are responsible for penetration testing of their underlying infrastructure layers.
Tuist GmbH shall conduct penetration testing at least annually on all Internet-exposed services and critical applications. Additional penetration tests shall be performed following significant changes to the application or when required by compliance requirements.
The following types of penetration testing shall be conducted by Tuist:
In accordance with our shared responsibility model, Tuist's penetration testing scope focuses on:
Tuist's Responsibility (must be tested):
Infrastructure Provider Responsibility (covered by provider testing):
Penetration testing shall follow industry-standard methodologies such as:
Penetration testing must be conducted by:
Before penetration testing begins:
During penetration testing:
After penetration testing is complete:
Vulnerabilities discovered during penetration testing shall be remediated according to:
Any deviation from these timelines requires documented risk acceptance by the CTO.
The following documentation must be maintained:
All penetration testing documentation shall be retained for a minimum of 3 years.
To ensure comprehensive security coverage:
When engaging third-party penetration testing providers:
To satisfy audit and compliance requirements:
Any exceptions to this policy must be documented and approved by the CTO. Exceptions shall include:
Compliance with this policy shall be monitored through annual review of:
This policy shall be reviewed annually or when significant changes occur to Tuist's technology infrastructure or threat landscape.
The version history of this document can be found in Tuist's handbook repository.