NIST 800-53 REV 5 • RISK ASSESSMENT

RA-5(9)Penetration Testing and Analyses

CMMC Practice Mapping

No direct CMMC mapping

NIST 800-171 Mapping

No direct NIST 800-171 mapping

Related Controls

No related controls listed

Practitioner Notes

Penetration testing goes beyond automated vulnerability scanning by having skilled testers actively attempt to exploit your systems, simulating real-world attack techniques to find weaknesses that scanners miss.

Example 1: Engage an independent penetration testing firm at least annually to test your external-facing systems and internal network. The scope should include network penetration testing, web application testing, and social engineering (phishing). Require a detailed report with findings, evidence, and remediation recommendations.

Example 2: For continuous validation, deploy a breach and attack simulation (BAS) tool like AttackIQ, SafeBreach, or Microsoft's built-in Attack Simulation Training. These tools automatically run simulated attack techniques against your defenses and report which attacks succeed, giving you ongoing insight into gaps between assessments.