ModernPentestModernPentest

Continuous Monitoring

24/7 automated security monitoring

Why Continuous Monitoring?

Traditional security assessments have limitations:

Traditional ApproachContinuous Monitoring
Annual pentestsDaily to weekly pentests
Point-in-time snapshotAlways-current coverage
Findings stale within weeksVulnerabilities caught quickly
Gaps between testsContinuous protection

Your team ships code weekly—why test for vulnerabilities annually?

How It Works

Scheduled Pentesting

Configure automated pentests that fit your workflow:

ScheduleBest For
DailyHigh-velocity teams, CI/CD environments
WeeklyMost teams, balanced coverage
MonthlySmaller teams, focused security effort
CustomCompliance requirements, specific timing

Risk Score

Track your overall security posture with a single metric that reflects vulnerability severity and risk factors.

45
Medium Risk

Baseline Risk Score

Typical First Scan: 30
Industry Average: 45

How It's Calculated

The risk score (0-100) is calculated from your vulnerability data:

Base Score:

SeverityPoints per Finding
Critical40 points
High20 points
Medium5 points
Low1 point
Info0 points

Risk Multipliers:

Additional factors increase your score:

FactorMultiplierWhen Applied
Exploitable×1.5Known exploit code exists
Public-Facing×1.3Affects externally accessible components
Authentication×1.4Involves auth/authorization issues

Multipliers stack multiplicatively. Example: 2 Critical + 1 High with exploitable code:

  • Base: (2 × 40) + (1 × 20) = 100
  • With exploitable multiplier: 100 × 1.5 = 150 → capped at 100

Risk Levels

ScoreLevelIndicator
80-100CriticalImmediate action required
60-79HighAttention needed
40-59MediumMonitor closely
20-39LowGood standing
0-19MinimalExcellent

Benchmarks

  • Typical First Scan: 30 — Most applications start here
  • Industry Average: 45 — Median across all organizations

Dashboard Metrics

Trend Analysis

The dashboard tracks your risk score over time, showing:

  • Historical risk scores by date
  • Trend direction (improving, stable, degrading)
  • Score changes after each pentest

A trend is considered:

  • Improving — Score dropped by 5+ points
  • Stable — Score changed by less than 5 points
  • Degrading — Score increased by 5+ points

Key Metrics

MetricWhat It Shows
Risk scoreOverall security posture (0-100)
Vulnerability countTotal open issues over time
Severity distributionCritical/High/Medium/Low breakdown
Mean Time to RemediateAverage fix time by severity
Pentest coveragePercentage of assets tested recently

Risk Indicators

Quick visibility into security status based on risk score:

IndicatorRisk LevelMeaning
🔴Critical (80-100)Immediate action required
🟠High (60-79)Attention needed
🟡Medium (40-59)Monitor closely
🟢Low/Minimal (0-39)Good standing

SOC 2 Compliance

Continuous monitoring satisfies SOC 2 requirements:

Trust Services Criteria CC4.1

"The entity continuously monitors the system..."

Demonstrated through:

  • Scheduled automated pentesting
  • Real-time vulnerability detection
  • Documented testing frequency

Trust Services Criteria CC7.1

"The entity has implemented vulnerability management procedures..."

Demonstrated through:

  • Prioritized vulnerability tracking
  • Remediation timelines
  • Evidence of fixes

See SOC 2 Reports for compliance documentation.

Next Steps

Last updated: February 1, 2026

On this page