16.13—16.13
>Control Description
Conduct application penetration testing. For critical applications, authenticated penetration testing is better suited to finding business logic vulnerabilities than code scanning and automated security testing. Penetration testing relies on the skill of the tester to manually manipulate an application as an authenticated and unauthenticated user.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.