🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Create a Step-by-Step Penetration Testing Process Checklist for Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 2-11-3

Practical, step-by-step guidance for building a penetration testing checklist to satisfy ECC – 2 : 2024 Control 2-11-3 requirements under the Compliance Framework.

April 02, 2026
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post explains how to create a clear, auditable, step-by-step penetration testing process checklist that satisfies Essential Cybersecurity Controls (ECC – 2 : 2024) Control 2-11-3 under the Compliance Framework, with practical implementation notes, technical examples, and small-business scenarios that make the control actionable.

Requirement and Key Objectives

Requirement

Control 2-11-3 requires organizations to establish and follow a documented penetration testing process that validates the effectiveness of technical controls and identifies exploitable weaknesses. The process must include scoping, authorized testing, evidence collection, risk rating, remediation tracking, and retest/verification steps that demonstrate compliance to auditors.

Key Objectives

The primary objectives are (1) to ensure tests are authorized and repeatable, (2) to produce prioritized, actionable findings mapped to assets and control objectives, (3) to generate evidence suitable for audit and remediation tracking, and (4) to verify fixes within a defined timeframe. For Compliance Framework alignment, tie each test result to the corresponding ECC control and asset owner in your CMDB.

Implementation Notes

Implementation should emphasize separation of duties, maintain a written Rules of Engagement (RoE), and define testing types (external/internal, black/gray/white box, web/mobile/API, wireless, social engineering). Minimum frequency should be defined (e.g., annual external + annual internal + after major changes), and the checklist must capture artifacts: signed authorization, vulnerability scan baselines, raw tool output (pcap, scans), screenshots, exploit proof-of-concept, remediation tickets, and retest evidence. Small businesses can scale scope to critical assets to control cost.

Step-by-step Penetration Testing Process Checklist

1) Planning and Authorization

Checklist item: Obtain written authorization and a signed Rules of Engagement (RoE) before any testing. Document scope (IP ranges, domains, cloud resources, systems excluded), time windows, contact points, and emergency kill-switch procedures. Technical detail: include asset IDs from your CMDB and list specific test accounts, e.g., "test-user@corp.local with AD UID 1002" for white-box scenarios. Evidence: signed RoE and a recorded approval email stored in your compliance repository.

2) Scoping and Risk Prioritization

Checklist item: Map assets to criticality and data sensitivity, then prioritize targets. For small businesses, limit full exploitation to the top 10 business-critical assets (external web app, VPN gateway, customer database). Technical detail: use a risk matrix (Business Impact × Likelihood) and include CVSS thresholds for automated triage (e.g., plan to actively exploit findings with CVSS ≥ 7.0 that affect public-facing assets). Evidence: documented scope spreadsheet and prioritized asset list.

3) Reconnaissance and Discovery

Checklist item: Run discovery scans and passive reconnaissance before active testing. Tools and example commands: nmap -sS -p- -T4 --open -oA nmap-discovery 198.51.100.0/24, and nikto -h https://app.example.com for web directories. Capture raw outputs and initial baselines from authenticated scans (Nessus/OpenVAS) and correlate with asset inventory. Evidence: nmap xml, nikto logs, and a screenshot of the authenticated vulnerability scanner dashboard.

4) Exploitation and Validation

Checklist item: Attempt exploitation only for scoped targets and within RoE constraints. Use controlled exploits and maintain proof-of-concept artifacts. Example tools/commands: use Burp Suite or OWASP ZAP for web app testing, and Metasploit for controlled exploitation where permitted (e.g., msfconsole exploit/windows/smb/ms17_010). Capture pcap traffic, command outputs, and screenshots that demonstrate privilege escalation or data access. Always avoid destructive tests in production unless explicitly authorized and with backups in place.

5) Post-Exploitation, Impact Analysis, and Evidence Collection

Checklist item: Document the business impact of successful exploits (data exfiltration paths, privilege escalation impact, lateral movement potential). Collect artifacts: memory dump (when permitted), pcap, evidence of obtained credentials, and screenshots of sensitive data. Translate technical findings into risk statements for business owners (e.g., "SQLi on customer portal allows exfiltration of PII — High risk, CVSS 9.0"). Map each finding to ECC controls impacted and assign remediation owners and timelines.

6) Reporting, Remediation Tracking, and Retest

Checklist item: Produce a prioritized remediation report with clear remediation steps, CVSS scores, exploitability assessment, and recommended compensating controls. Create tickets in your issue tracker with references to the evidence artifacts, expected due dates (e.g., critical — within 30 days), and acceptance criteria. After remediation, perform retests and capture verification evidence (re-scan output, updated logs). For compliance, include a final attestation signed by the tester and a remediation owner confirming closure.

Compliance Tips, Best Practices, and Small-Business Scenarios

Practical Tips

Checklist item: Use independent testers (third-party or an internal red team not responsible for remediation) to avoid conflicts of interest. Maintain an auditable chain-of-custody for artifacts and ensure all tools are licensed and up to date. For cloud assets, include IAM policy reviews and use cloud-aware scanners. Automate recurring scans and integrate results into your SIEM and ticketing system for end-to-end traceability.

Small-Business Example

Scenario: A small e-commerce company with limited budget. Actionable approach: perform quarterly automated authenticated scans (OpenVAS or a hosted scanner), an annual targeted external pentest focused on the web portal and payment flow, and use a PTaaS provider for an ad-hoc retest after major releases. Use Burp Community for local testing, supplement with a single-day external pentest from a vetted vendor, and require the vendor to provide raw tool outputs, a prioritized findings spreadsheet, and a retest within 30 days of remediation.

Risk of Not Implementing Control 2-11-3

Failing to implement this control increases the likelihood that exploitable vulnerabilities remain undetected, leading to data breaches, regulatory fines, service outages, and reputational damage. From a compliance viewpoint, missing documented authorization, evidence, or retest artifacts will likely result in audit findings, remedial orders, or failed certifications. Technically, untested public-facing services and stale privileged accounts are frequent root causes of compromises.

In summary, build your ECC 2-11-3 penetration testing checklist around documented authorization, scoped and prioritized assets, repeatable discovery and exploitation procedures, robust evidence collection, formal remediation tracking, and retesting. Tailor the frequency and depth of tests to your organization's size and risk profile, use independent testers where possible, and keep all artifacts indexed to your CMDB and ticketing system to meet Compliance Framework requirements and demonstrate continuous improvement.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes