6.2 Conduct Security Control Testing
- 6.2.1 Vulnerability Assessment
- 6.2.2 Penetration Testing
- 6.2.3 Log Reviews
- 6.2.4 Synthetic Transaction
- 6.2.5 Code review and testing
- 6.2.6 Misuse case testing
- 6.2.7 Coverage analysis
- 6.2.8 Interface Testing
- 6.2.9 Breach attack simulations (BAS)
- 6.2.10 Compliance checks