How We Work
Last updated: December 20, 2025
At Bastionity, we understand that penetration testing must never come at the expense of availability. Whether we test staging or production, our approach is designed to minimize risk, avoid disruption, and keep you fully informed.
1. Experienced Security Testers
Our team is made up of experienced penetration testers who regularly assess real-world systems and complex production environments. That experience helps us operate carefully, validate issues efficiently, and avoid actions that could cause instability.
2. Non-Disruptive Testing by Default
We prioritize availability and safety. In production, we avoid risky or high-impact actions unless you explicitly approve them in advance. Without prior written consent from your security/engineering team, we will not perform (including but not limited to):
- Brute force attacks
- Rate-limit stress / saturation testing
- Stress testing / load testing
- Denial of Service (DoS) attacks
- Large-scale data extraction
- Automated scanning at aggressive scale
- High-volume fuzzing
- Resource exhaustion attempts (CPU/RAM/disk spikes)
- High-volume API abuse testing
- High-volume injection attempts
- Application state corruption experiments
- Cache poisoning under heavy load
If a test may carry availability risk, we discuss it first, propose safer alternatives, and proceed only with your approval.
3. Controlled, Manual-First Methodology
We use a manual-first approach to maintain full control over every request we send. Where automation is needed (e.g., for small repetitive checks), it is used in a controlled and rate-limited manner. This reduces the chance of unintended side effects and keeps testing predictable.
4. Transparent Communication & Approval Gates
We maintain a direct communication channel with your team (Slack/Email/Teams — your choice) throughout the engagement. For any “sensitive” action (e.g., tests that might trigger defenses, alter state, or touch critical flows), we ask permission and align on timing before execution.
5. Testing from a Known, Single Source
We can conduct testing from a single known source (VPN/static IP) so your team can quickly identify, monitor, and allowlist our traffic if needed. This also helps detect and isolate any issue immediately.
6. Dedicated Test Accounts & Safe Data Handling
To protect real users and business data, we use dedicated testing accounts and non-production (fake) data whenever possible. We aim to validate findings while minimizing exposure, avoiding unnecessary access, and preventing unintended changes to real records.
7. Efficient Vulnerability Confirmation
We confirm vulnerabilities using the minimum number of requests required to demonstrate impact. This reduces noise, lowers operational risk, and helps your engineers reproduce issues quickly. We provide clear evidence and remediation guidance tailored to your stack.
8. A Practical Engagement Workflow
A typical engagement follows these steps:
- Kickoff & scope confirmation: define targets, environment (staging/production), rules of engagement, and timelines.
- Access setup: test accounts, VPN/static IP allowlisting, and emergency contact escalation paths.
- Discovery & mapping: identify attack surface, key flows, and risk areas.
- Testing & validation: exploit safely, confirm impact, collect evidence, and prioritize findings.
- Reporting: deliver a clear report with severity ratings, evidence, and actionable remediation.
- Retest (optional): verify fixes and provide closure notes for resolved items.
9. Availability & Safety Commitment
Our goal is to help you improve security without disrupting your business. While no testing process can guarantee zero impact in every scenario, our safeguards, controlled approach, and communication model are designed to keep risk as low as possible. If you want additional controls (testing windows, request caps, or pre-approved actions), we’ll implement them.