A.8.8 — Technical vulnerability management
The primary driver. Requires timely identification, evaluation, and treatment of technical vulnerabilities in information systems. Certification bodies expect evidence of active technical assessment — not just a policy that says vulnerabilities should be managed.
A.8.29 — Security testing in development
Security testing must be defined and implemented for new information systems and significant changes. For most ISMS scopes that include a product or platform, penetration testing before significant releases satisfies this control directly.
A.8.22 — Network segmentation
Networks must be segmented according to information classification. The pentest validates that segmentation controls actually work — not just that network diagrams show the right topology. Relevant for any ISMS scope that includes on-premise or hybrid infrastructure.
A.8.3 — Information access restriction
Access to information and systems must be restricted in accordance with the access control policy. Testing authentication, authorization, and privilege escalation paths produces direct evidence for this control. Auditors ask for it at surveillance audits.