Penetration testing simulates potential attacks on the IT environment, which allows to identify vulnerabilities. A controlled attack is carried out by a team of specialists, targeting the most likely vectors of attacks on vulnerable areas of the IT infrastructure.