Mechanisms exist to utilize an independent assessor or penetration team to perform penetration testing.
Does the organization utilize an independent assessor or penetration team to perform penetration testing?