FREQUENTLY ASKED QUESTIONS
Penetration Testing
Does our organization actually need a penetration test?
Penetration testing is now an explicit requirement baked into many U.S. regulations and compliance frameworks — most commonly in regulated industries like defense contracting, financial services, critical infrastructure, and healthcare. FFIEC requires it for financial institutions. Proposed changes to the HIPAA Security Rule would for the first time mandate annual penetration testing for all covered entities and business associates handling electronic protected health information. CMMC requires it for DoD contractors. If you are subject to any of these frameworks, the answer is yes.
Will a penetration test satisfy our NCUA or FFIEC examination requirements?
Yes — when scoped and documented correctly. FFIEC examiners expect to see evidence of periodic penetration testing as part of your information security program. Thorium's reports are written with examiner review in mind and include an attestation letter confirming the engagement was conducted.
How often should we conduct a penetration test?
Annual testing is the baseline requirement for most regulatory frameworks including FFIEC, HIPAA, and CMMC. Organizations that undergo significant infrastructure changes — new systems, cloud migrations, acquisitions, major application updates — should consider additional testing following those changes regardless of the annual cycle.
Can we use the penetration test report for our cyber insurance application?
Yes. Many cyber insurance underwriters now require evidence of annual penetration testing as a condition of coverage or favorable rates. Thorium's reports include the documentation and attestation language most underwriters look for.
How long does a penetration test take?
Duration depends on scope. An external network test for a small organization typically takes two to five business days. Internal network tests, web application assessments, and larger environments take longer. We provide a specific timeline estimate during scoping and stick to it.
Do you test third-party systems or cloud-hosted applications?
Yes, with appropriate authorization from the relevant service providers. Many cloud platforms — AWS, Azure, Microsoft 365 — allow penetration testing under specific terms. We confirm authorization requirements during scoping and help you navigate the approval process with your vendors.
Who actually conducts the penetration test?
Senior practitioners — every time. Thorium does not use junior analysts or hand off work after the scoping call. The practitioner who discusses your engagement is the practitioner who conducts it. This is not common in the industry and we consider it non-negotiable.
How is Thorium different from other penetration testing firms?
Our practitioners came from U.S. government offensive security environments where the work had to be right. We brought that standard to the private sector. We work with a limited number of clients at any time, which means your engagement gets our full attention. We have no product to sell and no vendor relationships that influence our findings. Every recommendation we make is based solely on what is right for your organization.
Do you sign NDAs and business associate agreements?
Yes to both. We sign NDAs as a standard part of every engagement. For healthcare clients subject to HIPAA, we execute a Business Associate Agreement before any work begins.
Regulatory Compliance
What is the difference between a compliance audit and a risk assessment?
A compliance audit measures your control environment against the specific requirements of a regulatory framework — FFIEC, HIPAA, PCI-DSS, CMMC — and identifies where you do not meet those requirements. A risk assessment identifies threats, evaluates the likelihood and impact of those threats, and quantifies your overall exposure. Most frameworks require both, and the two engagements complement each other. Thorium conducts them as separate, standalone deliverables or as a combined program.
We have an upcoming NCUA examination. How quickly can you help us prepare?
We can begin a scoping conversation within one business day of your inquiry. Examination preparation timelines depend on how many gaps exist in your current program — organizations with documented policies and recent assessments can move quickly, while organizations starting from scratch require more lead time. Contact us as early as possible. Rushing compliance documentation in the weeks before an examination is one of the most common — and preventable — reasons organizations receive findings.
Does passing a compliance audit mean we are secure?
Not necessarily — and this is a distinction we take seriously. Compliance means your documented controls meet a framework's requirements at the time of assessment. Security means those controls are actually working, consistently applied, and protecting your organization against current threats. The two overlap significantly but are not identical. Thorium conducts compliance audits as substantive technical and procedural assessments rather than documentation reviews — which means the gap between compliance and actual security is smaller at the end of our engagements than it is for organizations that treat compliance as a checkbox exercise.
Can you help with multiple frameworks at once?
Yes. Many of our clients are subject to multiple overlapping frameworks — a credit union may need to address FFIEC, GLBA, and NIST simultaneously. We assess controls once and map findings across all applicable frameworks, which reduces duplication and makes the most efficient use of your time and ours.
What happens if we have significant gaps going into an examination?
We tell you exactly what they are, how serious they are, and what to do about them — in priority order. A gap is not a reason to avoid an assessment. It is precisely the reason to conduct one before your examiner does. Organizations that discover gaps through Thorium's assessment have time to remediate. Organizations that discover them during an examination do not.
Do you provide documentation we can hand directly to an examiner?
Yes. Every compliance engagement includes an examiner-ready evidence package — organized, labeled, and formatted for direct submission to NCUA examiners, OCR auditors, QSAs, or other regulatory reviewers. We write our reports with the examiner's perspective in mind because we understand what they are looking for and how they evaluate what they receive.
Risk Assessments
Cloud Security Configuration Audits

Thorium Information Security, LLC.
Hayden, Idaho, USA
(208) 352-2877
Sales@ThoriumInfosec.com