Pentest: quotation and pricing

Sep 9, 2025 | Human Services

Today, pentesting is an indispensable tool for assessing the security of information systems. At a time when cyber-attacks are multiplying and regulations are imposing ever higher levels of protection, companies are turning to intrusion experts to test the solidity of their defenses.

What’s the budget for an intrusion test?

The price of a pentest can vary considerably according to a number of criteria. Scope is the first element to take into account. Auditing a medium-sized web application does not have the same cost as a global test covering a complex network infrastructure, several servers, critical databases and cloud environments. The depth of the test also has an influence: a black-box pentest, which simulates a hacker attack without any prior information, generally takes less time and costs less than a grey-box test, because the auditor has fewer elements at his disposal and the attack surface to be analyzed is more restricted.

Technical complexity, the level of confidentiality of the data to be protected, integration with third-party applications or the need for advanced manual testing are all parameters that influence pricing. Generally speaking, rates can range from a few thousand euros for a limited scope to several tens of thousands for a large-scale audit of a complete environment.

What is the average duration of a pentest?

Penetration testing is not an instant exercise. The duration of a mission depends on the size of the scope, the level of complexity and the objectives set. A simple audit of a standard web application lasts on average a week, while a larger mission involving several environments can extend over a month or more.

The time required includes several phases: preparation and definition of the scope, information gathering and reconnaissance, vulnerability analysis, the exploitation phase, post-exploitation and finally report writing. Drawing up the final deliverable is a stage that requires rigor and clarity, as it determines the understanding and usefulness of the pentest for the company. Some organizations choose to spread testing over time to limit the impact on their operations, which can extend the overall duration of the project.

How can I get a quote for a pentest?

To obtain a quote for a pentest, you need to provide the service provider with a number of precise details. Specialized companies generally ask for a description of the scope to be audited, the type of applications or infrastructures concerned, the volume of items to be tested and the audit objectives. The more detailed the request, the more precise the quote will be, and the more closely it will match actual needs.

The service provider can propose several scenarios, with different levels of depth, to suit the organization’s budget and constraints. The quotation generally includes the overall cost of the assignment, the estimated duration, the expected deliverables and the conditions of execution. In some cases, an initial exploratory audit may be proposed to identify priorities before committing to a full assignment.

How to choose a pentester

Choosing an expert in penetration testing is a decisive step in guaranteeing the quality and reliability of the audit. The first criterion concerns the service provider’s experience and references. A recognized pentester must be able to demonstrate expertise in similar assignments and knowledge of environments close to those of the client company. Certifications are also a guarantee of credibility: accreditations such as OSCP or CRTO testify to the technical competence of the professional.

The methodology used is another essential point: it is advisable to check that the service provider uses recognized standards such as OWASP, PTES or OSSTMM. The quality of the final report must also be assessed, as it is this document that will serve as the basis for implementing corrective measures and convincing stakeholders of the importance of the actions to be taken. Last but not least, the pentester’s interpersonal skills and ability to explain the results in layman’s terms are a decisive asset.

What are the most important criteria to take into account?

When an organization calls in a pentester, it entrusts it with access to sensitive and sometimes critical systems. Confidentiality is therefore a key issue. It is essential to check that the service provider complies with a strict contractual framework, including non-disclosure clauses and confidentiality undertakings.

Transparency about the methods used, the data manipulated and the conditions under which results are stored must also be demanded. A serious expert must be able to explain his or her approach, to inform if critical vulnerabilities are discovered during testing, and to guarantee that the actions taken will not affect the availability of systems in production.

What are the strategic benefits of a well-executed pentest?

Beyond the purely technical aspect, penetration testing is part of a strategic approach for the company. Not only does it enable vulnerabilities to be identified, it also measures the effectiveness of existing security measures and reinforces the culture of cybersecurity within teams.

It also provides a regulatory advantage, as many standards require regular audits to verify compliance. Finally, it is a valuable governance tool for senior management, providing a clear view of risks and facilitating informed decisions on cybersecurity investments.