Loading...
Loading...
A plain-English guide to penetration testing for Kenyan businesses — what a pentest actually does, how much it costs, what compliance frameworks require it, and how to choose a firm you can trust.
Cyber attacks against Kenyan businesses have increased dramatically. The Communications Authority of Kenya reported over 860 million cyber threat events in a single quarter of 2024 — a 1,000% increase year-on-year. Financial services, healthcare, logistics, and government contractors are primary targets.
Penetration testing — the practice of systematically attacking your own systems to find weaknesses before real attackers do — is no longer optional for any business handling sensitive data or financial transactions.
This guide explains what a penetration test actually involves, what it costs in Kenya, what compliance frameworks require it, and how to evaluate firms offering this service.
A penetration test (pentest) is a controlled, authorised attack against your IT systems, applications, or network infrastructure. The goal is to identify vulnerabilities — misconfigured servers, weak authentication, injection flaws, insecure APIs, privilege escalation paths — before a malicious actor does.
A pentest is not the same as a vulnerability scan. A vulnerability scan uses automated tools to detect known issues. A penetration test uses skilled engineers who chain vulnerabilities together, think creatively, and attempt to achieve real business impact (access to customer data, financial system compromise, ransomware deployment paths).
The output of a pentest is a detailed report containing:
Web Application Pentest Tests web applications — customer portals, internal tools, APIs, admin panels. Covers OWASP Top 10 vulnerabilities: injection, broken authentication, IDOR, SSRF, XSS, insecure deserialisation. This is the most commonly requested type for Kenyan businesses running SaaS products or customer-facing portals.
Network Infrastructure Pentest Tests your internal network, cloud infrastructure, firewalls, and server configurations. Relevant for businesses with on-premise servers, hybrid cloud environments, or complex network topologies. Identifies lateral movement paths an attacker could use after breaching the perimeter.
Mobile Application Pentest Tests Android and iOS applications. Covers insecure data storage, weak cryptography, improper session management, and backend API vulnerabilities. Required for any business with a customer-facing mobile app, particularly in financial services.
Social Engineering Assessment Tests your people, not your technology. Includes phishing simulations, vishing (voice phishing), and physical security testing. Human error accounts for over 80% of successful breaches. This type of assessment is often the most uncomfortable for leadership — but frequently the most revealing.
Red Team Exercise An advanced engagement where a skilled team attempts to achieve a specific objective (exfiltrate data, compromise a specific system) using any available method — technical, social, and physical — over an extended period. Typically 4–6 weeks. Appropriate for mature organisations with existing security programmes.
Pricing varies significantly by scope, depth, and provider quality. As a realistic benchmark:
Web Application Pentest (single application) Market range: KES 180,000 – KES 650,000 What drives cost: number of roles/user types, number of API endpoints, authentication complexity, whether source code review is included
Most Kenyan businesses discover vulnerabilities only after a breach. A professional penetration test finds them first.
Network Infrastructure Pentest Market range: KES 250,000 – KES 900,000 What drives cost: number of IP addresses in scope, network complexity, cloud vs on-premise, whether internal and external are both included
Mobile Application Pentest (single platform) Market range: KES 200,000 – KES 500,000 What drives cost: number of features, API backend complexity, whether both platforms (iOS and Android) are included
Full-Scope Assessment (web + network + social engineering) Market range: KES 600,000 – KES 2,000,000+ Appropriate for: banks, payment processors, healthcare platforms, government contractors, and any business seeking ISO 27001 certification
Beware of very low-priced pentests. A firm quoting KES 50,000 for a "penetration test" is almost certainly delivering automated scan output with a report template — not a genuine manual assessment. The gap between an automated scan and a real pentest is the difference between a checklist and an investigation.
ISO 27001 The international standard for information security management requires regular security testing as part of Annex A controls. Most enterprise procurement teams and international clients will now ask for ISO 27001 certification before signing contracts. Penetration testing is required to achieve and maintain certification.
PCI DSS (Payment Card Industry Data Security Standard) Any business that accepts, processes, stores, or transmits cardholder data must conduct penetration testing at least annually and after any significant infrastructure change. This applies to every Kenyan business using card payment terminals or processing online card payments.
CBK Cybersecurity Guidelines (Central Bank of Kenya) The Central Bank's cybersecurity guidelines for banks, microfinance institutions, and payment service providers explicitly require regular penetration testing. Regulated financial institutions face significant penalties for non-compliance.
GDPR and Kenya's Data Protection Act The Data Protection Act 2019 requires organisations to implement appropriate technical measures to protect personal data. Regular security testing is considered a technical measure. International businesses operating in Kenya and serving EU customers face the additional requirements of GDPR.
Ask for a methodology document. A reputable firm should be able to explain their testing methodology clearly: which standards they follow (OWASP, PTES, OSSTMM), what testing phases they conduct, and how they handle findings during the engagement.
Ask who will actually conduct the test. Many firms use junior staff or subcontractors for the actual testing while senior staff handle sales and reporting. Ask specifically about the experience level of the engineers who will be hands-on-keyboard.
Ask for a sample report from a previous engagement. The quality of the pentest report is one of the most important deliverables. Reports should contain: specific proof of exploitation (not just tool output), clear business impact statements, and actionable remediation steps — not generic CVSS descriptions.
Ask about responsible disclosure during the test. What happens if they find a critical vulnerability mid-engagement? You want a firm that communicates immediately rather than waiting until the final report is delivered three weeks later.
Check for certifications. Relevant certifications include OSCP (Offensive Security Certified Professional), CEH, and CREST. Not all good engineers have certifications, but certifications are a reasonable minimum signal.
Ask about retest policy. A proper engagement includes a retest after remediation to confirm that findings have been fixed. Firms that charge extra for retests or do not include them at all are not operating to a professional standard.
Daf-Devs provides penetration testing services from our team of certified security engineers based in Nairobi and London. All engagements are conducted manually by senior engineers — we do not resell automated scan output.
Our testing covers:
All testing is scoped precisely to your environment. We provide a detailed findings report with proof-of-concept evidence, business impact analysis, and prioritised remediation guidance. Retests are included in every engagement.
We also support ISO 27001 certification journeys, providing both the testing evidence required and the documentation support needed to achieve certification.
Request a penetration test scoping call →
Daf-Devs provides penetration testing and cybersecurity services to businesses across Kenya and East Africa. ISO 27001 certified. Based in Nairobi and London. Get a quote →
Our team can help you design and deliver software, security infrastructure, and automation solutions.
Subscribe to our newsletter and get weekly engineering insights, security research, and case studies with real ROI numbers delivered straight to your inbox.
Join 1,000+ professionals. No spam, unsubscribe anytime.
Investors scrutinize security. Learn the critical vulnerabilities that could derail your funding round and how to fix them before due diligence begins.
Protect your APIs from attacks and abuse. Comprehensive guide to authentication, rate limiting, and security headers with implementation examples.
Complete cybersecurity checklist for SaaS startups and enterprises. Cover all security bases: authentication, data protection, compliance, infrastructure, and incident response.