Why the Confusion Exists
These three terms are used interchangeably in marketing materials, sales pitches, and even some contracts. This causes real problems. An organisation that needs a red team engagement but buys a vulnerability assessment will be disappointed. A company that pays for a red team when a penetration test would suffice has wasted money. And a firm that runs vulnerability scans and believes it has been "pentested" is operating with a false sense of security.
Let us define each precisely, compare them head-to-head, and help you decide which one your organisation needs.
Vulnerability Assessment: The Foundation
What It Is
A vulnerability assessment is a systematic, largely automated process of identifying known vulnerabilities in your systems, networks, and applications. The primary tool is a vulnerability scanner (Nessus, Qualys, OpenVAS, or similar) that probes your environment against a database of known vulnerabilities (CVEs) and configuration weaknesses.
What It Delivers
- A comprehensive list of known vulnerabilities across your environment
- Severity ratings (typically CVSS scores) for each finding
- Remediation guidance (usually generic, scanner-generated)
- Broad coverage: every host and service is checked
What It Does Not Do
- Does not attempt to exploit vulnerabilities (no proof of concept)
- Does not chain vulnerabilities together to demonstrate real attack paths
- Does not test business logic, human factors, or physical security
- Does not assess the actual business impact of a vulnerability
- High false positive rate that requires manual verification
When to Use It
Vulnerability assessments should be run continuously or at least monthly. They are the baseline hygiene check for your environment, similar to a regular health screening. Every organisation should be doing this, regardless of size.
Typical Cost
EUR 2,000 - 5,000 per scan for an external assessment, depending on scope. Many organisations bring this in-house using tools like OpenVAS (free) or Nessus (approximately EUR 3,000/year for a professional licence).
Penetration Testing: The Deep Dive
What It Is
A penetration test is a time-boxed, objective-driven exercise where skilled human testers attempt to exploit vulnerabilities in your environment. Unlike a vulnerability assessment, the tester goes beyond identification to actively demonstrate exploitation, chaining multiple vulnerabilities together to achieve defined objectives such as accessing sensitive data, compromising administrative accounts, or reaching critical internal systems.
What It Delivers
- Proof that specific vulnerabilities are exploitable in your specific environment
- Demonstration of attack chains: how multiple lower-severity issues combine into a critical risk
- Business-context risk assessment: not just "this is vulnerable" but "this is what an attacker could achieve"
- Manual testing that catches logic flaws, configuration errors, and vulnerabilities that scanners miss
- Prioritised, actionable remediation recommendations tailored to your environment
What It Does Not Do
- Does not fully test your detection and response capabilities (testers are typically not trying to be stealthy)
- Does not simulate a persistent, well-resourced adversary over an extended period
- Scope is defined and constrained; real attackers have no scope limits
- Usually does not include social engineering or physical intrusion (unless specifically scoped)
When to Use It
Annually at minimum. More frequently for high-risk environments, after major infrastructure changes, before significant product launches, and when required by regulation (CSSF, PCI DSS, NIS2).
Typical Cost
EUR 8,000 - 25,000 for a focused engagement (single application or network segment). EUR 20,000 - 50,000 for a comprehensive assessment covering external, internal, and application layers.
Red Team Engagement: The Adversary Simulation
What It Is
A red team engagement is an objective-based adversary simulation that tests an organisation's overall security posture, including its people, processes, and technology. Red teamers operate covertly, using the same tactics, techniques, and procedures (TTPs) as real-world threat actors relevant to the target. The goal is not to find as many vulnerabilities as possible but to achieve specific objectives, such as accessing the crown jewels, while testing the organisation's ability to detect and respond.
What It Delivers
- A realistic assessment of how your organisation would fare against a determined, skilled adversary
- Testing of your entire security ecosystem: technical controls, monitoring (SOC/SIEM), incident response, physical security, and human awareness
- Identification of gaps in detection and response capabilities, not just prevention
- An attack narrative that tells the story of how an adversary could compromise your organisation end-to-end
- Strategic recommendations for improving overall security resilience
What It Does Not Do
- Does not provide comprehensive vulnerability coverage (the red team follows the path of least resistance, not every possible path)
- May not find all vulnerabilities in your environment (that is not the objective)
- Not appropriate for organisations that have not yet addressed basic security hygiene
When to Use It
When your organisation has a mature security programme with established monitoring, incident response procedures, and a reasonable control baseline. If you are still patching critical vulnerabilities found in your last pentest, you are not ready for a red team. Red teaming should test a security programme that believes it is working well.
Typical Cost
EUR 30,000 - 100,000+ depending on scope, duration (typically 4-8 weeks), and objectives. This is significantly more expensive because it requires more senior testers, longer engagement periods, custom tooling, and often includes physical and social engineering components.
Head-to-Head Comparison
| Attribute |
Vulnerability Assessment |
Penetration Test |
Red Team |
| Primary Goal |
Find known vulnerabilities |
Demonstrate exploitability |
Test overall security resilience |
| Approach |
Automated + manual review |
Manual + automated support |
Manual, adversary-simulated |
| Stealth |
None (noisy scans) |
Low (testers known to IT) |
High (covert operation) |
| Scope |
Broad (entire environment) |
Defined (specific targets) |
Objective-based (any path to goal) |
| Duration |
1-5 days |
1-4 weeks |
4-8 weeks |
| Tests Detection? |
No |
Partially |
Yes (primary purpose) |
| Social Engineering? |
No |
Only if scoped |
Typically included |
| Physical Testing? |
No |
No |
Often included |
| Cost Range |
EUR 2,000 - 5,000 |
EUR 8,000 - 50,000 |
EUR 30,000 - 100,000+ |
| Organisation Maturity Required |
Any |
Basic controls in place |
Mature security programme |
| Frequency |
Monthly / continuous |
Annual / after changes |
Annual or bi-annual |
Which One Do You Need?
The answer depends on your security maturity, regulatory requirements, and what questions you need answered.
You need a vulnerability assessment if:
- You have never conducted any security testing
- You want to establish a baseline understanding of your vulnerability landscape
- You need to meet a basic compliance checkbox
- You want ongoing, continuous visibility into new vulnerabilities
You need a penetration test if:
- You run regular vulnerability scans and remediate findings, but want to understand what an attacker could actually achieve
- You need to validate that critical controls are effective (not just present)
- Regulation requires it (CSSF, PCI DSS, NIS2)
- You are deploying a new application or major infrastructure change
- You want actionable, prioritised findings specific to your environment
You need a red team engagement if:
- You have a security operations centre (SOC) and want to test its detection capabilities
- You have invested significantly in security controls and want to validate the overall programme
- Your board or executive team needs a realistic view of organisational risk
- You want to test incident response procedures under realistic conditions
- You operate in a high-threat environment (critical infrastructure, financial services, defence)
How They Work Together
These are not competing services. They are complementary layers of a mature security testing programme:
- Vulnerability assessments provide continuous, broad coverage. They catch the known vulnerabilities and configuration issues quickly and efficiently.
- Penetration tests provide depth. They validate that critical vulnerabilities are real, demonstrate business impact, and find issues that scanners miss.
- Red team engagements provide realism. They test the entire security ecosystem, including the people and processes, against a simulated adversary.
A well-structured annual security testing programme for a mid-sized Luxembourg organisation might include continuous vulnerability scanning, an annual penetration test (rotating focus between external, internal, and application each year), and a red team engagement every two to three years.
The maturity progression: Start with vulnerability assessments. Once you are consistently remediating findings and have basic security controls in place, add penetration testing. Once your security programme is established and you have detection and response capabilities, introduce red teaming. Skipping steps wastes money and produces findings you are not yet equipped to act on.
Common Misconceptions
Several persistent myths cloud decision-making around security testing. Let us address the most damaging ones:
"We had a pentest, so we know we are secure." A penetration test is a point-in-time assessment. It tells you what a tester found during a specific window, given specific scope constraints. It does not mean there are no other vulnerabilities. New vulnerabilities are disclosed daily, configurations change, and attackers have unlimited time. A pentest is a health check, not a clean bill of health.
"Automated scanning is as good as a penetration test." Automated scanners are excellent at finding known vulnerabilities in common software. They are poor at identifying business logic flaws, chaining low-severity issues into critical attack paths, testing custom applications, and evaluating the real-world exploitability of a finding in your specific environment. The human tester adds contextual judgment that no scanner can replicate.
"We are too small for a red team." Size is not the primary factor. Readiness is. A 50-person company with a mature security programme, a SOC, and established incident response procedures can benefit enormously from a red team engagement. A 5,000-person company that has not yet addressed the critical findings from its last vulnerability scan should not be spending money on red teaming.
"The cheapest option is good enough." In security testing, you get what you pay for. A low-cost "penetration test" that is actually an automated scan with a report wrapper provides a false sense of security that is worse than no testing at all. It creates complacency without delivering genuine insight. Invest appropriately or defer until you can.
Questions to Ask Your Provider
Regardless of which service you choose, ask these questions before signing a contract:
- What methodology do you follow? (Expect references to PTES, OWASP, TIBER-EU for red teaming)
- What certifications do your testers hold? (OSCP, GPEN, CREST for pentesters; additional for red team)
- Can you provide a sample report? (Quality varies enormously)
- How do you handle critical findings discovered during testing? (Immediate notification is the right answer)
- Is retesting included? (It should be, at least for critical findings)
- What is the ratio of automated to manual testing? (For pentests, expect predominantly manual)
- Do you carry professional indemnity insurance?
The right testing approach, properly scoped and well executed, is one of the highest-value investments you can make in your security programme. The wrong one is an expensive way to generate a report that nobody reads.