TS 13638 is the Turkish Standards Institute’s framework that standardizes how penetration testing services are delivered. Many public and private sector RFPs in Turkey require “TS 13638 compliant penetration testing”; few buyers understand the difference clearly.
What TS 13638 Is — and Is Not
TS 13638-1 “Information technology — Security technique — Penetration testing” defines the planning, discovery, scanning, exploitation, and reporting stages of a penetration test. It is less a methodological framework like OWASP, and more a service quality and reporting standard.
OWASP says “what to check”; TS 13638 says “how to work and how to report.” They complement each other.
Differences from a Standard Penetration Test
1. Scope Document Required
A signed scope document is mandatory before a TS 13638-compliant test. Without target IPs, allowed techniques, working hours, and signed “break authorization” matrix for critical systems, the test does not start.
2. Team Qualification Disclosed
The test team’s certifications (OSCP, CEH, CISSP, GPEN, etc.) and reference projects are shared with the client. TS 13638 defines personnel competence as an auditable criterion.
3. Standardized Reporting Format
Executive summary, technical findings, evidence appendices (screenshots, logs), CVSS-scored prioritization, remediation recommendation, and retest schedule are required sections. Many firms “produce a report” but a TS 13638 report runs 30-50 pages minimum, with traceable evidence chain.
4. Data Privacy and Retention
Retention, sharing, and destruction rules for data obtained during the test are defined contractually. Directly overlaps with GDPR (KVKK).
5. Retest Obligation
Retest service after a finding is fixed is part of the standard — not optional. This turns the penetration test from “an annual formality” into a real security improvement cycle.
7 Questions for the Buyer
- Does the test provider have a documented TS 13638 methodology compliance statement?
- Was the scope document signed before testing began?
- Were the team’s certifications (OSCP, CEH, etc.) shared?
- Does the report conform to executive summary + technical findings + evidence appendix format?
- Are findings scored using CVSS v3.1?
- Are remediation recommendations actionable (concrete, sequenced, owner-assigned)?
- Is retest included or charged separately?
Common Misconceptions
Myth 1: “OWASP is enough, TS 13638 is redundant”
OWASP is a technical methodology, TS 13638 is a service quality standard. They occupy different domains. If a service claims TS 13638 compliance, it means it adds Turkish-standard-aligned reporting and process management on top of OWASP.
Myth 2: “TS 13638 is only for the public sector”
Private sector entities can also present a TS 13638 report as admissible evidence during audits and regulatory compliance processes (BDDK, EPDK, KVKK). It is the preferred standard in finance, energy, health, and telecom sectors.
Kritera’s TS 13638 Approach
All our penetration testing services are delivered with TS 13638-compliant reporting standards. Our OSCP and CISSP certified team applies OWASP methodology within the TS 13638 service framework. Retest is a standard part of every contract.