Where your pentest findings live
is a security decision

Where that data lives and who controls the infrastructure deserve the same rigor as the pentest itself.
Dradis is self-hosted and open-source, so your findings stay on your infrastructure, and you can verify that by reading the code.

Pentest findings are blueprints for compromise, not generic business data.

Cloud platforms aggregating findings are high-value targets for supply chain attacks.

Self-hosted: the vendor cannot be breached for data they never received.

Open-source: verify the data residency claim yourself by reading the code.

Used by pentest teams in more than 75 countries.

Pentest data is not normal data

Most data governance treats all sensitive data as roughly equivalent:
PII here, financial records there. Pentest data breaks that model.

Healthcare network assessment

Exactly how to access patient records, disable medical device monitoring, and move laterally through the network.

Critical infrastructure pentest

SCADA system access points, authentication weaknesses, and network segmentation gaps for a power utility.

Payment platform test

Proof-of-concept exploits for the transaction processing system of a financial services platform.

These are not records that need "protection" in the same way a customer database does.

In the wrong hands, they enable the specific attacks they describe. Where this data lives is not a policy decision -- it is an architectural one.

The vendor-as-target problem

A SaaS tool serving hundreds of security teams aggregates the exact vulnerabilities, attack paths, and exploitation evidence for every organization those teams have tested. Government agencies.

The question is not whether any specific cloud vendor has been breached. Absence from public breach records is not evidence of security.

The relevant question is: what resources does a single SaaS company command relative to the resources of a well-funded nation-state actor motivated by what that company holds?

Supply chain risk

MITRE ATT&CK: T1195.002 (Compromise Software Supply Chain), T1199 (Trusted Relationship)

NIST SP 800-161: Supply chain risk management requires architectural controls, not vendor assurances alone.

Self-hosted elimination: The vendor cannot be breached for data they never received.

Supply chain risk management cannot rely on vendor assurances alone. It requires architectural controls that limit exposure regardless of vendor behaviour.

Three architectures, three risk profiles

Cloud SaaS

What you get: Zero infrastructure overhead. Fastest time to value.

What you accept: The vendor has access to your data. Their infrastructure is a target. A breach exposes every customer's findings.

When appropriate: Limited infrastructure capacity, low regulatory exposure, findings that would not cause catastrophic harm if exposed.

Self-hosted, proprietary

What you get: Full data residency control. No vendor access to findings. No cross-border transfer risk.

What you accept: Infrastructure overhead. Proprietary code means you cannot verify what the software does with your data.

When appropriate: Data residency control needed, but source code audit is not a procurement requirement.

Self-hosted, open-source

What you get: Data residency control plus verifiability. Your team can audit the code and confirm no data leaves the environment.

What you accept: Same infrastructure overhead as self-hosted proprietary. Open-source does not mean zero-cost.

When appropriate: Regulated enterprises, government agencies, defence contractors, and any team whose procurement values supply chain risk.

Self-hosted and open-source since 2007

Your pentest findings stay on your infrastructure. Your team can audit every line of code.
Deploy on your servers, your private cloud, or fully air-gapped with no internet connection.

See How It Works

Air-gapped and restricted environments

No internet required

Full functionality after installation with no connectivity.

No telemetry

No phone-home, no usage data, no update pings.

Offline activation

License activation without internet access.

Local user management

No dependency on cloud-based SSO or identity providers.

No feature degradation

Every feature works identically in air-gapped mode.

Dradis supports fully air-gapped deployment with offline license activation and zero internet connectivity requirements.

Frequently asked questions

Pentest data sovereignty is the principle that the organization commissioning or conducting a penetration test maintains complete control over where findings are stored, who can access them, and under what jurisdiction they fall.

Unlike generic business data, pentest findings are detailed blueprints for compromising the target infrastructure, which makes their governance a security problem, not just a compliance one.

Yes. A cloud SaaS platform with SOC 2 Type II, ISO 27001, and a well-structured DPA that specifies data residency can be appropriate for teams with limited infrastructure capacity, low regulatory exposure, and findings that would not cause catastrophic harm if exposed.

The decision depends on the sensitivity of the data, the regulatory environment, and the organization's tolerance for the residual risk that comes with any third-party data processing relationship.

Under GDPR Article 28, using a cloud SaaS tool means the vendor is a data processor, requiring a Data Processing Agreement, ongoing processor assessment, sub-processor documentation, and a breach notification chain.

Self-hosted deployment eliminates the data processing relationship entirely -- the organization is both controller and sole processor. There is no DPA to negotiate, no sub-processor chain to audit, and no processor breach notification dependency.

Open-source matters because it makes the data residency claim verifiable. A proprietary self-hosted tool can claim that no data leaves the environment, but you cannot independently confirm it without source access.

With open-source software, any customer, auditor, or regulator can inspect the code and verify that no telemetry, usage data, or findings are transmitted externally. Regulated buyers in government and defence procurement routinely require source code access as a condition of tooling approval.

Air-gapped environments -- classified facilities, defence contractors, secure government networks -- require platforms that function with zero internet connectivity. This means no license check pings, no update downloads, no telemetry, and no dependency on cloud-based authentication.

Cloud SaaS tools cannot operate in these environments. Self-hosted tools that support fully offline operation, including offline license activation and local user management, are the only option. Dradis supports fully air-gapped deployment with no internet connectivity requirements.

No. Ghostwriter is an open-source alternative that also supports self-hosted deployment, but for Red Teams.

Dradis has been self-hosted and open-source since 2007, supports fully air-gapped deployment, and is designed so that knowledge compounds across different types of security engagements permanently on your infrastructure. The comparison of pentest report generators breaks down the trade-offs in detail.

Start owning audityour own data with Dradis

Seven Strategies To Differentiate Your Cybersecurity Consultancy

You don’t need to reinvent the wheel to stand out from other cybersecurity consultancies. Often, it's about doing the simple things better, and clearly communicating what sets you apart.

  • Tell your story better
  • Improve your testimonials and case studies
  • Build strategic partnerships

Loading form...

Your email is kept private. We don't do the spam thing.