Employ an independent penetration testing agent or team to perform penetration testing on the system or system components.