Penetration test from the perspective of an external and internal attacker of a communication platform that enables reliable and secure message delivery between two endpoints. Review of the security-relevant configuration of application components and the systems on which the components run. Moreover, unprivileged penetration test of other systems connected to the communication platform.