Penetration Testing Scoping Logo
  • Penetration Testing Scoping

  • Contact information

  • Overview

  • Penetration testing will never be an exact science where a complete list of all possible issues that should be tested can be defined. Our methodology aligns with the OWASP Testing Framework Part One (http://www.owasp.org) and Risk Management Guide for Information Technology Systems, NIST 800-30 1 which describes vulnerabilities in operational, technical and management categories. External Network/Infrastructure, Web, Application, and API penetration testing are essential for all compliance frameworks (ISO 27001, SOC 2, PCI DSS, NIST, HITRUST, etc.). Our services and reporting options not only help you meet your compliance requirements and satisfy your auditing team but also enhance your security posture, benefiting your organization and clients.  However, the goal is to find the right balance to provide a level of testing matching a realistic threat without wasting time and resources. There are two (2) main factors we consider: 1. Optimum effort (time) required for the security assessment and 2. Client’s cybersecurity budget.  The following four (4) sections will help develop the Scope of the Penetration Test. (https://mccoe.org/penetration-testing).

  • I. What are your organizational goals and Objectives for the penetration test?

  • II. What is the scope of this engagement?

  • b. Network Vulnerability Assessment (NVA)

  • c. Web Application

  • d. Mobile Application

  • e. Social Engineering

  • f. Operational Technology (OT)

  • g. Additional Coordination Information:

  • III. Time Scheduling

    Note: Characterized in terms of overall time limitations, of how many day/weeks/months the engagement will last, as well as time schedules.
  • 1. Requested Period of Engagement:

    (4–8 Weeks)
  •  - -
  •  - -
  • IV. What are the emergency Lines of communication?

  • Should be Empty: