SlideShare a Scribd company logo
2
Most read
DAVE BSWEIGERT, CISA, CISSP, HCISSP, PMP, SEC+ PEN TESTING ENGAGEMENTT
SAMPLE PENETRATION TESTING ENGAGEMENT LETTER
PARTIES
This document formalizes the relationship between the two parties; herein known as the TESTER and
the entity that owns and operates the TARGET OF EVALUATION (TOE).
THE TESTER is a consulting and professional services entity that shall perform an operational check of
the TOE. This operational check shall be focused on the security vulnerabilities embedded with the
Information Technology (IT) core infrastructure of the TOE. The TESTER will use tools as identified as
leading industry practices to measure the vulnerabilities associated with various configurations of IT
core infrastructure with the TOE.
THE TOE OWNER is the entity that leases, operates, controls or maintains the TOE. The TOE OWNER
warrants that it has the authority and responsibility to authorize testing of the TOE. Such testing may
include evaluations of the vulnerabilities that may reside in IT core infrastructure appliances, servers,
cloud based systems, etc.
SCOPE STATEMENT
The parties agree to define a mutual SCOPE STATEMENT that shall define the general parameters of the
testing to be executed. Such parameters should define tangible and measurable boundaries that carve
out the IT core infrastructure that shall comprise the TOE. For example, Internet Protocol (IP) address
ranges, identification of servers (by system name and IP address), exposed web servers to be tested for
application level vulnerabilities, identification of infrastructure appliances that shall be test for routing
and networking vulnerabilities, wireless (Wi-Fi) access points that shall be test, remote access points
(RADIUS, dial-in, VPN, etc.).
The scope statement shall identify associated and ancillary infrastructure that is relied upon by the TOE
owner; but, may not have formal permission to commit to such testing. Example of ancillary
infrastructure may include supporting Internet-based domain name services (DNS), I.P. routing,
application-level firewalls maintained to filter out Web-based attacks, infrastructure maintained by an
Internet Services Provider (ISP) or cable company, etc. All such infrastructure that is not under the
direct control of the TOE OWNER shall be identified and included in the scope statement to allow for
arrangements to be made with such infrastructure providers.
RULES OF ENGAGEMENT
A separate formalized document shall be agreed upon that describes the rules of engagement (ROE)
that shall govern the execution. ROE shall cover the impact and magnitude of testing, types of testing to
be conducted, interactions with TOE OWNERS employees, consultants and ancillary experts. Thresholds
of activity to include when notification to the TOE OWNER Project manager is necessary, etc. ROE also
provides the protocols for addressing concerns and issue of a human resource and personnel issue
(cooperation of employees, social engineering tests, red team tests, etc.).
©2015
DAVE BSWEIGERT, CISA, CISSP, HCISSP, PMP, SEC+ PEN TESTING ENGAGEMENTT
IDENTIFICATION OF PROJECT PERSONNEL
Relevant personnel shall be identified with their roles and responsibilities clarified. An example of such
roles are included below:
TOE PROJECT
MANAGER
Telephone, cell, text, email Provide overall coordination and scheduling of
resources
PEN TESTER LEAD Telephone, cell, text, email Lead interface on technical issues regarding test
Identification of personnel shall also include alternates and back-ups to provide coverage for individuals
that may be absent, in training, on vacation, etc. Escalation procedures should also outline the
notification of relevant personnel during the testing process. This may include security officer,
continuity of operations officer, data center manager, etc.
BEST INDUSTRY PRACTICES
THE TESTER shall rely on those industry practices that appear to be in common use to identify
vulnerabilities within the IT core infrastructure of the TOE OWNER. Such practices are defined by the
National Institute of Standards and Technology (NIST), Payment card Industry Data Security Standard
(PCIDSS), etc. Tools and techniques will be relied upon that appear to have a stable basis of usage
among the industry and have been vetted by other professional groups and practitioners. Such tools
may include NMAP, HPING, SNORT, JOHN THE RIPPER, NETCAT, etc.
EXPLOITATION OF SYSTEMS
Pursuant to the scope stamen and ROE, the TESTER may be required to exploits the operating systems
(O/S) of identified platforms. This may require the exploitation of the Windows O/S, LINUX/UNIX O/S,
etc. TESTER shall take reasonable precautions to limit the acquisition of sensitive data by testing
personnel after a successful exploit; e.g. review, recording, editing and/or capture of Protected Health
Information (PHI) or credit card data. THE TOE OWNER agrees that such acquisition (reading, capture,
review, observation) of protected and sensitive data represents limited an incidental exposure of the
data. Such limitation and incidental exposure describes what sensitive data might be observed by a
service technician, system administrator, network technician, etc. THE TOE OWNER represents and
warrants that such inadvertence, incidental exposure shall not result in the reporting of the TESTER to
the Office of Civil Rights (U.S. Department of Health and Human Services [DHHS]) as an entity that
breached and/or malicious acquired PHI.
INCIDENT ESCALATION
THE TOE OWNERS will ensure that appropriate managers and directors that oversee the operations of
critical applications are involved and notified of such testing activities. THE TOE OWNER will make
arrangements for emergency fallback and restoral activities in the event that testing activities directly
and/or indirectly cause degradation to services, response times, data integrity and/or other
measurements of degraded service. THE TOE OWNER will have policies and procedures in place that
provide for the emergency escalation and incident management of systems that appear to be impacted
(directly or indirectly) buy testing activities.
© 2015

More Related Content

DOCX
Sap template 050312
PPTX
Vulnerability assessment & Penetration testing Basics
PDF
Sample network vulnerability analysis proposal
PPTX
Code injection
PDF
Penetration Testing Execution Phases
PPTX
Penetration Testing
PPT
Module 2 Foot Printing
PPT
basic knowhow hacking
Sap template 050312
Vulnerability assessment & Penetration testing Basics
Sample network vulnerability analysis proposal
Code injection
Penetration Testing Execution Phases
Penetration Testing
Module 2 Foot Printing
basic knowhow hacking

What's hot (20)

PPTX
Web Application Penetration Testing Introduction
PDF
Sosyal Medyada Anonim Hesaplar Nasıl Tespit Edilir? - NETSEC
PDF
Penetration testing web application web application (in) security
PDF
Web Application Penetration Testing
PPT
Penetration Testing Basics
PDF
OWASP Top 10 Vulnerabilities - A5-Broken Access Control; A6-Security Misconfi...
PPTX
Secure Code Warrior - CRLF injection
PPTX
Pen Testing Explained
PDF
Introduction to Web Application Penetration Testing
PPTX
Spyware presentation by mangesh wadibhasme
PPTX
Ethical Hacking n VAPT presentation by Suvrat jain
PPT
The Security Vulnerability Assessment Process & Best Practices
PPTX
Footprinting and reconnaissance
PPT
Introduction to Web Application Penetration Testing
PPTX
Presentation of Social Engineering - The Art of Human Hacking
PPTX
Vulnerability Assessment and Penetration testing
PDF
Attacker's Perspective of Active Directory
PPTX
Introduction To Vulnerability Assessment & Penetration Testing
PPTX
Outlook and Exchange for the bad guys
PPTX
Reconnaissance - For pentesting and user awareness
Web Application Penetration Testing Introduction
Sosyal Medyada Anonim Hesaplar Nasıl Tespit Edilir? - NETSEC
Penetration testing web application web application (in) security
Web Application Penetration Testing
Penetration Testing Basics
OWASP Top 10 Vulnerabilities - A5-Broken Access Control; A6-Security Misconfi...
Secure Code Warrior - CRLF injection
Pen Testing Explained
Introduction to Web Application Penetration Testing
Spyware presentation by mangesh wadibhasme
Ethical Hacking n VAPT presentation by Suvrat jain
The Security Vulnerability Assessment Process & Best Practices
Footprinting and reconnaissance
Introduction to Web Application Penetration Testing
Presentation of Social Engineering - The Art of Human Hacking
Vulnerability Assessment and Penetration testing
Attacker's Perspective of Active Directory
Introduction To Vulnerability Assessment & Penetration Testing
Outlook and Exchange for the bad guys
Reconnaissance - For pentesting and user awareness
Ad

Similar to Sample penetration testing agreement for core infrastructure (20)

PDF
Unraveling the Confusion Surrounding the Purpose of Penetration Tests
PPTX
Overview of Penetration Testing (3).pptx
PDF
Penetration Testing and Vulnerability Assessments: Examining the SEC and FINR...
PPTX
CompTIA PenTest+ Exam (PT0-001) Exam Review
PPTX
CompTIA PenTest+ BETA EXAM CODE PT1-001
PPTX
NETWORK PENETRATION TESTING
PPTX
Module 2 Threat Management and Cybersecurity Resources (1).pptx
PDF
What is Penetration & Penetration test ?
PDF
pentration testing.pdf
PDF
Security Controls Evaluation Testing And Assessment Handbook Johnson
PPT
cyber sec.ppt
PDF
Security controls evaluation testing and assessment handbook 1st Edition Johnson
PDF
Securing Servers: A Guide to Penetration Testing
PPTX
Why Pentesting is Vital to the Modern DoD Workforce
PPTX
Introduction to penetration testing
PDF
Asegurarme de la Seguridad?, Un Vistazo al Penetration Testing
PDF
Defending The Castle Rwsp
PDF
WTF is Penetration Testing
PDF
Medical Device Cyber Testing to Meet FDA Requirements
 
DOCX
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Unraveling the Confusion Surrounding the Purpose of Penetration Tests
Overview of Penetration Testing (3).pptx
Penetration Testing and Vulnerability Assessments: Examining the SEC and FINR...
CompTIA PenTest+ Exam (PT0-001) Exam Review
CompTIA PenTest+ BETA EXAM CODE PT1-001
NETWORK PENETRATION TESTING
Module 2 Threat Management and Cybersecurity Resources (1).pptx
What is Penetration & Penetration test ?
pentration testing.pdf
Security Controls Evaluation Testing And Assessment Handbook Johnson
cyber sec.ppt
Security controls evaluation testing and assessment handbook 1st Edition Johnson
Securing Servers: A Guide to Penetration Testing
Why Pentesting is Vital to the Modern DoD Workforce
Introduction to penetration testing
Asegurarme de la Seguridad?, Un Vistazo al Penetration Testing
Defending The Castle Rwsp
WTF is Penetration Testing
Medical Device Cyber Testing to Meet FDA Requirements
 
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Ad

More from David Sweigert (20)

PDF
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
PDF
Law Enforcement Cyber Incident Reporting
PDF
Sample Network Analysis Report based on Wireshark Analysis
PDF
National Cyber Security Awareness Month poster
PDF
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
PDF
National Cyber Security Awareness Month - October 2017
PDF
California Attorney General Notification Penal Code 646.9
PDF
Congressional support of Ethical Hacking and Cyber Security
PDF
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
PDF
Application of Racketeering Law to Suppress CrowdStalking Threats
PDF
Canada Communications Security Establishment - Threat Vector Chart
DOCX
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
PDF
Cyber Incident Response Team NIMS Public Comment
PDF
Cyber Incident Response Team - NIMS - Public Comment
PDF
National Incident Management System (NIMS) NQS DRAFT
PDF
National Incident Management System - NQS Public Feedback
DOCX
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
PDF
National Preparedness Goals 2015 2nd edition
PDF
Healthcare Sector-wide Disaster Prepardness Plan
PDF
Cyber Risk Assessment for the Emergency Services Sector - DHS
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
Law Enforcement Cyber Incident Reporting
Sample Network Analysis Report based on Wireshark Analysis
National Cyber Security Awareness Month poster
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
National Cyber Security Awareness Month - October 2017
California Attorney General Notification Penal Code 646.9
Congressional support of Ethical Hacking and Cyber Security
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
Application of Racketeering Law to Suppress CrowdStalking Threats
Canada Communications Security Establishment - Threat Vector Chart
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Cyber Incident Response Team NIMS Public Comment
Cyber Incident Response Team - NIMS - Public Comment
National Incident Management System (NIMS) NQS DRAFT
National Incident Management System - NQS Public Feedback
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
National Preparedness Goals 2015 2nd edition
Healthcare Sector-wide Disaster Prepardness Plan
Cyber Risk Assessment for the Emergency Services Sector - DHS

Recently uploaded (20)

PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PPTX
PptxGenJS_Demo_Chart_20250317130215833.pptx
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PPTX
Introuction about WHO-FIC in ICD-10.pptx
PPTX
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
PPT
tcp ip networks nd ip layering assotred slides
PDF
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PDF
Decoding a Decade: 10 Years of Applied CTI Discipline
PPTX
CSharp_Syntax_Basics.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxx
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PDF
Testing WebRTC applications at scale.pdf
PPTX
Module 1 - Cyber Law and Ethics 101.pptx
Cloud-Scale Log Monitoring _ Datadog.pdf
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PptxGenJS_Demo_Chart_20250317130215833.pptx
Slides PDF The World Game (s) Eco Economic Epochs.pdf
introduction about ICD -10 & ICD-11 ppt.pptx
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
Unit-1 introduction to cyber security discuss about how to secure a system
Introuction about WHO-FIC in ICD-10.pptx
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
RPKI Status Update, presented by Makito Lay at IDNOG 10
tcp ip networks nd ip layering assotred slides
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
Tenda Login Guide: Access Your Router in 5 Easy Steps
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
Decoding a Decade: 10 Years of Applied CTI Discipline
CSharp_Syntax_Basics.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxx
An introduction to the IFRS (ISSB) Stndards.pdf
Testing WebRTC applications at scale.pdf
Module 1 - Cyber Law and Ethics 101.pptx

Sample penetration testing agreement for core infrastructure

  • 1. DAVE BSWEIGERT, CISA, CISSP, HCISSP, PMP, SEC+ PEN TESTING ENGAGEMENTT SAMPLE PENETRATION TESTING ENGAGEMENT LETTER PARTIES This document formalizes the relationship between the two parties; herein known as the TESTER and the entity that owns and operates the TARGET OF EVALUATION (TOE). THE TESTER is a consulting and professional services entity that shall perform an operational check of the TOE. This operational check shall be focused on the security vulnerabilities embedded with the Information Technology (IT) core infrastructure of the TOE. The TESTER will use tools as identified as leading industry practices to measure the vulnerabilities associated with various configurations of IT core infrastructure with the TOE. THE TOE OWNER is the entity that leases, operates, controls or maintains the TOE. The TOE OWNER warrants that it has the authority and responsibility to authorize testing of the TOE. Such testing may include evaluations of the vulnerabilities that may reside in IT core infrastructure appliances, servers, cloud based systems, etc. SCOPE STATEMENT The parties agree to define a mutual SCOPE STATEMENT that shall define the general parameters of the testing to be executed. Such parameters should define tangible and measurable boundaries that carve out the IT core infrastructure that shall comprise the TOE. For example, Internet Protocol (IP) address ranges, identification of servers (by system name and IP address), exposed web servers to be tested for application level vulnerabilities, identification of infrastructure appliances that shall be test for routing and networking vulnerabilities, wireless (Wi-Fi) access points that shall be test, remote access points (RADIUS, dial-in, VPN, etc.). The scope statement shall identify associated and ancillary infrastructure that is relied upon by the TOE owner; but, may not have formal permission to commit to such testing. Example of ancillary infrastructure may include supporting Internet-based domain name services (DNS), I.P. routing, application-level firewalls maintained to filter out Web-based attacks, infrastructure maintained by an Internet Services Provider (ISP) or cable company, etc. All such infrastructure that is not under the direct control of the TOE OWNER shall be identified and included in the scope statement to allow for arrangements to be made with such infrastructure providers. RULES OF ENGAGEMENT A separate formalized document shall be agreed upon that describes the rules of engagement (ROE) that shall govern the execution. ROE shall cover the impact and magnitude of testing, types of testing to be conducted, interactions with TOE OWNERS employees, consultants and ancillary experts. Thresholds of activity to include when notification to the TOE OWNER Project manager is necessary, etc. ROE also provides the protocols for addressing concerns and issue of a human resource and personnel issue (cooperation of employees, social engineering tests, red team tests, etc.). ©2015
  • 2. DAVE BSWEIGERT, CISA, CISSP, HCISSP, PMP, SEC+ PEN TESTING ENGAGEMENTT IDENTIFICATION OF PROJECT PERSONNEL Relevant personnel shall be identified with their roles and responsibilities clarified. An example of such roles are included below: TOE PROJECT MANAGER Telephone, cell, text, email Provide overall coordination and scheduling of resources PEN TESTER LEAD Telephone, cell, text, email Lead interface on technical issues regarding test Identification of personnel shall also include alternates and back-ups to provide coverage for individuals that may be absent, in training, on vacation, etc. Escalation procedures should also outline the notification of relevant personnel during the testing process. This may include security officer, continuity of operations officer, data center manager, etc. BEST INDUSTRY PRACTICES THE TESTER shall rely on those industry practices that appear to be in common use to identify vulnerabilities within the IT core infrastructure of the TOE OWNER. Such practices are defined by the National Institute of Standards and Technology (NIST), Payment card Industry Data Security Standard (PCIDSS), etc. Tools and techniques will be relied upon that appear to have a stable basis of usage among the industry and have been vetted by other professional groups and practitioners. Such tools may include NMAP, HPING, SNORT, JOHN THE RIPPER, NETCAT, etc. EXPLOITATION OF SYSTEMS Pursuant to the scope stamen and ROE, the TESTER may be required to exploits the operating systems (O/S) of identified platforms. This may require the exploitation of the Windows O/S, LINUX/UNIX O/S, etc. TESTER shall take reasonable precautions to limit the acquisition of sensitive data by testing personnel after a successful exploit; e.g. review, recording, editing and/or capture of Protected Health Information (PHI) or credit card data. THE TOE OWNER agrees that such acquisition (reading, capture, review, observation) of protected and sensitive data represents limited an incidental exposure of the data. Such limitation and incidental exposure describes what sensitive data might be observed by a service technician, system administrator, network technician, etc. THE TOE OWNER represents and warrants that such inadvertence, incidental exposure shall not result in the reporting of the TESTER to the Office of Civil Rights (U.S. Department of Health and Human Services [DHHS]) as an entity that breached and/or malicious acquired PHI. INCIDENT ESCALATION THE TOE OWNERS will ensure that appropriate managers and directors that oversee the operations of critical applications are involved and notified of such testing activities. THE TOE OWNER will make arrangements for emergency fallback and restoral activities in the event that testing activities directly and/or indirectly cause degradation to services, response times, data integrity and/or other measurements of degraded service. THE TOE OWNER will have policies and procedures in place that provide for the emergency escalation and incident management of systems that appear to be impacted (directly or indirectly) buy testing activities. © 2015