Scoping

Scoping in a penetration testing (pentest) engagement refers to defining the boundaries, objectives, and limitations of the assessment. It involves determining what systems, networks, applications, and assets are included in the assessment, as well as identifying the goals and objectives of the pentest.

Important Points to Look at

Why the client is asking for an assessment?

-> Compliance (PCI, ISO)

-> Test Maturity of their Security Program

-> Look for weakness in the Architecture

Assessment Timing

-> How long will the testing last?

-> Does it need to be done during certain hours?

-> Will it interfere with any special projects?

Internal Involvements

-> Who is the primary point of contact (for Security and the Product)

-> Communication for the engagement

-> Will the IT/Responsible party be notified of the testing?

External & Internal VA/PT

  • Clearly define the targets (hosts, IPs, applications) for the penetration test to focus testing efforts effectively.

  • Document and communicate exclusions to avoid unintentional testing of restricted areas.

  • Determine if notification to third-party providers is required when testing external systems like SaaS/PaaS solutions.

  • Understand the process for accessing internal systems within the network environment.

  • Identify the presence of IPS/IDS/Firewall and understand their impact on the penetration test, including how they handle blocked traffic.

Template

The following is an example of a template for scoping a Pentest.

Identify and exploit security vulnerabilities in the e-commerce platform to assess its resilience against cyber attacks.

Decision Making Skeleton 💀

Below is a basic decision-making framework that can be used to finalize the scope of a pentest engagement in advance. This framework helps improve the decision-making process regarding how a pentest engagement should be conducted.

Requirements Skeleton 💀

This is a basic skeleton for a requirement list used in scoping a pentest. It provides an overall idea of the solution and serves as a starting point. The checklist must be completed with necessary information. If a field is not applicable to the system, it can be marked as 'Not Applicable' (NA).

Last updated