Rules of Engagement: Penetration Testing and Security Assessment
Information Security Specialist
Overview
This document defines the Rules of Engagement (RoE) for conducting penetration testing and security assessments of information systems. The document establishes the framework for collaboration between the client and testing team, ensuring security, legality, and effectiveness of the process.
Document Objectives
Primary Goal โ Ensure controlled and authorized testing with minimal risks to production systems
The Rules of Engagement guarantee:
- Security of production systems
- Compliance with legal requirements
- Transparent communication between all parties
- Controlled and authorized testing
Contact Information
Client Organization
| Role | Contact Details |
|---|---|
| Primary Contact โ Position | _________________________ |
| Primary Contact โ Mobile Phone | _________________________ |
| Primary Contact โ Email Address | _________________________ |
| Secondary Contact โ Position | _________________________ |
| Secondary Contact โ Mobile Phone | _________________________ |
| Secondary Contact โ Email Address | _________________________ |
Testing Team
| Role | Contact Details |
|---|---|
| Team Lead โ Mobile Phone | _________________________ |
| Team Lead โ Email Address | _________________________ |
| Backup Contact โ Mobile Phone | _________________________ |
| Backup Contact โ Email Address | _________________________ |
| 24/7 Emergency Contact โ Mobile Phone | _________________________ |
| 24/7 Emergency Contact โ Email Address | _________________________ |
Scope of Testing
In-Scope Assets
Network Infrastructure:
- Domains: _________________________________
- Subdomains: _____________________________
- IP Ranges: __________________________
- Cloud Resources: ______________________
Applications and Services:
- Web Applications: ________________________
- API Interfaces: ________________________
- Internal Systems: ____________________
Out-of-Scope Assets
โ ๏ธ Critical Restrictions:
- Systems not owned by the organization
- Third-party services without written authorization
- Production databases (unless explicitly permitted)
- Social engineering (unless approved)
- Critical infrastructure systems
Testing Rules and Procedures
Authorized Activities
โ
Approved Testing Methods:
- Vulnerability scanning
- Manual penetration testing
- Web application testing
- API interface testing
- Cloud configuration analysis
- Network security testing
- Password policy verification
Prohibited Activities
โ Strictly Forbidden Actions:
- Denial of Service (DoS/DDoS) attacks
- Physical intrusion
- Social engineering without explicit authorization
- Brute-force attacks without rate limiting
- Actions that may cause data corruption
- Unauthorized access to personal data
Load Limitations
Technical Constraints for Production Systems
โก Critical Load Limits:
| Parameter | Limitation | Notes |
|---|---|---|
| Maximum Requests per Second | _________________________ | To prevent system overload |
| Concurrent Connections | _________________________ | Parallel connection limit |
| Payload Size | _________________________ | Maximum data size |
| Connection Timeout | _________________________ | Response wait time |
Time Restrictions
๐ Intensive Testing Schedule:
- Mass Scanning: Off-hours only
- Fuzzing Testing: _________________________ (specify time windows)
- Load Testing: Prior notification required
- Automated Scanners: Rate-limited during business hours
Load Monitoring
๐ System Impact Control:
- CPU and memory monitoring of target systems
- Application response time tracking
- Network bandwidth control
- Immediate halt if limits exceeded
Legal Basis
Legal Foundation for Testing
โ๏ธ Legal Justification:
All penetration testing activities are performed exclusively based on written authorization from an authorized representative of the client organization.
Documentary Basis:
- Signed service agreement
- These Rules of Engagement
- Technical specification describing testing scope
- Additional agreements (if necessary)
Limitation of Liability
๐ก๏ธ Liability Exemption โ The testing team is exempt from liability for:
- Temporary system unavailability resulting from authorized testing
- Discovery of vulnerabilities existing prior to testing commencement
- Actions performed strictly within the agreed testing scope
- Indirect losses related to security issue identification
Legal Compliance
๐ Regulatory Compliance:
- Adherence to personal data protection legislation
- Compliance with industry security standards
- Alignment with international penetration testing practices
- Documentation of all actions for audit purposes
Vulnerability Criticality Matrix
๐ฏ Standardized Assessment System โ Risk Level Classification:
| Level | Description | Vulnerability Examples | Remediation Time |
|---|---|---|---|
| P0 - Critical | Immediate security threat | RCE, SQL Injection, Authentication Bypass | 24โ48 hours |
| P1 - High | Serious security breach | XSS, LFI, Privilege Escalation | 1โ2 weeks |
| P2 - Medium | Moderate risk | Security Misconfiguration, CSRF | 1 month |
| P3 - Low | Minimal risk | Information Disclosure, Weak Ciphers | 3 months |
| P4 - Informational | Improvement recommendations | Best Practices, Hardening | As possible |
Assessment Criteria
๐ Criticality Determination Factors:
- Impact: Potential damage from exploitation
- Likelihood: Ease of vulnerability exploitation
- Scope: Number of affected systems
- Accessibility: Access requirements for exploitation
Escalation Procedure
โก Emergency Response for Critical Findings:
- P0โP1: Immediate notification by phone + email
- P2: Notification within business day
- P3โP4: Inclusion in regular reports
Authorized Testing Tools
๐ง Core Toolset:
| Category | Tool | Purpose | Version |
|---|---|---|---|
| Vulnerability Scanners | Nessus | Automated scanning | _________ |
| OpenVAS | Network and application scanning | _________ | |
| Qualys VMDR | Cloud scanning | _________ | |
| Web Testing | Burp Suite Professional | Web application testing | _________ |
| OWASP ZAP | Web application security analysis | _________ | |
| Nikto | Web server scanning | _________ | |
| Network Testing | Nmap | Port and service scanning | _________ |
| Masscan | High-speed scanning | _________ | |
| Exploitation | Metasploit Framework | Exploit testing | _________ |
| Cobalt Strike | Attack simulation (with agreement) | _________ |
๐ ๏ธ Additional Tools โ Specialized Software (by agreement):
- Social Engineering: SET, Gophish (explicit permission only)
- Wireless Networks: Aircrack-ng, Kismet
- Mobile Applications: MobSF, Frida
- Cloud Security: ScoutSuite, Prowler
โ ๏ธ Prohibited or Restricted Tools:
- DDoS attack tools
- Unauthorized scanners with aggressive settings
- Password cracking tools without rate limits
- Any software not agreed upon with the client
Testing Team Identification
๐ Whitelists for Defensive Systems โ Critical for preventing authorized testing blockage:
| Identification Parameter | Value | Purpose |
|---|---|---|
| Source IP Addresses | _________________________ | Static IPs for WAF/IPS whitelisting |
| Subnet Ranges | _________________________ | Additional team network segments |
| User-Agent Strings | _________________________ | Specific identifiers for web scanners |
| SSH Keys | _________________________ | Public keys for authorized access |
๐ท๏ธ Special Identifiers โ Markers for logging and monitoring:
- Test Request Prefix: _________________________
- Special HTTP Headers: _________________________
- Session Identifiers: _________________________
- Payload Markers: _________________________
๐ Blue Team Coordination โ Interaction with defense team:
- Pre-testing notification of commencement
- SOC (Security Operations Center) contact list
- Procedure for confirming activity legitimacy
- Emergency testing halt protocol
High-Risk Test Definition
โ ๏ธ Risky Operation Classification โ High-risk tests requiring special attention:
| Test Category | Description | Execution Window | Additional Measures |
|---|---|---|---|
| Brute-force Attacks | Password/PIN guessing | Off-hours only | Rate limiting, lockout monitoring |
| Application Fuzzing | Invalid data submission | _________________________ | System stability control |
| Vulnerability Exploitation | Proof-of-concept execution | By agreement | Immediate notification on success |
| DoS Testing | Load resistance verification | Test environment only | Prior agreement required |
๐ Critical Test Service Windows โ Special time intervals:
- Primary risky test window: _________________________
- Backup window: _________________________
- Emergency window (by agreement): _________________________
- Prohibited periods: _________________________
๐ฅ Client-Side Testing โ End-user protection:
- Phishing Simulations: Written HR consent only
- Browser Testing: Isolated test machines
- Social Engineering: Strictly limited scope
- Personal Data Protection: Avoid access to personal information
Technical Methodology
๐ Standards and Classifications โ International standards used:
| Standard | Version | Application |
|---|---|---|
| CVSS | v3.1/4.0 | Vulnerability criticality assessment |
| OWASP Top 10 | 2021 | Web applications |
| NIST Cybersecurity Framework | v1.1 | General methodology |
| OSSTMM | v3 | Testing methodology |
| PTES | v1.0 | Penetration testing standard |
๐ Testing Model โ Information access level:
- โ Black Box โ No prior system knowledge
- โ Gray Box โ Partial access to documentation/architecture
- โ White Box โ Full access to code and architecture
Selected Model: _________________________
๐ CVSS Assessment โ Vulnerability assessment criteria:
- Base Metrics: Attack vector, complexity, privileges, user interaction
- Temporal Metrics: Exploit availability, remediation level
- Environmental Metrics: Impact on client's specific environment
- Threshold Values: P0 (9.0โ10.0), P1 (7.0โ8.9), P2 (4.0โ6.9), P3 (0.1โ3.9)
Additional Legal Aspects
๐ Cross-Border Data Transfer โ International compliance:
When working with international testing teams, compliance with GDPR, CCPA, and other applicable data protection regulations is ensured.
- Team base country: _________________________
- Applicable legislation: _________________________
- Data transfer mechanisms: Standard Contractual Clauses (SCC) / Adequacy Decision
- Data localization: _________________________
International Standards Compliance
| Standard / Regulation | Compliance Status | Notes |
|---|---|---|
| GDPR (EU) | _________________________ | Personal data protection |
| ISO 27001 | _________________________ | Information security management system |
| SOC 2 Type II | _________________________ | Security controls |
| PCI DSS | _________________________ | Payment systems |
๐ Audit Rights โ The client has the right to:
- Verify data deletion procedures after project completion
- Request confirmation of confidential information destruction
- Audit testing team security measures
- Obtain compliance certificates for applicable standards
Critical Situation Response Process
๐จ Emergency Response Algorithm โ Step-by-step procedure for critical incidents:
- CRITICAL SITUATION DETECTION
- IMMEDIATE TESTING HALT
- CLIENT NOTIFICATION (within 15 minutes)
- IMPACT AND DAMAGE ASSESSMENT
- CONTINUATION DECISION
- INCIDENT DOCUMENTATION
- ROOT CAUSE ANALYSIS AND CORRECTIVE MEASURES
Escalation Matrix
| Level | Response Time | Communication Method | Responsible |
|---|---|---|---|
| P0 - Critical | 15 minutes | Phone + SMS + Email | _________________________ |
| P1 - High | 1 hour | Phone + Email | _________________________ |
| P2 - Medium | 4 hours | Email + Slack/Teams | _________________________ |
| P3 - Low | 24 hours | _________________________ |
๐ Testing Halt Criteria โ Automatic work cessation triggers:
- Critical service unavailability for more than 5 minutes
- Discovery of active vulnerability exploitation by third parties
- Exceeding agreed load limits
- Halt request from any authorized representative
Evidence Handling and Cleanup
๐ Evidence Handling Protocol โ strict security requirements:
| Stage | Requirements | Responsible |
|---|---|---|
| Collection | Encryption, hashing, timestamps | Tester |
| Storage | Isolated storage, access control | Project Manager |
| Transfer | Secure channels, receipt confirmation | Both parties |
| Destruction | Irreversible deletion, destruction certificate | Testing team |
๐งน Post-Test Cleanup Plan โ mandatory procedures:
Created Object Removal:
- Test user accounts
- Uploaded files and scripts
- Temporary configurations
- Test databases and tables
Original State Restoration:
- Configuration change rollback
- Test certificate removal
- Testing log cleanup (by agreement)
- Backup restoration (if necessary)
๐ Data Destruction Certification โ Upon project completion, the testing team provides:
- Certificate of irreversible deletion of all client data
- Report on performed cleanup procedures
- Confirmation of compliance with data destruction standards (DoD 5220.22-M or equivalent)
Testing Schedule
| Parameter | Value |
|---|---|
| Start Date | _________________________ |
| End Date | _________________________ |
| Testing Window | _________________________ |
| Time Zone | _________________________ |
| Daily Briefing | _________________________ |
๐ก Communication Protocol โ Regular Updates:
- Daily status reports
- Weekly progress summaries
- Emergency notifications for critical findings
Incident Handling
Incident Response Procedure
In case of system instability during testing:
- Immediate halt of testing by team
- Notification of client organization
- Decision making by emergency contact regarding continuation
- Incident documentation
๐ Testing Halt Criteria โ Conditions for work cessation:
- Discovery of critical vulnerabilities
- Production system instability
- Exceeding agreed testing scope
- Client request
Data Handling and Confidentiality
Confidentiality โ priority number one when processing any information
Testing Team Obligations:
- Sensitive data not stored unless necessary
- All collected data encrypted
- Data deleted after report delivery
- Avoidance of personal data access
Non-Disclosure Agreement โ All testing participants commit to:
- Maintain confidentiality of obtained information
- Not disclose results to third parties
- Use data exclusively for testing purposes
Reporting Requirements
Interim Reports:
- Daily or weekly updates
- Task completion status
- Preliminary findings
Final Reporting:
- Technical Report โ detailed vulnerability description
- Management Report โ recommendations for leadership
- Executive Summary โ brief overview for top management
๐ Results Presentation Format โ Standardized structure:
- Vulnerability classification by criticality
- Remediation recommendations
- Remediation timeframes
- Security metrics
Risk Acceptance
Client Organization Confirmation โ The client organization confirms understanding that:
- Testing may reveal critical vulnerabilities
- Some tests may cause temporary performance degradation
- All actions are authorized and agreed upon
- Results will be used to improve security
Testing Readiness Checklist
Preparatory Activities
- Testing scope defined
- Responsible contacts assigned
- Work schedule agreed
- All necessary documents signed
- Communication channels established
- Test environment prepared (if necessary)
- Testing team briefing conducted
Control Points During Testing
- Daily status meetings
- Production system monitoring
- All actions documented
- Timeline compliance
- Regular client communication
Signatures and Approvals
Client Organization Representative
| Name and Position | _________________________ |
| Signature | _________________________ |
| Date | _________________________ |
Testing Team Lead
| Name and Position | _________________________ |
| Signature | _________________________ |
| Date | _________________________ |
Emergency Contact Form
Rapid Response Information:
| Parameter | Contact Details |
|---|---|
| Primary Client Contact | _________________________ |
| Secondary Client Contact | _________________________ |
| Testing Lead | _________________________ |
| 24/7 Emergency Line | _________________________ |
Emergency Contact Procedure
- Primary contact โ main client representative
- If unavailable โ secondary contact
- Critical situations โ 24/7 emergency line
- Documentation of all communications