Here are some guidelines for scoping and negotiating pen test engagements:

  • Determine the types of assessments you want to conduct:
  • Goal-based or objective-based
  • Compliance-based
  • Red team
  • Clearly define the end goals of the engagement.
  • Determine what testing strategy you need to use:
  • Black box
  • Gray box
  • White box
  • Determine what types of threat actors you want to emulate, and what their capabilities and intent might encompass.
  • Consider recommending that the client organization engage in some threat modeling so that their objectives and expectations can be clearly defined.
  • Identify all targets, whether conventional or specialized systems, and the risk tolerance associated with each.
  • Be sure to account for existing controls and scenarios.
  • Existing organizational policies and security exceptions
  • Existing whitelists and/or blacklists
  • The use of certificate and public key pinning
  • The use of NAC devices and controls
  • The need for premerger or supply chain security testing
  • Create, maintain, and adhere to a comprehensive schedule.
  • Find ways to avoid scope creep; consider including disclaimer language to protect the test team from any adverse events resulting from allowing or denying scope creep.
  • Consider using a scoping checklist to gather information that will help shape the boundaries of the engagement.
  • Identify each deliverable, including all documents and meetings.