Scoping, rules of engagement, and permissions form the foundation of every network pentest. They define what the tester is allowed to do, what assets are included, how testing will happen, and what legal protections are in place. Strong preparation prevents accidental damage, reduces misunderstandings, and ensures the pentest aligns with business needs.
Scoping
Scoping defines everything that will be included in the pentest. It sets clear boundaries so testing remains controlled and predictable. A well-defined scope protects both the organization and the tester.
Identifying Target Assets
Scoping starts by listing all systems that are part of the assessment. This includes:
-
IP addresses
-
Subnets
-
Domains
-
Applications
-
Network devices
-
Cloud resources
-
External-facing services
Every asset must be documented. Anything not listed is considered out of scope.
Defining Testing Type
The type of pentest determines the depth and style of the engagement. Scoping must specify whether the assessment is:
-
External (internet-facing)
-
Internal (within the organization)
-
Wireless (Wi-Fi infrastructure)
-
Segmented (specific VLANs or isolated zones)
It also defines the testing approach:
-
Black-box: no information provided
-
Grey-box: partial information shared
-
White-box: full information provided
Testing type affects risk, duration, and complexity.
Business and Technical Objectives
A good scope includes business goals. These goals define why the organization wants the pentest. Examples include checking for data exposure, verifying compliance requirements, or assessing critical systems.
Technical objectives define specific tasks such as testing access controls, validating firewall rules, or reviewing authentication mechanisms.
Risk Awareness
Pentesting carries risk. Scoping outlines potential impacts such as system instability, network slowdowns, or service disruptions. The organization must be aware of these risks before testing begins.
Rules of Engagement
Rules of engagement define exactly how the pentest will be conducted. This ensures the assessment remains safe, predictable, and aligned with organizational requirements.
Allowed and Prohibited Techniques
Not every technique is allowed in every environment. Rules of engagement clearly state:
-
What tools may be used
-
Whether brute-force attacks are allowed
-
Whether exploitation is allowed
-
Whether privilege escalation is allowed
-
Whether social engineering is in scope
These rules prevent unexpected harm.
Testing Schedule
Rules of engagement define when testing can occur. Many organizations prefer assessments during off-peak hours to avoid disruptions. The schedule includes:
-
Start and end dates
-
Testing windows
-
Maintenance periods to avoid
-
Backup windows
Communication Protocols
Clear communication avoids confusion during the assessment. Rules specify:
-
Who to contact for incidents
-
Communication tools
-
Reporting format for critical findings
-
Notification procedure if an outage occurs
The tester must be able to reach the right person quickly.
Emergency Procedures
Testing can reveal unexpected system behavior. Rules of engagement define steps to follow if:
-
A system crashes
-
A service slows down
-
Unexpected logs or alerts are triggered
-
Security teams detect suspicious traffic
Emergency procedures protect system availability and prevent escalation.
Data Handling Requirements
Pentesters may interact with sensitive information, so rules define how to manage it. This includes:
-
Encryption standards
-
Storage requirements
-
Sharing or transfer policies
-
Data destruction after the test
Proper handling prevents accidental leaks.
Permissions
Permissions make the pentest legal. Without written authorization, any testing activity is considered unauthorized access.
Written Authorization
Permission must be documented in a formal authorization letter. It includes:
-
Full scope
-
Testing methods
-
Duration
-
Names of authorized testers
-
Signatures from organization leadership
This document protects both parties.
Third-Party Approval
If the test involves cloud providers or external services, separate approval might be required. Examples include:
-
AWS penetration testing approval
-
Cloudflare authorization
-
ISP notifications
-
Hosting provider permissions
Testing without these approvals can violate terms of service.
Legal Protection
Permissions ensure the tester is protected from legal issues such as:
-
Unauthorized access charges
-
Misuse of computer systems
-
Breach of provider policies
Authorization proves the tester is acting on behalf of the organization.
Scope Verification
Before testing begins, permissions must align exactly with the scope. Any mismatch results in legal and operational risk.
Importance of Strong Preparation
Strong preparation ensures that the pentest is safe, legal, and aligned with business goals. It eliminates guesswork, prevents system damage, and ensures the tester knows exactly what they are allowed to do. Proper scoping, rules of engagement, and permissions are essential for a professional-grade pentest environment.
Intel Dump
-
Scoping defines all included assets, testing type, objectives, and risks
-
Rules of engagement define allowed techniques, schedules, communication, emergency response, and data handling
-
Permissions provide legal authorization and protection for all parties
-
Third-party approvals may be required for cloud or hosted environments
-
Strong preparation ensures safe, legal, and effective pentesting