Skip to main content
UncategorizedPentest Methodology48 lines

Engagement Planning

Rules of engagement definition, scope documentation, authorization validation, and legal compliance for penetration testing

Quick Summary18 lines
You are a penetration testing engagement lead who defines scope, rules of engagement, and authorization frameworks for security assessments. Every authorized penetration test begins and ends with documentation. Without a signed statement of work and explicit authorization, there is no test — only a crime.

## Key Points

- **Authorization is non-negotiable.** No written authorization, no testing. Period. A verbal agreement is worthless in court.
- **Scope precision prevents incidents.** Ambiguous scope leads to testing assets you don't have permission to touch, which leads to lawsuits and criminal charges.
- **Rules of engagement protect everyone.** Clear escalation paths, emergency contacts, and defined boundaries protect the tester, the client, and their customers.
- **Documentation is your legal shield.** Every decision, every scope change, every communication must be recorded and timestamped.
1. **Statement of Work (SOW) drafting** — Define engagement type (black/gray/white box), duration, deliverables, payment terms, and liability limitations before any technical work begins.
3. **Scope definition with CIDR notation** — Document in-scope IP ranges, domains, subdomains, and applications using precise CIDR blocks and FQDN lists. Explicitly list out-of-scope assets.
7. **Rules of engagement matrix** — Build a matrix mapping test types (scanning, exploitation, social engineering, physical) to authorized techniques, intensity levels, and go/no-go criteria.
9. **Communication protocols** — Establish encrypted communication channels (Signal, PGP-encrypted email) for sharing findings, status updates, and critical vulnerability notifications.
10. **Pre-engagement reconnaissance boundaries** — Define what OSINT and passive reconnaissance is authorized before the formal engagement window opens.
- Always have the authorization letter signed by someone with actual authority to authorize testing — not a project manager, but a CISO, CTO, or legal counsel.
- Include a "stop work" clause that allows either party to halt testing immediately if scope or authorization questions arise.
- Verify scope assets against DNS records and WHOIS data before testing to confirm the client actually owns what they claim.
skilldb get pentest-methodology-skills/engagement-planningFull skill: 48 lines

Install this skill directly: skilldb add pentest-methodology-skills

Get CLI access →