Scoping and Requirements Gathering
Defining What You're Actually Testing
The Scope Problem: Clients often say "test our network" or "check our security" without understanding what that means. Your job is to translate vague requests into specific, testable targets.
Technical Scope Definition:
IP Ranges: Exactly which network ranges are in scope (192.168.1.0/24, not "our internal network")
Domain Names: Specific domains and subdomains you can test
Applications: URLs, APIs, and web applications by name and version
Physical Locations: Which offices, data centers, or facilities are included
User Accounts: Whether you can test with provided credentials or create test accounts
What's Out of Scope:
Third-Party Services: Customer systems, partner networks, cloud providers
Production Data: Live customer information, financial records, personal data
Critical Systems: Emergency services, life safety systems, revenue-critical applications
Denial of Service: Unless specifically approved with detailed constraints
Understanding Business Context
Why This Matters: A SQL injection in a test database isn't the same as one in the production customer database. Understanding business impact helps you prioritize findings.
Key Questions to Ask:
What type of data does this system handle? (customer data, financial records, intellectual property)
How critical is system availability? (can we test during business hours?)
What compliance requirements apply? (financial regulations, healthcare privacy, etc.)
What specific threats are you most concerned about? (competitors, nation-states, criminals)
What previous security incidents have you experienced?
Business Impact Assessment:
High Impact: Customer-facing systems, financial applications, authentication services
Medium Impact: Internal tools, development environments, backup systems
Low Impact: Test systems, staging environments, documentation sites
Last updated
Was this helpful?