Company Information
What is the legal name of your organization?
Approx. # of employees?
Workstations?
Servers?
Approx. # of other devices?
Firewalls
Routers/Switches
Access Points
Printers
VOIP
IoT/Small Board devices?
Associated domain names?
Technical Point of Contact during the test:
Name
Title
Email address
Mobile number
Report Distribution List
Only the person(s) named on this list will receive the report.
Person 1 Name
Person 1 E-mail
Person 2 Name
Person 2 E-mail
Person 3 Name
Person 3 E-mail
Person 4 Name
Person 4 E-mail
Person 5 Name
Person 5 E-mail
Person 6 Name
Person 6 E-mail
Report Distribution List
Where are the in-scope systems located (data centar, corporate office, remote office, other)?
Are the in-scope systems hosted in your facility or with a third party? If externally hosted, please list the provider(s).
Approx. # of cloud locations (Azure, AWS EC2, Virtual appliances, VM servers, Other cloud providers)?
Previous History
When was your last Vulnerability assessment?
When was your last Vulnerability assessment?
What type?
Internal Network Pen Test
External Network Pen Test
Web Application Pen Test
Assumed Breach / Insider Threat Pen Test
Wireless Pen Test
Physical Pen Test
IoT/ Small Board Pen Test
Advanced Persistent Penetration Testing (Red Team)
Phishing
Social Engineering
What were the results?
Where there any direct actionable items you implemented?
When was your last Cyber Security Risk Assessment?
Are there any findings you would like us to focus on?
Have you ever been the target of a cyberattack and particularly a successful one? If so, what did you do about it?
What customer data are you storing and how do you protect it?
How do you manage and protect cryptographic keys for encrypting data?
If an incident does occur, how do you respond? Are systems and processes in place to immediately contain the incident and respond in a timely fashion?
24/7 Incident Handling and Response
NextGen – AV & EDR
DLP
24/7 SOC & SIEM
Are you subject to any compliance/regulations and when is the last time you validated that compliance?
How much Open Source Software (OSS) is used within the product?
How are authentication, authorization, and encryption methods implemented internally?
Provide some examples of how security is embedded into the company culture.
Who is responsible for security at the company?
Test parameters
What is the primary purpose of the test:
Regulatory requirement (please list applicable compliance standards)
Contractual obligation
Test/enhance information security
If your previous reply was Regulatory requirement, please list applicable compliance standards
What is your preferred testing start date?
What is your preferred testing start date?
Internal Network Pen Test
External Network Pen Test
Web Application Pen Test
Assumed Breach / Insider Threat Pen Test
Wireless Pen Test
Physical Pen Test
IoT/ Small Board Pen Test
Advanced Persistent Penetration Testing (Red Team)
Phishing
Social Engineering
We need to set up an appliance for internal testing, which solution would be your preference?
VMware
Hyper V
Virtual Box
Credentialed or Non-Credentialed? (Please provide credentials if applicable)
Scope of Test
Please provide details regarding the scope of the target environment including a list of devices, their IP addresses and their description/function. Alternatively provide the network subnets with approximate number of devices on the subnet and the subnets’ description. For in-scope web applications provide details regarding the base URLs, subsequent pages, forms, authentication pages and number of roles to be included in the test. Also provide details regarding web services, API’s and WSDLs used. A list of common devices has been included to facilitate the process.
List in-scope network subnets:
Approx. # of active IP addresses within above subnet(s)?
Do you utilize any intrusion detection or prevention devices?
Are these networks segmented, either logically or physically?
List in-scope external IP addresses:
What is/are the function(s) of these hosts?
Do you utilize any intrusion detection or prevention devices?
Are any of these IPs load balanced?
List in-scope web application URLs:
Approx. # of pages in each application?
Is content dynamic or static?
Do you have an available API that can be used in conjunction with the web application(s)?
Credentialed or Non-Credentialed?
If your answer was credentialed please provide 2 users for each level of access, (2 Admin, 2 supervisors, 2 users...)
Please list your systems here
Assumed Breach / Insider Threat Pen Test
Which Threat Model(s) is preferred for this project?
Negligent
Compromised device
Rogue device
Malicious
What user levels do you want tested?
Unauthenticated
User
Super User/Admin
Approx. physical location(s) size?
Approx. # of SSID’s?
Approx. # of Wireless devices?
Approx. # of WIFI controllers and Access Points?
Advanced Persistent Penetration Testing (Red Team)
Primary objective
Penetrate
Persist
Remain undetected
Access sensitive data
Exfiltrate data
Modify source code
Simulate Wire Transfer
IoT/ Small Board Device Pen test
What type of device is being tested?
New employee workstation
IoT/Small board device
Send