Re: Get out of jail cards (Statement of work authorizing access, was Re: Pentester convicted..)

From: Paul Asadoorian (paul@pauldotcom.com)
Date: Fri May 12 2006 - 13:22:25 EDT


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi Michael,

I typically refer to the following document from the SANS Policy
resources:

http://www.sans.org/resources/policies/Audit_Policy.doc

I modify this for internal permission slip purposes (i.e. the network
security group has permission to do X, Y, Z on the network) and for
external engagements as well.

I'd be very interested in hearing people's thoughts/comments.

Thank You,

Paul

- --
Paul Asadoorian
Email: paul@pauldotcom.com
Web: http://pauldotcom.com
IRC: #pauldotcom on Freenode (irc.freenode.net)

Fingerprint: 2693 0204 8497 2E5F 4853 11D5 1153 6151 487F E094

On May 11, 2006, at 7:18 PM, Michael Sierchio wrote:

>
> I'd be very much interested in whether there is a consensus
> document used by those performing vulnerability assessments
> that specifically authorizes pen testing which is sufficiently
> robust to protect the consultant from civil and criminal
> action.
>
> Would anyone care to share, comment, etc.? Thanks in advance.
>
> - Michael
>
>
> ----------------------------------------------------------------------
> --------
> This List Sponsored by: Cenzic
>
> Concerned about Web Application Security? Why not go with the #1
> solution - Cenzic, the only one to win the Analyst's Choice Award
> from eWeek. As attacks through web applications continue to rise,
> you need to proactively protect your applications from hackers.
> Cenzic has the most comprehensive solutions to meet your
> application security penetration testing and vulnerability
> management needs. You have an option to go with a managed service
> (Cenzic ClickToSecure) or an enterprise software (Cenzic
> Hailstorm). Download FREE whitepaper on how a managed service can
> help you: http://www.cenzic.com/news_events/wpappsec.php And, now
> for a limited time we can do a FREE audit for you to confirm your
> results from other product. Contact us at request@cenzic.com for
> details.
> ----------------------------------------------------------------------
> --------
>

- --
Paul Asadoorian
Email: paul@pauldotcom.com
Web: http://pauldotcom.com

Fingerprint: 2693 0204 8497 2E5F 4853 11D5 1153 6151 487F E094

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (Darwin)

iD8DBQFEZMRREVNhUUh/4JQRAkFGAKDf6fxkYDBMfvIQLIKYlBf9mxKcfgCfTEcn
OOM7FBrKpjCzQ+u9WNhcbs0=
=MBiV
-----END PGP SIGNATURE-----

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security?
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's
Choice Award from eWeek. As attacks through web applications continue to rise,
you need to proactively protect your applications from hackers. Cenzic has the
most comprehensive solutions to meet your application security penetration
testing and vulnerability management needs. You have an option to go with a
managed service (Cenzic ClickToSecure) or an enterprise software
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
help you: http://www.cenzic.com/news_events/wpappsec.php
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request@cenzic.com for details.
------------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:55:57 EDT