官术网_书友最值得收藏!

The ethics

The ethical vision of security testing constitutes rules of engagement that have to be followed by an auditor to present professional, ethical, and authorized practices. These rules define how the testing services should be offered, how the testing should be performed, determine the legal contracts and negotiations, define the scope of testing, prepare the test plan, follow the test process, and manage a consistent reporting structure. Addressing each of these areas requires careful examination and the design of formal practices and procedures must be followed throughout the test engagement. Some examples of these rules are discussed as follows:

  • Offering testing services after breaking into the target system before making any formal agreement between the client and auditor is completely forbidden. This act of unethical marketing can result in the failure of a business and might have severe legal implications, depending on the jurisdictions of a country.
  • Performing a test beyond the scope of testing and crossing the identified boundaries without explicit permission from a client is prohibited.
  • Binding a legal contract that should limit the liability of a job unless any illegal activity is detected. The contract should clearly state the terms and conditions of testing, the emergency contact information, the statement of work, and any obvious conflicts of interest.
  • The test plan concerns the amount of time that is required to assess the security of a target system. It is highly advisable to draw up a schedule that does not interrupt the production of business hours.
  • The test process defines the set of steps that are required to be followed during the test engagement. These rules combine technical and managerial views to restrict the testing process with its environment and people.
  • Scope definition should clearly define all the contractual entities and the limits imposed on them during the security assessment.
  • Test results and reporting must be presented in a clear and consistent order. The report must mark all the known and unknown vulnerabilities and should be delivered confidentially to the authorized individual only.
主站蜘蛛池模板: 策勒县| 浑源县| 巴彦淖尔市| 夏津县| 光泽县| 河东区| 玉林市| 满洲里市| 左贡县| 新昌县| 锡林浩特市| 托克逊县| 镇康县| 无锡市| 岑溪市| 全椒县| 方城县| 宁河县| 大荔县| 清水河县| 商洛市| 舒城县| 潮安县| 噶尔县| 花垣县| 丹凤县| 南涧| 乾安县| 英山县| 社旗县| 沾化县| 平乐县| 连平县| 普兰县| 旬阳县| 保康县| 德江县| 华坪县| 麻江县| 安义县| 友谊县|