官术网_书友最值得收藏!

The ethics

The ethical vision of security testing constitutes rules of engagement that have to be followed by an auditor to present professional, ethical, and authorized practices. These rules define how the testing services should be offered, how the testing should be performed, determine the legal contracts and negotiations, define the scope of testing, prepare the test plan, follow the test process, and manage a consistent reporting structure. Addressing each of these areas requires careful examination and design of formal practices and procedures that must be followed throughout the test engagement. Some examples of these rules have been discussed below.

  • Offering testing services after breaking into the target system before making any formal agreement between the client and auditor should be completely forbidden. This act of unethical marketing can result in the failure of a business and may have legal implications depending on jurisdictions of a country.
  • Performing a test beyond the scope of testing and crossing the identified boundaries without explicit permissions from a client is prohibited.
  • Binding a legal contract that should limit the liability of a job unless any illegal activity is detected. The contract should clearly state the terms and conditions of testing, emergency contact information, statement of work, and any obvious conflicts of interest.
  • Scope definition should clearly define all the contractual entities and the limits imposed to them during security assessment.
  • Test plan concerns the amount of time required to assess the security of a target system. It is highly advisable to draw up a schedule that does not interrupt the production of business hours.
  • Test process defines the set of steps necessary to follow during the test engagement. These rules combine technical and managerial views for restricting the testing process with its environment and people.
  • Test results and reporting must be presented in a clear and consistent order. The report must mark all the known and unknown vulnerabilities, and should be delivered confidentially to the authorized individual only.
主站蜘蛛池模板: 通江县| 偏关县| 日喀则市| 济南市| 开化县| 宜宾市| 正镶白旗| 菏泽市| 泗洪县| 大渡口区| 莎车县| 金湖县| 海原县| 叙永县| 资阳市| 横山县| 邛崃市| 崇礼县| 汕头市| 嘉峪关市| 土默特左旗| 凌云县| 姚安县| 蓬莱市| 新密市| 乐亭县| 马边| 福泉市| 兴海县| 遂宁市| 积石山| 平和县| 五家渠市| 永仁县| 通河县| 临澧县| 澎湖县| 文成县| 商水县| 新民市| 宽甸|