POLICY Penetration Testing Template en
POLICY Penetration Testing Template en
Disclaimer
This template has been developed by the National Cybersecurity
Authority (NCA) as an illustrative example that can be used by organizations
as a reference and guide. This template must be customized and aligned with
the <organization name>’s business and relevant legislative and regulatory
requirements. This template must be approved by the head of the organization
(Authorizing official) or his/her delegate. The NCA is not responsible for any
use of this template as is, and it affirms that this template is solely an
illustrative example.
Choose Classification
VERSION <1.0>
1
Penetration Testing Policy Template
Document Approval
Version Control
<Insert version Click here to <Insert individual’s full <Insert description of the
number> add date personnel name> version>
Review Table
<Once a year> Click here to add date Click here to add date
Choose Classification
VERSION <1.0>
2
Penetration Testing Policy Template
Table of Contents
Purpose.......................................................................................................................4
Scope.......................................................................................................................... 4
Policy Statements....................................................................................................... 4
Roles and Responsibilities..........................................................................................6
Update and Review.....................................................................................................6
Compliance................................................................................................................. 7
Choose Classification
VERSION <1.0>
3
Penetration Testing Policy Template
Purpose
This policy aims to define the cybersecurity requirements related to
assessing and testing the effectiveness of <organization name>'s defense, by
simulating real attacks techniques and technologies, to discover unknown
security weaknesses that might compromise <organization name>.
Scope
This Policy covers all systems and its technology components as well
as all externally provided services (via internet) and its technology
components including: infrastructure, websites, web applications, smart
phones and tablets applications, emails, and remote access in <organization
name> and applies to all personnel (employees and contractors) in
<organization name>.
Policy Statements
1 General Requirements
1-1 Rules of engagement document must be developed prior to the
Penetration Testing process, which must cover the scope of
testing, privileges, duration, target systems, testing mechanism,
general conditions and requirements, etc.
1-2 The scope of penetration testing must include all technology
components including: infrastructure, websites, web applications,
smart phones and tablets applications, emails, and remote
access, OT/ICS network environment in accordance with the
relevant legal and regulatory requirements.
1-3 Penetration Testing must be conducted to evaluate and test the
efficiency of cybersecurity capabilities regularly.
Choose Classification
VERSION <1.0>
4
Penetration Testing Policy Template
Choose Classification
VERSION <1.0>
5
Penetration Testing Policy Template
Choose Classification
VERSION <1.0>
6
Penetration Testing Policy Template
Compliance
1- <head of cybersecurity function> will ensure the compliance of
<organization name> with this policy on a regular basis.
2- All personnel of <organization name> must comply with this policy.
3- Any violation of this policy may be subject to disciplinary action according
to <organization name>’s procedures.
Choose Classification
VERSION <1.0>