Scope

The definition of what systems/software/endpoints/approaches are considered.

The most important component of setting up a successful security assessment.

If it's too broad, to mimic a powerful attacker:

  • Will be too expensive.

  • This may lead to a never-ending assessment.

  • This may lead to a lack of depth (missing vulns).

To narrow: Mimics a focused attack.

  • Cheap, fast, repeatable.

  • May miss easily found issues.

    • To focus on the bulletproof entrance door, placed a wall with a glass window.

Limitations

Assessment is only valid at a given point in time.

  • Other vulnerabilities may exist before or after the assessment.

Researchers must be aware of the latest vulnerabilities.

  • Risk of false negatives.

Limited to the scope, location, and methods used.

  • Different domains may have different FW access rules or security policies.

Tests specific entities, not the overall security controls.

  • A vulnerability may exist, but the security controls may limit/block its exploitation.

Last updated