Penetration Test – Scope Information Form

Caspisec Service Scope Form. Relevant sections automatically open based on selected services. Form, Can be saved as PDF.

Forms are not saved in the system. Please download the form as a PDF after completing it and send it to our team via email.

Turkish
Türkçe

Test Request Information

Organization and contact information.

Test Type

White / Gray / Black Box approach.

Multiple selections can be made.

Requested Services

Relevant section opens below as you select.

Sections: 0 selected

Test Dates & Verification

Reporting

Malware Installation Permission

Relevant Organization Personnel Responsible for Tests

Add information of the first person to contact in case of emergency.

Name / Surname Address Phone Email

IP Addresses / Plan Where Tests Will Be Performed

Test Name Executing Personnel Planned Test Date

Authorized Information / Signature

Test Process – Emergency & Report Retention

Appendix: Information, Authorization and Scope Approval

This text summarizes the accuracy of the scope declared in the form, the principles of conducting the tests and the responsibilities of the parties.

1) Purpose and Work Definition

This form; test scope, test approach (White/Gray/Black Box), time constraints, access needs and reporting expectations for the selected services has been prepared to record. Security tests; detection of vulnerabilities in a controlled and planned manner without causing service interruption in target systems, aims to verify and report.

2) Scope and Exclusions

  • Scope is limited to services selected in this form and assets declared in relevant sections (IP/Subnet, FQDN, application, API, SSID, etc.).
  • If testing of out-of-scope assets is requested, separate written approval and scope update are required.
  • Operations that may cause uncontrolled denial of service (DoS) effect will not be applied unless explicitly requested and written approval is obtained.
  • Verification (retest) is not included as a general rule in services such as social engineering, DDoS, web load testing and continuous vulnerability analysis; it must be requested separately.

3) Authorization and Permission

  • Organization/Company declares that it has given the necessary authority to test the systems to be tested; that the relevant assets belong to it or that it has authorized usage rights.
  • Exploitation of vulnerabilities detected during testing (proof generation) is carried out only for security assessment purposes and with the necessary minimum impact.
  • “Malware installation permission” Action is taken according to the selection in the field; unless permission is granted malware dropping/persistence is not done.

4) Prerequisites and Customer Responsibilities

  • While Gray/White Box testing, security devices (WAF/IPS/NAC, etc.) must be configured so that test IPs are not blocked.
  • In local network tests, the working environment, network access and necessary technical coordination are provided by the Organization/Company.
  • Required user profiles, test accounts, access permissions and documentation (e.g. Swagger) for Application/API tests are provided by the Organization/Company.
  • In mobile application tests, if the requested technical requirements (e.g., appropriate build/SSL pinning conditions) are not met, the test scope may narrow or the duration may extend.

5) Data Processing, Records and Report Retention

  • Findings, evidence and logs obtained during the test are processed for reporting purposes and shared only with authorized persons.
  • Report delivery is made in password-protected form.
  • The report retention/destruction process is applied according to the selection in the "Report retention period" field; if a verification test is to be performed, the report may be requested from the Institution/Company.

6) Operational Risks and Emergency Procedure

  • Every security test has certain operational risks (service performance impact, unexpected behaviors, third-party dependencies, etc.).
  • Emergency contact person/number is specified in this form; test can be stopped immediately if necessary.
  • Critical business continuity restrictions (off-hours, specific time range etc.) “Time restriction” field must be specified.

7) Limitation of Liability

Security testing is an assessment activity carried out within the scope declared in the form and the access/prerequisites provided. CASPISEC cannot be held responsible for out-of-scope systems, unspecified assets, interruptions caused by third-party service providers and consequences arising from prerequisites not provided by the Organization/Company.

Note: This approval means accepting the accuracy of the scope declarations in the form and that the test process will be carried out according to the specified principles.

“Save as PDF” button opens the browser's print window. On the screen that appears “save as PDF” use the option.