Site icon Tutorial

Rules of Engagement

Go back to Tutorial

Every ethical hacking has rules of engagement, which defines how a ethical hack would be laid out, what methodology would be used, the start and end dates, the milestones, the goals of the penetration test, the liabilities and responsibilities, etc. All of them have to be mutually agreed upon by both the customer and the representative before the ethical hack is started.

Following are important requirements that are present in almost every rules of engagement

Go back to Tutorial

Exit mobile version