Back to Guides

Preparing for a Penetration Test

A successful security assessment starts with proper preparation. Follow this guide to ensure a smooth engagement.

Before You Start

Get Written Authorization

Ensure you have proper authorization to test. This includes sign-off from asset owners and legal approval.

Define the Scope

Know what's in-scope and out-of-scope. This protects both you and the tester.

Notify Key Stakeholders

IT, security, and operations teams should be aware (unless it's a true red team exercise).

Information to Gather

  • • Target IP ranges or URLs
  • • Number of applications and their types
  • • Authentication credentials (if authenticated testing)
  • • Network diagrams or architecture documentation
  • • Previous test reports (if any)
  • • Compliance requirements (PCI, HIPAA, SOC2)

Common Mistakes to Avoid

  • ❌ Testing production systems during peak hours
  • ❌ Not having a rollback plan for critical systems
  • ❌ Forgetting to exclude backup systems from scope
  • ❌ Not establishing emergency contacts

Setting Up for Success

1. Designate a Point of Contact
Have one person who can quickly approve scope changes or answer questions.

2. Prepare Test Accounts
Create dedicated test accounts rather than using production credentials.

3. Document Everything
Keep records of what was authorized, when testing occurred, and any issues.