Cynetix
Critical Authorization Document

Authorization to Conduct
Security Testing

Document No. CYN-AUTH-___  |  Version 2.1  |  March 2026
🔴 This is a Critical Legal Document This Authorization to Test is the primary legal instrument that permits Cynetix to conduct cybersecurity testing activities. It must be signed by an individual with lawful authority to authorize security testing of all listed systems. A copy of this document must be retained by Cynetix for a minimum of seven (7) years.
Date:   
To:
Cynetix LLC
Cyber Intelligence & Network Defense
contact@cynetix.io
RE:   Authorization to Conduct Security Testing
SOW Reference:     |  ROE Reference:   

I,  , acting in my capacity as   of   ("the Organization"), hereby provide express written authorization to Cynetix LLC and its authorized personnel to conduct security testing activities against the systems and assets described herein.

I represent and warrant that I have the legal authority to authorize penetration testing of all systems listed in this document and the corresponding Rules of Engagement, and that such authorization is consistent with all applicable laws, regulations, and agreements governing these systems.

Authorized Testing Details

Organization Name:  
Authorizing Individual:  
Title / Position:  
Contact Email:  
Contact Phone:  
Authorized Tester(s):  
Tester IP Address(es):  
Authorized Start Date:  
Authorized End Date:  
In-Scope Systems / Assets:
[IP ranges, CIDR blocks, hostnames, application URLs, cloud account IDs, mobile app names]
Authorized Testing Types:
☐  External Network Penetration Testing
☐  Internal Network Penetration Testing
☐  Web Application Security Testing
☐  Mobile Application Security Testing
☐  Cloud Security Assessment
☐  Red Team / Adversary Simulation
☐  Social Engineering (Phishing / Vishing)
☐  Physical Access Testing
☐  Wireless Network Assessment
☐  Other:  

By signing below, I hereby attest and confirm the following:

1.  I am the duly authorized representative of the Organization with full legal authority to grant permission for security testing of the systems listed above.

2.  The Organization owns or has obtained all necessary legal rights, licenses, and authorizations to permit security testing of all listed systems, including written permission from any third-party hosting providers, cloud service providers, internet service providers, and co-location facilities as required.

3.  The authorization granted herein is specifically and exclusively limited to the named tester(s), the listed systems, and the specified time period. Any testing outside these parameters is not authorized.

4.  The Organization understands that authorized security testing constitutes simulated attack activity, which may include attempted exploitation of vulnerabilities, privilege escalation, lateral movement, and other offensive security techniques, all conducted under controlled conditions as defined in the Rules of Engagement.

5.  The Organization acknowledges that no penetration test can guarantee the identification of all vulnerabilities, and that the results of this engagement do not certify the security of the tested systems.

6.  The Organization has reviewed and agrees to the Rules of Engagement (CYN-ROE- ) which governs the scope and constraints of this engagement.

7.  This authorization may be revoked at any time by contacting Cynetix via the emergency contact procedures defined in the Rules of Engagement.

Third-Party Authorization

Cloud & Hosting Provider Authorizations

For systems hosted on third-party platforms, the following authorizations have been obtained:

ProviderAccount / TenantAuthorization MethodDate Obtained
☐ AWS   ☐ Azure   ☐ GCP   ☐ Other   ☐ Provider policy ☐ Written approval ☐ N/A  
☐ Hosting Provider / Datacenter   ☐ Written approval ☐ N/A  
☐ CDN / WAF Provider   ☐ Written approval ☐ N/A  

Note: AWS Penetration Testing Policy, Azure Penetration Testing Rules of Engagement, and Google Cloud Vulnerability Reward Program each have their own permitted testing guidelines. Client is responsible for compliance with all applicable provider policies.

Authorization Signatures

This document must be signed by an individual with legal authority to authorize security testing of all listed systems. Testing shall not commence until Cynetix has received a signed copy of this document.

⚠️ Signing this document on behalf of systems you do not own or have authority over may constitute unauthorized computer access under applicable law.

Authorizing Client Representative

Cynetix LLC — Authorized Tester

Document Retention: This signed Authorization to Test shall be retained by both parties for a minimum of seven (7) years following engagement completion. Cynetix will not initiate any testing activity until a fully executed copy of this document is on file.