Cynetix
Technical Authorization Document

Rules of Engagement

Document No. CYN-ROE-___  |  Version 2.1  |  March 2026
This Rules of Engagement document ("ROE") defines the technical boundaries, permissions, restrictions, and emergency procedures governing the penetration testing engagement referenced in the corresponding Statement of Work. This document must be reviewed and signed by Client's authorized technical representative before any testing commences. Any deviation from these rules requires a written amendment signed by both parties.
πŸ›‘ STOP – Read Before Signing This document authorizes simulated cyberattack activities against the systems listed herein. Ensure all listed systems are owned by or under the lawful control of your organization. Any systems not explicitly listed are out of scope. Testing activities may trigger security alerts β€” coordinate with your SOC/SIEM team prior to the engagement start date.
Engagement Reference

Identification

FieldValue
Client Organization 
SOW ReferenceCYN-SOW- 
Engagement Type 
Testing Start Date & Time 
Testing End Date & Time 
Cynetix Lead Tester 
Cynetix Tester IP Addresses 
Client Technical POC 
Section 1

Emergency Contacts & Stop Procedures

πŸ“ž Emergency Contact Protocol If Client needs to immediately halt testing for any reason, contact Cynetix via the following priority order. Cynetix will cease all activities within 15 minutes of verified contact.
PriorityContactRolePhone (24/7)Email
1 β€” Primary   Cynetix Lead Tester    
2 β€” Secondary   Cynetix Project Manager    
3 β€” Escalation   Client Technical POC    
4 β€” Executive   Client Executive Sponsor    

Emergency Stop Phrase:   " " β€” Upon receipt of this phrase via any channel, testing will stop immediately.

Secure Communication Channel:   ☐ Signal   ☐ WhatsApp   ☐ Email   ☐ Phone only

Section 2

Authorized (In-Scope) Systems

Testing is ONLY permitted against the following assets. Any systems not explicitly listed below are out of scope and shall not be tested.

2.1 Network / IP Ranges

IP Range / CIDRDescriptionEnvironmentOwner Confirmed
    ☐ Prod ☐ Stage ☐ Yes
    ☐ Prod ☐ Stage ☐ Yes
    ☐ Prod ☐ Stage ☐ Yes

2.2 Web Applications / APIs

URL / EndpointApplication NameAuth RequiredTest Type
    ☐ Yes ☐ No ☐ Auth ☐ Unauth ☐ Both
    ☐ Yes ☐ No ☐ Auth ☐ Unauth ☐ Both
    ☐ Yes ☐ No ☐ Auth ☐ Unauth ☐ Both

2.3 Cloud Accounts / Tenants

ProviderAccount / Tenant IDServices in ScopeAuthorization Obtained
☐ AWS ☐ Azure ☐ GCP ☐ Other     ☐ Yes

2.4 Mobile Applications

App NamePlatformVersionTest Build
  ☐ iOS ☐ Android   ☐ Prod ☐ Test IPA/APK provided
Section 3

Explicitly Out-of-Scope Systems & Actions

The following are strictly prohibited during this engagement:

3.1 Out-of-Scope Systems

[List any IP ranges, URLs, systems, or third-party services explicitly excluded]

3.2 Prohibited Actions

  • β˜‘  Denial of Service (DoS) or Distributed DoS attacks of any kind;
  • β˜‘  Physical access to Client facilities (unless explicitly authorized in SOW);
  • β˜‘  Testing systems belonging to third parties not listed in Section 2;
  • β˜‘  Exfiltration of real customer PII, PHI, or payment data beyond proof-of-concept (a single sample record is sufficient);
  • β˜‘  Permanent modification or deletion of Client data;
  • β˜‘  Installation of persistent backdoors without documented Client approval;
  • β˜‘  Use of ransomware or any destructive malware;
  • β˜‘  Targeting of employees' personal devices;
  • β˜‘  Social engineering of Client employees outside the authorized scope;
  • ☐  Other:  
Section 4

Testing Constraints & Special Conditions

4.1 Permitted Testing Hours

☐  Unrestricted (24/7) β€” Testing may occur at any time
☐  Business hours only β€”   to   local time, Monday–Friday
☐  After-hours only β€” Testing must occur outside business hours
☐  Custom window:  

4.2 Destructive / High-Risk Testing

ActivityPermittedConditions / Notes
Buffer overflow / memory corruption exploits☐ Yes   ☐ No 
Active exploitation of findings (not just PoC)☐ Yes   ☐ No 
Password spraying / brute force☐ Yes   ☐ NoMax attempts:  
Phishing email campaigns☐ Yes   ☐ NoTarget list required in advance
Lateral movement post-compromise☐ Yes   ☐ No 
Domain controller / AD attacks☐ Yes   ☐ No 
Ransomware simulation☐ Yes   ☐ NoIsolated test systems only
Physical access testing☐ Yes   ☐ NoLocations:  

4.3 SOC / SIEM Notification

☐  Blind test β€” Client's security team will NOT be notified. Test SOC detection capabilities.
☐  Informed test β€” Client's security team WILL be notified of testing dates/times.
☐  Partial β€” SOC notified of testing dates but not scope or methods.

If any test activity triggers an incident response, Client's security team should contact Cynetix at the emergency contact numbers in Section 1 before escalating to law enforcement.

4.4 Data Handling During Testing

  • Cynetix testers will capture the minimum data necessary to demonstrate vulnerability impact;
  • Any real PII or sensitive data accessed will be documented and reported β€” not retained;
  • All testing data (screenshots, logs, notes) stored by Cynetix will be encrypted at rest and in transit;
  • Testing data will be retained for 90 days post-engagement and then securely deleted unless otherwise agreed.
Section 5

Credentials & Access Provided

The following test credentials, VPN access, or API keys are being provided to Cynetix for this engagement. Client is responsible for revoking all access immediately upon engagement completion.

TypeUsername / IDAccess LevelSystem / ApplicationExpiry
VPN        
App User   Standard User    
App Admin   Admin    
Cloud IAM Role        

Passwords and secrets shall be transmitted via a separate secure channel (not included in this document).

Section 6

Client Acknowledgements

By signing this document, Client acknowledges and agrees that:

  • ☐  All systems listed in Section 2 are owned by or under the lawful control of Client;
  • ☐  All necessary third-party authorizations (cloud providers, ISPs, hosting providers) have been obtained;
  • ☐  Client's legal counsel has reviewed and approved this engagement;
  • ☐  Testing activities may cause temporary performance degradation on tested systems;
  • ☐  Client has notified its cyber insurance carrier of the scheduled engagement;
  • ☐  Client understands that no penetration test can guarantee complete security;
  • ☐  Client accepts responsibility for obtaining appropriate authorizations from any co-tenants in shared cloud environments.

Authorization Signatures

Both parties must sign before any testing activity commences. This document serves as the binding technical authorization for the engagement.

Cynetix LLC β€” Lead Tester

Client β€” Authorized Representative