| Field | Details |
|---|---|
| SOW Number | |
| Client Name | |
| Engagement Name | |
| MSA Reference | CYN-MSA- |
| Engagement Type | |
| Testing Methodology | ☐ Black Box ☐ Gray Box ☐ White Box |
| Proposed Start Date | |
| Proposed End Date | |
| Report Delivery Date | |
| Total Engagement Fee | $ |
| Role | Name | Title | Phone | |
|---|---|---|---|---|
| Cynetix Project Lead | ||||
| Client Technical POC | ||||
| Client Executive Sponsor | ||||
| Emergency / Stop Contact |
Cynetix shall perform the following services during this engagement:
The following assets are explicitly authorized for testing. Testing shall be limited strictly to these assets:
The following systems and actions are explicitly excluded from this engagement and shall not be tested or performed under any circumstances:
Testing Environment: ☐ Production ☐ Staging / QA ☐ Development ☐ Mixed
Special environment notes or access requirements:
| Phase | Activity | Start | End | Permitted Hours |
|---|---|---|---|---|
| Kickoff | Scoping call, credential handoff, environment access | Business hours | ||
| Reconnaissance | Passive & active information gathering | ☐ 24/7 ☐ Business hrs | ||
| Active Testing | Exploitation, lateral movement, privilege escalation | ☐ 24/7 ☐ Business hrs | ||
| Reporting | Analysis, report writing, internal review | Internal | ||
| Debrief | Report delivery, findings walkthrough, Q&A | Business hours | ||
| Retest | Verification of remediated vulnerabilities | Business hours |
Upon completion of active testing, Cynetix shall deliver the following:
| Deliverable | Description | Format | Timeline |
|---|---|---|---|
| Executive Summary Report | High-level findings, risk ratings, and strategic recommendations for non-technical leadership | Per SOW schedule | |
| Technical Report | Detailed vulnerability descriptions, evidence (screenshots, PoC), CVSS scores, and remediation steps | Per SOW schedule | |
| Finding Tracker | Spreadsheet of all findings with severity, status, and remediation owner fields | XLSX | With report |
| Debrief Presentation | Walkthrough of key findings, attack chains, and remediation priorities | Video call / Slides | Within 5 days of report |
| Retest Report | Verification of remediated issues with pass/fail status | After remediation |
All reports are delivered via secure encrypted channel. Raw data, logs, and exploit code are not included in deliverables by default; inclusion requires separate written agreement.
| Milestone | Amount | Due Date |
|---|---|---|
| Kickoff Payment (50%) — Due upon SOW execution | $ | |
| Completion Payment (50%) — Due upon report delivery | $ | Upon delivery |
| Total Engagement Fee | $ |
Additional expenses (travel, lodging) if applicable: ☐ Included in fee ☐ Billed separately at cost
This SOW is based on the following assumptions. If any assumption proves incorrect, Cynetix reserves the right to adjust scope, timeline, or fees accordingly with Client's written consent:
This Statement of Work is incorporated into the Master Service Agreement and is binding upon execution. By signing, Client confirms in-scope assets are owned or lawfully controlled by Client and authorizes Cynetix to perform the services described herein.