Resources · Quick Guide

How to Decide What Should Be in Scope

This guide helps you decide what systems, processes, and boundaries should be included in a security test. It is intended to move scope definition away from asset lists and toward realistic exposure and impact.

How organizations typically get this wrong

Defining scope around system ownership rather than attacker movement. Excluding identity providers, third-party integrations, or shared services because they are “out of scope.” Treating scope as a contractual checkbox instead of a risk decision. Reusing last year’s scope with minimal review.

How penetration testing fits

Penetration testing evaluates specific systems or applications within a defined scope. It is best used when the goal is to validate technical controls or identify exploitable weaknesses.

How attack simulations and red teaming differ

These approaches test how the organization responds to realistic attack paths that span people, process, and technology. The emphasis is on exposure and response, not individual findings.

Choosing the right approach

The right choice depends on readiness, clarity of ownership, and how results will be used. In many cases, starting smaller produces more useful outcomes.

What to do next

Start scope definition by identifying business outcomes an attacker would care about, not systems you want to test. Map the trust relationships, identities, and integrations that connect to those outcomes. Include at least one realistic path from initial access to impact in every scope definition. Treat scope review as a required step before each engagement, not a formality.

×

We've got your back

How can we help?

Max 500 characters


Thank you for contacting us

We look forward to speaking with you soon.


Error

Contact attempt failed.

Please try again, or write to: info@cyfenders.com


Error

Please try again, or write to: info@cyfenders.com


Thank you for joining our startup and small business cyber program

Error

Subscribe attempt failed.

Please try again, or write to: info@cyfenders.com