The rules of engagement, or ROE, dictate the “how” involved in accomplishing assessment of what was defined in the scope after the shaping phase is complete. The legitimacy and legality of all actions the red team takes while conducting the assessment are ratified by the ROE. A well-established and agreed-to ROE document must be acknowledged and signed by both customer and providing parties. If not, the offensive security engagement by ethical hackers is considered in violation of the Computer Fraud and Abuse Act (CFAA), which constitutes a federal crime in the United States; ...
5. Rules of Engagement
Get Professional Red Teaming: Conducting Successful Cybersecurity Engagements now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.