0% found this document useful (0 votes)
430 views5 pages

Vapt Agreement

This document outlines a Vulnerability Assessment and Penetration Testing (VAPT) Agreement between a Client and a Service Provider, detailing the scope of work, client responsibilities, methodology, confidentiality, reporting, legal compliance, liability limitations, fees, and termination terms. The Service Provider will conduct VAPT to identify vulnerabilities in the Client's systems, following industry best practices and legal regulations. Both parties agree to maintain confidentiality and ensure ethical conduct throughout the engagement.

Uploaded by

MIKAEL LIEw
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
430 views5 pages

Vapt Agreement

This document outlines a Vulnerability Assessment and Penetration Testing (VAPT) Agreement between a Client and a Service Provider, detailing the scope of work, client responsibilities, methodology, confidentiality, reporting, legal compliance, liability limitations, fees, and termination terms. The Service Provider will conduct VAPT to identify vulnerabilities in the Client's systems, following industry best practices and legal regulations. Both parties agree to maintain confidentiality and ensure ethical conduct throughout the engagement.

Uploaded by

MIKAEL LIEw
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Vulnerability Assessment and Penetration Testing (VAPT) Agreement

This Vulnerability Assessment and Penetration Testing Agreement (the "Agreement") is


entered into by and between [Client Name], a [Client’s Legal Structure] with its principal
office located at [Client’s Address] (hereinafter referred to as "Client"), and [Service Provider
Name], a [Provider’s Legal Structure] with its principal office located at [Provider’s Address]

(hereinafter referred to as "Service Provider"). The effective date of this Agreement shall be
the date of last signature below.

1. Definitions

For the purposes of this Agreement, the following terms shall have the meanings set forth
below:

• Vulnerability Assessment: The process of identifying, quantifying, and prioritizing


vulnerabilities in a system.

• Penetration Testing: The process of simulating real-world cyberattacks to identify


exploitable vulnerabilities and evaluate the security of systems.

• Scope of Engagement: The systems, applications, and services that will be tested
under this Agreement.

2. Scope of Work

The Service Provider will conduct a Vulnerability Assessment and Penetration Testing
(VAPT) for the Client on the systems and network infrastructure identified in the Scope of
Engagement document. The testing shall be conducted in accordance with industry best
practices, such as those outlined by OWASP, NIST, and PTES.

The testing will include, but not be limited to:

• Network Penetration Testing: Assessing the internal and external network for
vulnerabilities.

• Web Application Testing: Assessing the security of web-based applications.

• Social Engineering: Conducting simulated phishing campaigns and other social


engineering tactics to assess employee security awareness.

• Wireless Network Testing: Evaluating the security of wireless networks and access
points.

• Cloud Security Assessment: Identifying vulnerabilities in cloud-based services (if


applicable).
3. Client Responsibilities

The Client agrees to provide the Service Provider with the necessary access to systems,
applications, and infrastructure required for the VAPT. The Client shall also ensure that all
permissions and legal authorizations are in place to allow the Service Provider to perform
the testing. In particular, the Client will:

• Grant access to internal systems, networks, and cloud infrastructure as needed.

• Ensure that all personnel required for engagement (e.g., IT team members) are
available to assist.

• Ensure testing will not impact any live or production systems critical to business
operations, unless otherwise agreed upon.

The Client is responsible for providing a Scope of Engagement document which clearly
defines which assets, systems, and networks are to be included in the testing, and
which shall be excluded.

4. Methodology

The Service Provider will conduct the VAPT using a combination of automated and manual
testing techniques. The Service Provider will follow the guidelines and methodologies as
recommended by OWASP (Open Web Application Security Project), NIST (National Institute
of Standards and Technology), and PTES (Penetration Testing Execution Standard) to ensure
a comprehensive and rigorous testing process.

Specific activities include, but are not limited to:

• Reconnaissance: Identifying the target network and systems, including open ports,
services, and versions.

• Vulnerability Scanning: Using industry-standard tools to identify known


vulnerabilities.

• Exploitation: Attempting to exploit identified vulnerabilities to evaluate their risk and


potential impact.

• Post-Exploitation: Identifying potential data exfiltration, privilege escalation, or


lateral movement techniques.

Testing will be non-disruptive, with a focus on identifying security weaknesses without


causing damage to systems or data. The Service Provider will not engage in destructive
testing unless explicitly approved by the Client.
5. Confidentiality and Data Protection

Both parties agree to maintain strict confidentiality of all information exchanged during the
term of this Agreement. The Service Provider will handle all data with due care, in
compliance with relevant data protection laws and regulations, such as GDPR (General Data
Protection Regulation) or CCPA (California Consumer Privacy Act), depending on the Client's
location.

• Service Provider agrees not to disclose or use any information obtained during
testing for any purpose other than the execution of this engagement.

• Client acknowledges that the findings and reports from the testing may contain
sensitive information and must be safeguarded.

The Service Provider shall return or destroy all confidential information at the conclusion of
the testing unless otherwise agreed in writing.

6. Reporting and Deliverables

Upon completion of the VAPT, the Service Provider shall provide the Client with the following
deliverables:

• Executive Summary: A high-level overview of the testing, findings, and overall


security posture.

• Technical Findings Report: A detailed report outlining each identified vulnerability,


including risk severity ratings (using industry-standard CVSS scores), evidence, and
suggested remediation actions.

• Remediation Recommendations: Actionable advice on how to address the


discovered vulnerabilities, including technical steps and best practices.

The final deliverables shall be provided within [X] days after the completion of the testing
phase. The Client will have [X] days from the receipt of the report to request clarification or
additional details from the Service Provider.

7. Legal Compliance

The Service Provider agrees to conduct all testing in compliance with applicable laws and
regulations, including those pertaining to cybersecurity, privacy, and data protection. The
testing will be performed in an ethical manner, respecting the rights and privacy of
individuals, and ensuring no harm comes to the Client’s operations.

In addition, the Service Provider will ensure that the testing is conducted in alignment with
any relevant industry standards, including those set forth by:

• OWASP (Open Web Application Security Project)


• NIST (National Institute of Standards and Technology)

• ISO/IEC 27001 (Information Security Management Systems)

8. Limitation of Liability

The Service Provider will perform the VAPT to the best of their ability and in accordance with
industry standards. However, the Client acknowledges and agrees that the Service Provider
cannot guarantee the identification of all vulnerabilities, especially zero-day vulnerabilities or
complex attack vectors that may evade detection.

• The Service Provider shall not be liable for any indirect, incidental, or consequential
damages arising out of the VAPT, including but not limited to data loss, business
interruption, or system downtime, except where such damages are the result of gross
negligence or willful misconduct by the Service Provider.

9. Fees and Payment

The Client agrees to pay the Service Provider the fees as outlined in the Statement of Work
(SOW) or Proposal. Fees may be structured as a flat rate or based on time and materials,
depending on the scope of the engagement. Payments are due according to the terms
specified in the SOW.

• Initial Deposit: [Amount] due upon signing of this Agreement.

• Final Payment: [Amount] due upon completion of the testing phase and submission
of the final report.

Late payments will incur a penalty of [X]% per month.

10. Term and Termination

This Agreement will commence on the effective date and remain in effect until the
completion of the VAPT, unless terminated earlier in accordance with the terms outlined
herein. Either party may terminate this Agreement upon written notice if the other party
fails to fulfill its obligations and does not remedy the failure within [X] days.

Upon termination, the Client agrees to pay for all work performed up to the date of
termination.

11. Governing Law

This Agreement shall be governed by and construed in accordance with the laws of
[Jurisdiction]. Any dispute arising out of or in connection with this Agreement shall be
resolved by [Arbitration/Mediation] in [Location], and both parties consent to the
jurisdiction and venue of such proceedings.
Signatures

By signing below, both parties acknowledge that they have read, understood, and agreed to
the terms of this Agreement.

[Client Name]
Signature: _________________________ Name:
____________________________
Title: _____________________________
Date: _____________________________

[Service Provider Name]


Signature: _________________________ Name:
____________________________
Title: _____________________________
Date: _____________________________

You might also like