In IT security - primarily in offensive IT security - the term "scope" is used quite frequently. This term describes the extent and objective of a project or investigation. The client of a penetration test usually defines the scope together with the pentest provider - this can be a web application, an IP address, or a certain number of IT systems that are precisely defined. In the context of physical security, the scope can be, for example, a building or premises that is being checked for vulnerabilities.

Through the exact definition of a project's scope, it can be ensured that the often limited resources are used effectively.

Examples of Scope in IT Security

  1. All web applications on a specific server
  2. An entire ASN or CIDR
  3. The API of an application
  4. The internal network of a company
  5. The external network of a company
  6. An iOS or Android application
  7. The Darknet (in the context of OSINT or Darknet Intelligence)
  8. A specific building or premises (physical security)
  9. A specific vehicle (e.g., a car or an airplane)
  10. A specific person or group of people (Context: Phishing)
  11. A company as a whole (Context: Red Teaming, eASM, ...)

Thank you for your feedback! We will review it and optimize this content.

Do you have feedback on Scope? Tell us!

Damian Strobel
Let's talk about your scope and improve the security of this scope together.