Authority Delegation Matrix Template

Informative Appendix (non-normative)

This appendix provides an illustrative template for documenting who can approve which autonomous penetration testing actions, at which autonomy levels, and under which escalation conditions. It supports the Authority Delegation Matrix required by APTS-HO-004 and the decision audit trail required by APTS-HO-005. It does not prescribe one mandatory format for every organization.

Purpose

APTS-HO-004 requires organizations operating autonomous penetration testing systems to maintain a documented Authority Delegation Matrix (ADM). This appendix provides one practical way to show whether approval authority is current, role-based, scoped to action risk, and auditable.

In this illustrative template, the ADM is treated as the cross-reference point for approval authority. Engagement-specific artifacts such as Rules of Engagement may reference the ADM by matrix_id, version, role identifier, or approval ticket. They should avoid redefining approval authority in ways that conflict with the documented ADM.

This appendix shows:

Primary Use Cases

An Authority Delegation Matrix can be used to document:

Design Principles

An Authority Delegation Matrix should:

The field names below are illustrative. Operators may use equivalent fields, schemas, workflow records, or identity-governance artifacts if they preserve the authority, escalation, and auditability information required by the relevant normative requirements.

1. Matrix metadata

Use stable identifiers and review dates so customers can tell whether the matrix is current.

Recommended fields:

2. Role catalog

Define each role once before assigning authority.

Recommended fields:

A backup role should be a role already approved in the ADM, not an ad hoc delegation by the primary approver. delegation_allowed should normally be false unless another formal governance process explicitly creates and records the updated ADM authority. authorized_autonomy_levels describes routine approval authority for that role; emergency activation authority, such as kill-switch activation, can be documented separately in the authority matrix or emergency authority sections.

3. Authority matrix

Capture approval authority by action category, autonomy level, and risk threshold.

Recommended fields:

Suggested action categories include:

4. Emergency authority

Document emergency-only authority separately so it cannot be confused with routine approval authority.

Recommended fields:

5. Review and revocation history

Track changes to authority assignments over time.

Recommended fields:

Example YAML Template

matrix_id: adm-2026-001
organization: Example Security Operations
engagement_id: eng-2026-001
version: "1.0"
effective_from: "2026-04-01T00:00:00Z"
expires_on: "2026-07-01T00:00:00Z"
owner_role: Head of Offensive Security
last_reviewed_at: "2026-04-01T12:00:00Z"
approved_by_role: CISO
approved_by_identity_reference: exec-directory-ref-123
approved_at: "2026-04-01T12:00:00Z"
approval_reference: signed-adm-approval-2026-041
signature_record: e-signature-envelope-2026-041
classification: confidential-operational

role_catalog:
  - role_id: ho-role-operator
    role_name: Autonomous Testing Operator
    minimum_qualification:
      - internal APTS operator training
      - engagement-specific Rules of Engagement briefing
    training_required: annual plus engagement-specific
    mfa_required: true
    employment_or_contract_status: approved staff or approved contractor
    authorized_autonomy_levels: [L1, L2]
    assignment_source: identity-governance-group
    active_operator_roster_reference: iam-group-apts-operators
    pre_authorized_backup_role: ho-role-senior-operator
    delegation_allowed: false

  - role_id: ho-role-senior-operator
    role_name: Senior Autonomous Testing Operator
    minimum_qualification:
      - senior offensive security review qualification
      - prior autonomous testing approval experience
    training_required: annual plus high-risk action approval training
    mfa_required: true
    employment_or_contract_status: approved staff
    authorized_autonomy_levels: [L1, L2, L3]
    assignment_source: identity-governance-group
    active_operator_roster_reference: iam-group-apts-senior-operators
    pre_authorized_backup_role: ho-role-manager-on-call
    delegation_allowed: false

  - role_id: ho-role-manager-on-call
    role_name: Security Manager On-Call
    minimum_qualification:
      - incident commander training
      - customer escalation authority
    training_required: annual incident and escalation training
    mfa_required: true
    employment_or_contract_status: approved staff
    authorized_autonomy_levels: [L1, L2, L3, L4]
    assignment_source: on-call-roster
    active_operator_roster_reference: shift-roster-2026-04-01-day
    pre_authorized_backup_role: ho-role-ciso
    delegation_allowed: false

  - role_id: ho-role-ciso
    role_name: CISO Emergency Authority
    minimum_qualification:
      - executive risk acceptance authority
    training_required: annual emergency authority review
    mfa_required: true
    employment_or_contract_status: executive officer
    authorized_autonomy_levels: [L1, L2, L3, L4]
    assignment_source: executive-authority-registry
    active_operator_roster_reference: executive-duty-roster
    pre_authorized_backup_role: null
    delegation_allowed: false

authority_matrix:
  - action_category: exploitation_attempt
    autonomy_levels: [L1, L2]
    approval_authority_roles:
      - ho-role-senior-operator
    maximum_risk_or_impact: below the matrix's dual-control threshold and within the documented impact threshold for this role
    dual_control_required: false
    secondary_approver_role: null
    cascading_authority_chain:
      - ho-role-senior-operator
      - ho-role-manager-on-call
      - ho-role-ciso
    escalation_role: ho-role-manager-on-call
    default_safe_action_if_unavailable: deny_action_and_skip_target
    evidence_required_before_approval:
      - target is in approved scope
      - impact classification completed
      - applicable APTS-HO-001 and APTS-SC-006 approval gates evaluated
      - rollback or stop condition documented

  - action_category: critical_exploitation_attempt
    autonomy_levels: [L1, L2, L3, L4]
    approval_authority_roles:
      - ho-role-senior-operator
      - ho-role-manager-on-call
    maximum_risk_or_impact: CVSS >= 9.0 or critical-service impact possible
    dual_control_required: true
    minimum_independent_approvers: 2
    approver_independence_rule: approvers must be separate authenticated individuals, and at least one must hold ho-role-manager-on-call or higher
    secondary_approver_role: ho-role-manager-on-call
    cascading_authority_chain:
      - ho-role-manager-on-call
      - ho-role-ciso
    escalation_role: ho-role-ciso
    default_safe_action_if_unavailable: pause_and_escalate
    evidence_required_before_approval:
      - target is in approved scope
      - customer authorization permits high-risk exploitation
      - explicit stop condition documented
      - customer notification path confirmed

  - action_category: scope_redirect
    autonomy_levels: [L2, L3, L4]
    approval_authority_roles:
      - ho-role-manager-on-call
    maximum_risk_or_impact: assets within the authorized engagement scope only
    dual_control_required: false
    secondary_approver_role: null
    cascading_authority_chain:
      - ho-role-manager-on-call
      - ho-role-ciso
    escalation_role: ho-role-ciso
    default_safe_action_if_unavailable: do_not_expand_scope
    evidence_required_before_approval:
      - updated Rules of Engagement reference
      - scope validation result
      - customer approval reference

  - action_category: kill_switch_activation
    autonomy_levels: [L1, L2, L3, L4]
    authorized_activation_roles:
      - ho-role-operator
      - ho-role-senior-operator
      - ho-role-manager-on-call
      - ho-role-ciso
    maximum_risk_or_impact: any suspected safety, scope, legal, or customer-impact condition
    dual_control_required: false
    secondary_approver_role: null
    cascading_authority_chain:
      - ho-role-operator
      - ho-role-senior-operator
      - ho-role-manager-on-call
      - ho-role-ciso
    escalation_role: ho-role-ciso
    shift_or_handoff_reference: shift-roster-2026-04-01-day
    default_safe_action_if_unavailable: any_currently_assigned_authorized_operator_may_activate
    evidence_or_record_required:
      - no pre-approval required for emergency kill activation
      - post-activation review record retained if applicable

emergency_authority:
  - emergency_condition: suspected_out_of_scope_activity
    authorized_roles:
      - ho-role-operator
      - ho-role-senior-operator
      - ho-role-manager-on-call
      - ho-role-ciso
    activation_channel: dashboard or out-of-band emergency channel
    authentication_requirement: mfa_or_emergency_break_glass_code
    notification_targets:
      - engagement manager
      - customer contact
      - incident response lead
    post_activation_review_required: true

review_and_revocation_history:
  - change_id: adm-change-001
    changed_at: "2026-04-01T12:00:00Z"
    changed_by: Head of Offensive Security
    change_type: initial_approval
    affected_role_or_authority: all
    reason: new engagement authority baseline
    approval_reference: approval-ticket-2026-041

Coverage Checklist

When reviewing an ADM with this template, check whether it contains authority rows or equivalent references for at least:

Reviewer Questions

When using this template to inspect an Authority Delegation Matrix, reviewers can ask:

This template can help operators and reviewers implement or verify:

Notes

The examples above do not change kill-switch timing, authorization, or handoff requirements. For kill-switch behavior, APTS-SC-009 defines halt timing and independent mechanisms, while APTS-HO-009 defines multi-operator authority and handoff expectations.

This appendix is intentionally lightweight. Organizations may implement the matrix in identity governance systems, approval workflows, ticketing platforms, or signed operating procedures as long as authority remains explicit, current, access-controlled, and auditable.