Informative Appendix (non-normative)
This appendix provides an illustrative template for documenting who can approve which autonomous penetration testing actions, at which autonomy levels, and under which escalation conditions. It supports the Authority Delegation Matrix required by APTS-HO-004 and the decision audit trail required by APTS-HO-005. It does not prescribe one mandatory format for every organization.
APTS-HO-004 requires organizations operating autonomous penetration testing systems to maintain a documented Authority Delegation Matrix (ADM). This appendix provides one practical way to show whether approval authority is current, role-based, scoped to action risk, and auditable.
In this illustrative template, the ADM is treated as the cross-reference point for approval authority. Engagement-specific artifacts such as Rules of Engagement may reference the ADM by matrix_id, version, role identifier, or approval ticket. They should avoid redefining approval authority in ways that conflict with the documented ADM.
This appendix shows:
An Authority Delegation Matrix can be used to document:
An Authority Delegation Matrix should:
The field names below are illustrative. Operators may use equivalent fields, schemas, workflow records, or identity-governance artifacts if they preserve the authority, escalation, and auditability information required by the relevant normative requirements.
Use stable identifiers and review dates so customers can tell whether the matrix is current.
Recommended fields:
matrix_idorganizationengagement_id or program_scopeversioneffective_fromexpires_onowner_rolelast_reviewed_atapproved_by_roleapproved_by_identity_referenceapproved_atapproval_referencesignature_recordclassificationDefine each role once before assigning authority.
Recommended fields:
role_idrole_nameminimum_qualificationtraining_requiredmfa_requiredemployment_or_contract_statusauthorized_autonomy_levelsassignment_sourceactive_operator_roster_referencepre_authorized_backup_roledelegation_allowedA backup role should be a role already approved in the ADM, not an ad hoc delegation by the primary approver. delegation_allowed should normally be false unless another formal governance process explicitly creates and records the updated ADM authority. authorized_autonomy_levels describes routine approval authority for that role; emergency activation authority, such as kill-switch activation, can be documented separately in the authority matrix or emergency authority sections.
Capture approval authority by action category, autonomy level, and risk threshold.
Recommended fields:
action_categoryautonomy_levelsapproval_authority_rolesauthorized_activation_rolesmaximum_risk_or_impactdual_control_requiredminimum_independent_approversapprover_independence_rulesecondary_approver_rolecascading_authority_chainescalation_roledefault_safe_action_if_unavailableevidence_required_before_approvalevidence_or_record_requiredSuggested action categories include:
Document emergency-only authority separately so it cannot be confused with routine approval authority.
Recommended fields:
emergency_conditionauthorized_rolesactivation_channelauthentication_requirementnotification_targetspost_activation_review_requiredTrack changes to authority assignments over time.
Recommended fields:
change_idchanged_atchanged_bychange_typeaffected_role_or_authorityreasonapproval_referencematrix_id: adm-2026-001
organization: Example Security Operations
engagement_id: eng-2026-001
version: "1.0"
effective_from: "2026-04-01T00:00:00Z"
expires_on: "2026-07-01T00:00:00Z"
owner_role: Head of Offensive Security
last_reviewed_at: "2026-04-01T12:00:00Z"
approved_by_role: CISO
approved_by_identity_reference: exec-directory-ref-123
approved_at: "2026-04-01T12:00:00Z"
approval_reference: signed-adm-approval-2026-041
signature_record: e-signature-envelope-2026-041
classification: confidential-operational
role_catalog:
- role_id: ho-role-operator
role_name: Autonomous Testing Operator
minimum_qualification:
- internal APTS operator training
- engagement-specific Rules of Engagement briefing
training_required: annual plus engagement-specific
mfa_required: true
employment_or_contract_status: approved staff or approved contractor
authorized_autonomy_levels: [L1, L2]
assignment_source: identity-governance-group
active_operator_roster_reference: iam-group-apts-operators
pre_authorized_backup_role: ho-role-senior-operator
delegation_allowed: false
- role_id: ho-role-senior-operator
role_name: Senior Autonomous Testing Operator
minimum_qualification:
- senior offensive security review qualification
- prior autonomous testing approval experience
training_required: annual plus high-risk action approval training
mfa_required: true
employment_or_contract_status: approved staff
authorized_autonomy_levels: [L1, L2, L3]
assignment_source: identity-governance-group
active_operator_roster_reference: iam-group-apts-senior-operators
pre_authorized_backup_role: ho-role-manager-on-call
delegation_allowed: false
- role_id: ho-role-manager-on-call
role_name: Security Manager On-Call
minimum_qualification:
- incident commander training
- customer escalation authority
training_required: annual incident and escalation training
mfa_required: true
employment_or_contract_status: approved staff
authorized_autonomy_levels: [L1, L2, L3, L4]
assignment_source: on-call-roster
active_operator_roster_reference: shift-roster-2026-04-01-day
pre_authorized_backup_role: ho-role-ciso
delegation_allowed: false
- role_id: ho-role-ciso
role_name: CISO Emergency Authority
minimum_qualification:
- executive risk acceptance authority
training_required: annual emergency authority review
mfa_required: true
employment_or_contract_status: executive officer
authorized_autonomy_levels: [L1, L2, L3, L4]
assignment_source: executive-authority-registry
active_operator_roster_reference: executive-duty-roster
pre_authorized_backup_role: null
delegation_allowed: false
authority_matrix:
- action_category: exploitation_attempt
autonomy_levels: [L1, L2]
approval_authority_roles:
- ho-role-senior-operator
maximum_risk_or_impact: below the matrix's dual-control threshold and within the documented impact threshold for this role
dual_control_required: false
secondary_approver_role: null
cascading_authority_chain:
- ho-role-senior-operator
- ho-role-manager-on-call
- ho-role-ciso
escalation_role: ho-role-manager-on-call
default_safe_action_if_unavailable: deny_action_and_skip_target
evidence_required_before_approval:
- target is in approved scope
- impact classification completed
- applicable APTS-HO-001 and APTS-SC-006 approval gates evaluated
- rollback or stop condition documented
- action_category: critical_exploitation_attempt
autonomy_levels: [L1, L2, L3, L4]
approval_authority_roles:
- ho-role-senior-operator
- ho-role-manager-on-call
maximum_risk_or_impact: CVSS >= 9.0 or critical-service impact possible
dual_control_required: true
minimum_independent_approvers: 2
approver_independence_rule: approvers must be separate authenticated individuals, and at least one must hold ho-role-manager-on-call or higher
secondary_approver_role: ho-role-manager-on-call
cascading_authority_chain:
- ho-role-manager-on-call
- ho-role-ciso
escalation_role: ho-role-ciso
default_safe_action_if_unavailable: pause_and_escalate
evidence_required_before_approval:
- target is in approved scope
- customer authorization permits high-risk exploitation
- explicit stop condition documented
- customer notification path confirmed
- action_category: scope_redirect
autonomy_levels: [L2, L3, L4]
approval_authority_roles:
- ho-role-manager-on-call
maximum_risk_or_impact: assets within the authorized engagement scope only
dual_control_required: false
secondary_approver_role: null
cascading_authority_chain:
- ho-role-manager-on-call
- ho-role-ciso
escalation_role: ho-role-ciso
default_safe_action_if_unavailable: do_not_expand_scope
evidence_required_before_approval:
- updated Rules of Engagement reference
- scope validation result
- customer approval reference
- action_category: kill_switch_activation
autonomy_levels: [L1, L2, L3, L4]
authorized_activation_roles:
- ho-role-operator
- ho-role-senior-operator
- ho-role-manager-on-call
- ho-role-ciso
maximum_risk_or_impact: any suspected safety, scope, legal, or customer-impact condition
dual_control_required: false
secondary_approver_role: null
cascading_authority_chain:
- ho-role-operator
- ho-role-senior-operator
- ho-role-manager-on-call
- ho-role-ciso
escalation_role: ho-role-ciso
shift_or_handoff_reference: shift-roster-2026-04-01-day
default_safe_action_if_unavailable: any_currently_assigned_authorized_operator_may_activate
evidence_or_record_required:
- no pre-approval required for emergency kill activation
- post-activation review record retained if applicable
emergency_authority:
- emergency_condition: suspected_out_of_scope_activity
authorized_roles:
- ho-role-operator
- ho-role-senior-operator
- ho-role-manager-on-call
- ho-role-ciso
activation_channel: dashboard or out-of-band emergency channel
authentication_requirement: mfa_or_emergency_break_glass_code
notification_targets:
- engagement manager
- customer contact
- incident response lead
post_activation_review_required: true
review_and_revocation_history:
- change_id: adm-change-001
changed_at: "2026-04-01T12:00:00Z"
changed_by: Head of Offensive Security
change_type: initial_approval
affected_role_or_authority: all
reason: new engagement authority baseline
approval_reference: approval-ticket-2026-041
When reviewing an ADM with this template, check whether it contains authority rows or equivalent references for at least:
When using this template to inspect an Authority Delegation Matrix, reviewers can ask:
This template can help operators and reviewers implement or verify:
The examples above do not change kill-switch timing, authorization, or handoff requirements. For kill-switch behavior, APTS-SC-009 defines halt timing and independent mechanisms, while APTS-HO-009 defines multi-operator authority and handoff expectations.
This appendix is intentionally lightweight. Organizations may implement the matrix in identity governance systems, approval workflows, ticketing platforms, or signed operating procedures as long as authority remains explicit, current, access-controlled, and auditable.