Authorizing scope for Randori attack and vulnerability validation
Overview
As a Recon Premium or Attack customer, you control the scope of what is authorized for Randori's attack actions to execute
against. This can be done manually in the UI, or you can create Authorization
Policies to auto-authorize Detections that meet the criteria you would like. This article
explains how to set up your authorization, as well as provides a few Authorization Policy examples
for common auto-authorization scenarios. It is highly recommended that you authorize as much as
possible, both publicly and internally, to derive the most value out of Randori and to make the experience as
authentic as possible.
See our article on Attack Safety Considerations for more information on how Randori develops and maintains its library of attack actions.
How To Authorize
- Authorizing by Policy
Authorizing by Policy allows you to ensure any new Detections identified on your attack surface that you own are automatically authorized for penetration testing. Randori removes entities that are no longer responding after a certain amount of time, and, should those entities be re-discovered, authorizing by Policy ensures they will be re-authorized for penetration testing. You can leverage network blocks, hostnames, identified ports, paths and more filters to ensure you are authorizing entities that are owned by your organization. Your Authorization Policies can be found within your settings as shown below:

Edits to policies occur on a 30-minute cadence. If you edit, create, enable, disable, or delete a Policy, it will take 30 minutes before you see these changes in your platform. Additionally, disabling or deleting a Policy will remove the Authorization Status for that Policy unless it was authorized by another Policy or manually.
See the
Example Authorization Policiessection below for examples of the most common authorization policies to add. - Authorizing Manually
As you review your attack surface, it is likely you will see entities you know are yours and just don’t feel like creating a Policy at the time. These entities can be authorized manually with the click of a button. However, it is still recommended to authorize by Policy. Should the entity go undiscovered after several scans, it will fall off of your attack surface. Upon return, the entity will not retain its previous Authorization Status and you may find yourself re-authorizing entities you have already reviewed.
Filter Detections by How They Were Authorized
You can identify the Policy or Policies that Authorized a Detection, as well as if it was authorized "manually” via the Authorization Source column found on the Detections Page.
In order to search on this column, you are required to use the Policy ID when
filtering for all Detections authorized by a particular Authorization Policy. This Policy
ID can quickly be identified by clicking on the name of the Policy found in the
Authorization Source Column on the Detections page, or by pulling up the Policy
Details from the Authorization Policy page under Settings.

If you want to search for all “manually” authorized Detections, use “MANUALLY-AUTHORIZED" as the Policy ID
To actually perform the search, click “Configure View” on the Detections page, add a rule for
“Authorization Source”, and paste the copied Policy ID value (or type
MANUALLY-AUTHORIZED). After applying this view, you will be able to see Detections
authorized by the specific Policy. In the image below, you’ll see an example searching for
Detections authorized either by the Policy authorize all webernets.online or
manually authorized:

Reviewing Your Manually Authorized Detections
It is strongly recommended that you continue to review all of your Detections that are
only authorized via Manual to ensure you intend for
them to remain authorized. To do this, filter your Detections page looking for Detections where
Authorization Source CONTAINS MANUALLY-AUTHORIZED and then
filtering out Detections that are also authorized by one of your Authorization Policies by also
doing Authorization Source DOES NOT CONTAIN [Policy ID] as shown
here:

If you find detections you no longer wish to have authorized, simply check them off (in bulk),
click the MORE menu at the top right of the Detections table, and select
Unauthorize. This will remove all MANUAL authorization status, though if Authorized
by a Policy as well the Detection will remain authorized until you update, disable, or delete the
Policy that is also authorizing it.
