Scanner guide16 min read

Scan Target Validation and Authorization: A Production Guide

Validation is not the same as scoping. Scoping decides which assets fall inside the assurance question. Validation proves, before any scan traffic leaves the platform, that each target on the list is owned or authorised by the requester, is reachable for the scan class chosen, clears the blocklist, and carries an authorisation record tied to a named human and a timestamp. Programmes that conflate the two end up with a scope document nobody can defend at the target level when an auditor, a customer, or an abuse complaint asks the question that actually matters.

This guide covers what target validation is, how it differs from scoping, the three control points a defensible validation chain enforces (verification, attestation, and blocklist), how validation handles subdomains and authenticated scans, when validation has to be re-run, and how internal security, AppSec, vulnerability management, and provider workspaces operate target validation as a continuous discipline rather than as a one-time onboarding step.

Validation and scoping answer different questions

Most scanning platforms collapse target validation into the scoping conversation, and the audit evidence collapses with it. The two questions are not the same.

StepQuestion it answersEvidence produced
ScopingWhich assets belong inside the assurance question and which do not?A scope document with inclusion list, exclusion list, scan classes, depth, and rationale.
ValidationCan the scope decision lawfully and safely be executed against each target?A per-target validation record: ownership proof, authorisation attestation, blocklist clearance, and the attribution that ties them to the requester.

The defensible pattern is sequential: scoping decides, validation proves, scanning runs. Each step writes to its own record on the engagement. The scan scoping and target selection guide covers the upstream decision the validation step inherits. This guide picks up where the scope document is finalised and walks through the validation chain that turns the scope into something a scanner can run against without exposure.

The three validation control points

A validation chain that holds up under abuse complaints, customer disputes, and audit scrutiny enforces three control points. Each one fails closed: a missing or invalid artefact at any point stops the scan from running and writes a denial record to the audit trail.

1. Domain ownership verification

The first control point proves administrative control of the target. Three methods cover the common cases: a DNS TXT record placed at the apex (or the relevant subdomain), an HTML meta tag served at the verified URL, and a verification file served from a well-known path. Each method requires the requester to place a marker that only an administrator of the target could place. The verification record carries the method used, the token presented, the timestamp of successful verification, and the requester identity. Verification proves control at the moment of verification; it does not, on its own, prove ongoing authority.

2. Legal attestation of authorisation

The second control point captures a signed declaration by a named individual with authority to authorise security testing. The attestation states that the listed target is owned or controlled by the signer organisation, that the scanning activity falls within the scope of the signer authority, and that the target is not subject to a third-party agreement that prohibits scanning. The attestation is captured immutably with signer identity, IP, user agent, and timestamp before any scan traffic is dispatched. The combination of verification and attestation is what lets the platform answer the question who authorised this scan with one queryable record rather than a reconstructed email thread.

3. Platform blocklist enforcement

The third control point fails closed against categories of target the requester cannot lawfully authorise testing for, regardless of what the verification or the attestation claims. Government and military TLDs, critical infrastructure, cloud provider management and control planes, internet infrastructure, and the scanning platform own infrastructure are blocked at the platform layer. The blocklist is not configurable per workspace because authority to override it does not exist at the customer layer. The denial is logged with a reason code so the attempt and its refusal are part of the audit record.

For the broader operating context the verification record sits inside, the domain verification feature covers the workspace-level mechanics, and the responsible scanning guide covers the rationale behind the verification methods.

Ownership verification: what each method proves

The three verification methods are not interchangeable. Each carries a different evidence weight and a different operational profile, and the validation step records which method produced the verification so the audit reader can interpret the proof.

DNS TXT record

A DNS TXT record at the apex (or specific subdomain) carrying the verification token. DNS TXT verification carries strong evidence weight because the record can only be placed by someone with administrative access to the authoritative DNS zone. It works for the apex domain and for any subdomain whose DNS the same administrator controls. It does not, on its own, authorise wildcard or dynamically-provisioned subdomains.

HTML meta tag

A meta tag served by the target page carrying the verification token. Meta tag verification proves write access to the served HTML at the verified URL at the moment of verification. It is convenient where DNS access is gated behind a separate team but is more easily lost on platform changes (CMS migration, edge caching that strips the tag, header conflicts that move the tag below the fold of the parser). The verification step records the URL the tag was found on so the evidence path is reproducible.

Verification file at /.well-known

A static file served from the /.well-known directory of the target carrying the verification token. File-upload verification follows the IETF /.well-known convention used by Let Encrypt, security.txt, and similar verification flows. It proves write access to the well-known path on the target server at the moment of verification. The file path and content are recorded so the audit reader can reconstruct the proof.

All three methods produce a verification record that pairs with the attestation. The record names the method, the verifier identity, the verification timestamp, and the policy window after which re-verification is required.

Subdomains, wildcards, and shared infrastructure

The most common validation gap is the subdomain that quietly extends beyond the verified surface. A DNS TXT record on the apex domain proves control of the apex zone; it does not, on its own, prove authority to scan a third-party SaaS subdomain that the marketing team configured as a CNAME. The defensible pattern enumerates the in-scope subdomains explicitly and validates each one.

Subdomain enumeration before validation

The validation step expands the scope into a concrete subdomain list using certificate transparency logs, the workspace DNS records, the customer-supplied inventory, and any continuous discovery output. Subdomains that resolve to third-party infrastructure (SaaS vendors, payment processors, CDN edges) are separated from subdomains the requester controls. Each remaining subdomain is validated as an independent target, not as an inherited claim against the parent.

Wildcards as a deliberate exception

Wildcard inclusions look efficient and create the largest validation gaps. A wildcard can sweep dynamically-registered tenant subdomains the requester has no authority over. The defensible pattern is to refuse wildcards by default, allow them only as a documented exception with a named authoriser and an explicit acknowledgement that the authoriser accepts responsibility for any tenant subdomain that resolves under the wildcard, and re-validate the wildcard on a shorter cadence than other inclusions.

Shared infrastructure stays out of validation

Cloud provider management and control planes, third-party CDNs, payment processors, DNS resolvers, and logging vendors are not the requester to validate. The requester does not have authority over infrastructure they do not control, regardless of whether the application traffic transits the infrastructure. The platform blocklist enforces this category separately from the workspace verification step so a requester cannot accidentally authorise scanning of a cloud provider control plane through a verification record on an application subdomain.

Authenticated scan target validation

Authenticated scans need three additional validation steps on top of the external chain. Each one produces an evidence artefact that pairs with the verification and the attestation.

Credential ownership and authority

The credential supplied for the authenticated scan has to belong to an account inside the in-scope application, with permissions consistent with the assurance question. A workspace administrator credential supplied for a scope that targets the unauthenticated marketing site fails the authority check. A test account provisioned outside the in-scope environment fails the credential ownership check. The validation step records the credential type, the account scope, and the authoriser who confirmed the credential belongs to the application.

Operation-class authorisation

Authenticated scanners can exercise destructive operations (delete, transfer, payment) if the scan plan authorises them. The validation step makes the operation class explicit. The default position excludes destructive operations, payment endpoints, data export endpoints, and irreversible state changes unless the assurance question demands them. Operation-class authorisation is recorded as a positive list (the operations the scanner may exercise) rather than as a negative list (the operations the scanner must avoid), so the evidence reads as what was permitted rather than what was hoped to be excluded.

Environment isolation where required

Where the assurance question targets a production environment, the validation step records that the application owner has authorised production scanning, that the rate plan and the credential class are appropriate for production, and that rollback paths exist for any state change the scanner could induce. Where the assurance question targets a staging environment, the validation step records the staging environment isolation discipline (data parity with production, separate credential namespace, separate billing path) so the scanner output reads against a defensible reference environment.

The credential record itself is a perishable artefact. The scanner credential rotation and lifecycle guide covers the rotation cadence the credential authorisation has to keep up with.

Blocklist categories that fail closed

Five categories of target are non-negotiable on a multi-tenant scanning platform. The platform refuses each category at the validation layer regardless of what the workspace verification or attestation claims, because the requester cannot lawfully authorise testing of infrastructure they do not control.

Government and military

Domains and TLDs operated by national, state, or local governments and the armed services. Examples include .gov, .mil, .gov.uk, .mod.uk, .police.uk, and equivalents in other jurisdictions. Authorisation to test government and military systems flows through formal procurement and authorisation pathways that do not terminate at a workspace attestation.

Critical infrastructure

Healthcare networks, electoral systems, public-safety services, and other critical-sector platforms whose disruption would cause public harm. The category names the platforms that name themselves as critical and the platforms regulators have designated. The block is precautionary; lawful scanning of critical infrastructure runs through formal sector pathways rather than through a self-attestation flow.

Cloud provider control planes

AWS, Azure, Google Cloud, Cloudflare, and similar provider management and edge infrastructure. The cloud provider terms of service themselves prohibit scanning of provider infrastructure outside narrow vendor-administered programmes. The block separates application traffic (which a requester can authorise where they control the application) from provider infrastructure (which they cannot).

Internet infrastructure

ICANN, IANA, root DNS servers, public certificate transparency logs, and similar shared internet infrastructure. The category captures the operators of the shared substrate of the internet, where any scanning attempt is, by definition, outside the requester authority.

Scanning platform own infrastructure

Self-targeting attempts (scanning the scanning platform domains) are blocked at the validation layer. Some scanner workflows treat the platform as a benign target during configuration testing; the validation step refuses and records the attempt so the operating record reflects the request and its denial.

When validation has to be re-run

Validation is not a one-time onboarding step. Five triggers re-open the chain. Each trigger produces a new validation record rather than appending to the old one, so the chronology of authorisation is reconstructable across the lifecycle.

  • Verification record age: the verification has aged beyond the policy window. Typical windows are 90 to 365 days. The defensible pattern aligns the window with the broader credential and access review cadence rather than treating verification as permanent.
  • Asset transfer signal: DNS, certificate issuer, hosting, or registrar has changed in a way that suggests transfer or ownership change. The validation step re-runs verification before the next scan, and the prior record is retained as evidence of the chain transition.
  • Authoriser change: the named authoriser on the attestation has left the organisation, the team membership has changed, or the workspace owner has been transferred. A new attestation is captured against the current authoriser before the next scan.
  • Scan-class expansion: an authenticated scan added on top of a previously external-only authorisation requires a new attestation that covers credentials and authenticated paths. The previous external attestation is not silently extended.
  • Customer or regulator request: a renewed assurance question (audit cycle change, regulator inquiry, customer renewal of authorisation) produces a fresh attestation. The prior attestation remains in the record as part of the chronology.

For the cadence that pairs with re-validation, the scan scheduling and baseline cadence guide covers how scheduled scans interact with the validation window, and the scan evidence retention and governance guide covers how the validation evidence is retained alongside the scan record.

How compliance frameworks read target authorisation evidence

Frameworks read target validation evidence in two places: the technical vulnerability management control (does the programme scan the right targets, with authority) and the access control narrative (did the requester have authority to direct the scan). The expectations below set the floor; programmes justify additional discipline on a risk basis.

  • PCI DSS v4.0 Requirement 11.3 expects internal and external scans against the in-scope cardholder data environment, with evidence the scope is correct and the scans are authorised. The validation record demonstrates the authorisation side of the requirement, alongside the scan cadence.3
  • PCI DSS v4.0 Requirement 12.5 expects maintenance of an asset inventory tied to the cardholder data environment. The validation record reconciles the asset inventory to the in-scope target list so the scan output reads against the documented scope.3
  • ISO 27001:2022 Annex A 8.8 (technical vulnerability management) expects a documented programme. The validation record evidences that scans operate against the right targets with authority, which is the precondition the control depends on.5
  • ISO 27001:2022 Annex A 5.20 (information security in supplier agreements) is read against the validation record when scans run on infrastructure operated by suppliers, so the supplier authorisation chain reconciles to the per-target validation chain.4
  • SOC 2 Trust Services Criterion CC6.1(logical and physical access controls) reads the attestation as evidence the scanner traffic is an authorised activity inside the access control framework rather than an external test.6
  • NIST SP 800-53 RA-5 (vulnerability monitoring and scanning) and CA-2 (control assessments) expect authorisation for the scanning activity as part of the assessment plan. The validation chain is the operational form of the authorisation the control language describes.2

Two legal frames sit underneath the framework expectations. The Computer Fraud and Abuse Act in the United States and the Computer Misuse Act 1990 in the United Kingdom both make unauthorised access an offence regardless of whether the access produces harm. The authorisation attestation is the artefact that distinguishes authorised from unauthorised activity in the operational record.8,9

Operational checklist for a defensible target validation chain

At workspace onboarding

  • Each in-scope domain has a verification record with the method, token, and timestamp.
  • Subdomains in scope are validated explicitly rather than inherited from the apex.
  • Wildcards are refused by default and recorded as an exception only when justified.
  • The first attestation is captured before the first scan, with signer identity, IP, and timestamp.
  • The attestation references the in-scope target list and the authorised scan classes.

Before each scan dispatch

  • The scan request reconciles to a current verification record for each target.
  • The scan request reconciles to a current attestation for the scan class requested.
  • The scan target clears the platform blocklist; denials are logged with the reason code.
  • Authenticated scans carry a credential authorisation record naming the operations permitted.
  • Per-target rate limits and cooldowns are checked before dispatch.

During the scan lifecycle

  • The scan execution record references the validation record that authorised it.
  • State changes (new finding, suppression, acceptance) carry the actor and timestamp.
  • Activity log entries bracket each scan with the dispatch and completion records.
  • Validation re-evaluation triggers (registrar transfer, authoriser change, scan-class expansion) produce new records.
  • Out-of-scope traffic attempts are denied at the validation layer and surface as alerts rather than as quiet failures.

At audit or dispute

  • Each scan execution traces in one query to its validation chain.
  • The verification record carries the method, the verifier, and the verification timestamp.
  • The attestation record carries signer identity, IP, user agent, and the timestamp.
  • Blocklist denials are visible alongside successful scans so the operating posture reads as the full record.
  • Re-validation events are documented as part of the chronology rather than as overwrites.

For internal security, AppSec, and vulnerability management teams

Internal security teams operate target validation as the precondition that makes the rest of the vulnerability programme defensible. The discipline applies whether the scanner is operated in-house, by a managed service, or by a security testing provider running scans against the workspace target list.

  • Hold verification records per target with the method, the verifier identity, and the verification timestamp.
  • Capture the attestation against the current authoriser before each material change to the target list or scan class.
  • Treat wildcards as deliberate exceptions that re-validate on a shorter cadence than other inclusions.
  • Reconcile the asset inventory to the validated target list so the scope and the validation chain agree.
  • Wire the validation evidence to the scan execution record so the audit chain is one record, not a reconstructed thread.

For internal security teams, vulnerability management teams, AppSec teams, and GRC and compliance teams, the operating commitment is to keep the chain from scope to validated target to scan execution single-record-traceable. The security testing program management workflow covers where the validation record sits in the broader programme cadence, and the asset ownership mapping for findings workflow covers the reconciliation between the validated target and the finding owner the remediation path depends on.

How SecPortal handles scan target validation and authorisation

SecPortal enforces the validation chain at the platform layer before any scan worker dispatches traffic. The evidence travels with the scan record on the same workspace, so the question what authorised this scan resolves in one query.

Domain ownership verification with three methods

The workspace verifies each in-scope domain through a DNS TXT record (with a secportal-verify token), an HTML meta tag, or a verification file under the /.well-known path on the target. The verification record carries the method, the token, the verifier, and the verification timestamp. The domain verification feature covers the workspace-level mechanics.

Legal attestation captured immutably

Before the first scan against a verified domain, the workspace user signs an attestation confirming authorisation for the listed targets. The signing event records the signer identity, the IP, the user agent, and the timestamp. The attestation reference travels with each subsequent scan request so the audit chain pairs verification with attestation.

Platform blocklist that fails closed

Government, military, critical infrastructure, internet infrastructure, cloud provider management and control planes, and SecPortal own domains are blocked at the validation layer. The denial returns a structured guard code (BLOCKLISTED, DOMAIN_NOT_VERIFIED, DOMAIN_EXPIRED, NO_ATTESTATION, COOLDOWN, SCAN_LIMIT, SUBDOMAIN_NOT_ALLOWED, AUTH_NOT_ALLOWED, CREDENTIAL_NOT_FOUND, CREDENTIAL_DOMAIN_MISMATCH) and the request is logged so denials are part of the audit record rather than silent.

Compound scan guard at request time

The platform scan-guard reconciles each scan request against domain verification, attestation, blocklist, plan limits, cooldown, subdomain allowance, authenticated scan eligibility, credential ownership, and credential-to-domain match before the scan worker dispatches. A failure at any check stops the scan and writes the reason code to the activity log.

Activity log records every state change

The activity log captures every verification, attestation, scan request, scan denial, scan completion, and finding state change with timestamp and acting user. CSV export supports audit and dispute review against the workspace record. The activity log feature covers the chain-of-custody record the validation evidence reads against.

Authenticated scan target gating

Authenticated scan targets carry a credential authorisation record alongside the domain verification. Credentials are stored encrypted with AES-256-GCM and associated with a verified domain at registration. A credential mismatch (a credential bound to a different verified domain than the scan request names) fails at the guard layer with CREDENTIAL_DOMAIN_MISMATCH, so the credential and the target stay reconciled. The encrypted credential storage feature covers the credential lifecycle.

For abuse and unauthorised-scanning context, the acceptable use policy covers the platform side of the contract, and the scanner information page covers how the SecPortal scanner identifies itself in target logs.

Related scanner discipline

Target validation pairs with the upstream scoping decision and the downstream scan-evidence record. The pages below cover the surrounding decisions.

For wider context on the responsible-scanning rationale, the responsible scanning guide covers the verification methods themselves, and the security tool coverage overlap research covers how validated target lists across overlapping tools reconcile so the audit chain is single-source.

Scope and limitations of this guide

Target validation is a discipline, not a product feature. No verification method on its own confers authority; no attestation on its own proves administrative control; no blocklist on its own substitutes for the requester due diligence on assets they cannot self-validate. The chain is the artefact, not any single step.

Programmes that treat validation as a one-time onboarding event lose the operating evidence between the first scan and the audit window that reads against it. Programmes that treat validation as a continuous discipline, with re-evaluation on material change and a clean record at each step, produce evidence that survives the audit, the customer dispute, and the abuse complaint without manual reconstruction.

Frequently Asked Questions

Sources

  1. NIST, SP 800-115 Technical Guide to Information Security Testing and Assessment
  2. NIST, SP 800-53 Rev. 5 (CA-2 Control Assessments, RA-5 Vulnerability Monitoring and Scanning)
  3. PCI Security Standards Council, PCI DSS v4.0 (Requirements 11.3, 11.4, 12.5)
  4. ISO/IEC, ISO 27001:2022 Annex A 5.20 Addressing Information Security in Supplier Agreements
  5. ISO/IEC, ISO 27001:2022 Annex A 8.8 Technical Vulnerability Management
  6. AICPA, SOC 2 Trust Services Criteria CC6.1 (Logical and Physical Access Controls)
  7. OWASP, Web Security Testing Guide WSTG (Pre-engagement, Information Gathering)
  8. CFAA, Computer Fraud and Abuse Act, 18 U.S.C. § 1030 (United States)
  9. Computer Misuse Act 1990 (United Kingdom)
  10. CISA, Vulnerability Disclosure Policy Template (responsible disclosure context)
  11. SecPortal, Domain Verification Feature
  12. SecPortal, External Scanning Feature
  13. SecPortal, Authenticated Scanning Feature
  14. SecPortal, Activity Log Feature
  15. SecPortal, Acceptable Use Policy

Make the chain from target to scan execution single-record traceable

SecPortal verifies each in-scope domain through DNS TXT, meta tag, or file upload, captures the legal attestation immutably with IP and timestamp, fails closed on government, critical infrastructure, cloud provider control planes, and platform own domains, and reconciles each scan request through the compound scan-guard before dispatch so the audit chain is one record rather than a reconstructed thread.