Code of Ethics
Our Code of Ethics Policy serves as a guiding framework for our penetration testers, cybersecurity experts, and other network experts outlining the principles and values that govern our behavior and interactions both within the company and with our clients, partners, and stakeholders.
This Code of Ethics reflects our commitment to honesty, transparency, accountability, and respect for all individuals and entities with whom we engage. It encompasses our core values and sets forth the expectations and responsibilities of every member of our organization.
At DragonX Offensive Securities,, we hold ourselves to the highest standards of ethical conduct and integrity in all aspects of our business operations.
1. No Unauthorized Access
- We recognize the importance of access controls in safeguarding sensitive information and resources.
- We adhere to access policies and procedures established by our clients and our company, ensuring that access is granted only to authorized individuals based on legitimate business needs.
2. No Database Leak
- We understand the critical role of user credentials in verifying the identity and permissions of individuals accessing systems and data.
- We never share, disclose, or compromise user credentials, including passwords, access keys, or authentication tokens, whether internally or externally.
3. No Exploits
- We refrain from using exploits or techniques that could cause harm to systems, networks, or data beyond the scope of the authorized testing.
- We never exploit vulnerabilities for malicious purposes or cause damage to systems.
4. Adherence to Scope
- We apply the principle of least privilege to limit access rights and permissions to the minimum necessary for individuals to perform their job responsibilities effectively.
- We avoid granting excessive privileges that could increase the risk of unauthorized access or misuse of resources.
5. Reporting and Mitigating Security Incidents
- We thoroughly document our testing activities, including the methodologies used, vulnerabilities discovered, and actions taken during testing.
- We collaborate with incident response teams to mitigate the impact of security breaches and prevent further unauthorized access. transparency and accountability.
6. Respect for Confidentiality
- We handle all client data with the utmost care and implement robust security measures to protect it from unauthorized access or disclosure or misuse
- We do not disclose any confidential information without proper authorization, and we strictly adhere to confidentiality agreements with our clients.
7. Respect for Privacy
- We respect the privacy rights of individuals whose data may be involved in testing activities.
- We believe in anonymizing or pseudonymization of personal data whenever possible and handling it in accordance with applicable privacy laws and regulations.
8. Professionalism and Integrity
- We provide truthful and accurate information to our clients, partners, and stakeholders.
- We do not engage in deceptive, misleading, or fraudulent practices.
9. Conflict of Interest
- We avoid conflicts of interest and disclose any potential conflicts to relevant parties.
- We prioritize the interests of our clients and act in their best interests, avoiding any actions that may compromise our objectivity or independence.
10. Continuous Awareness and Training
- We recognize the dynamic nature of cybersecurity threats and the importance of continuous awareness and training.
- We stay informed about evolving threats, vulnerabilities, and best practices for preventing unauthorized access through regular training, education, and professional development
11. Ethical Responsibility
- We use technology responsibly and ethically, avoiding any actions that may cause harm or compromise security.
- We promote the responsible and ethical use of cybersecurity tools and techniques to enhance security and protect against threats.
12. Compliance with Laws and Regulations
- We comply with all applicable laws, regulations, and industry standards related to cybersecurity and data protection by staying informed about legal and regulatory developments to ensure compliance in our operations and service delivery.
- We do not engage in any activities that may violate laws or regulations governing cybersecurity.
By adhering to this Code of Ethics, we aim to foster a culture of trust, integrity, and professionalism within our company and uphold our reputation as a reliable and ethical business partner in the cybersecurity industry.