External perimeter
All internet-facing assets within the authorization boundary. NIST SP 800-115 requires external testing conducted from outside the boundary. Includes web applications, APIs, VPN endpoints, and public cloud infrastructure.
Internal CUI network
Network segmentation validation, lateral movement paths, and privilege escalation from standard workstation to CUI data stores. NIST SP 800-171 control 3.13.2 network separation is tested under adversarial conditions.
Cloud infrastructure
Customer-responsible controls in AWS GovCloud, Azure Government, or GCP FedRAMP-authorized environments. IAM role boundaries, storage access policies, logging gaps, and encryption configuration are validated against FedRAMP High/Moderate/Low baseline requirements.
Web and API applications
Applications processing CUI within the authorization boundary. Authentication, authorization, session management, input validation, and API access control — scoped to boundary-resident systems, not public marketing sites.
Active Directory and identity
Domain privilege escalation paths, Kerberoasting, LDAP enumeration, and trust relationship abuse. AD compromise inside a contractor environment is the primary lateral movement path to CUI data stores.
Third-party integrations
External vendor access paths, software supply chain touchpoints, and subcontractor connections that reach CUI systems. DFARS 252.204-7012 flows down security requirements to subcontractors — we validate those connection points.