This policy framework document provides guidance for managing a penetration testing program and performing penetration testing activities with the goal of improving defensive IT security for {Company Name}'s infrastructure, systems, services, and applications. This document defines the roles and responsibilities of {Company Name}'s executives, managers, and IT security team personnel as well as external third-party security service providers.