Online Optimisers · Sebastian Tagwercher
← Back to orb
Critical · 2026-05-21

Insurance and Authorization. The two non-negotiables.

Your business plan schedules insurance for Month 5 and contracts "later." The wedge moves first paid engagement to Week 4. Both have to land in Week 1-2 instead.

Read this first

Without these, every byte of testing traffic is technically a criminal offense and one bad finding can wipe your savings.

This is not theatre. Cyber liability insurance is the financial firewall. The Authorization Letter is the legal firewall. Both must exist before the first SOW is signed. A signed SOW alone is a commercial agreement, not legal cover to send security testing traffic at a production system. The full contracts pack lives at contracts.html.

Section 1

Cyber liability + E&O insurance

One missed finding that contributes to a downstream breach can become a personal-bankruptcy-grade liability. Your entire stock-portfolio runway and savings buffer disappear in a single uninsured claim.

The standard coverage stack

Broker comparison (solo security consultants under $250k/year)

Broker Market Monthly (combined E&O + Cyber) Best fit
Hiscox UK and EU ~$60-100/mo at $1M / $500k limits German Einzelunternehmen invoicing into EU clients
Embroker US ~$80-150/mo for equivalent coverage US Delaware LLC invoicing into US clients
Hiscox Deutschland / Markel / Allianz Trade Germany ~EUR 60-120/mo, broker-quoted German-language policy documents when DACH clients ask for proof of cover in German

What NOT to skimp on

Hard rule on timing

Quote-only is not binding. The certificate of insurance (COI) must show effective-date earlier than the SOW signature date. Hiscox and Embroker both issue COIs same-day on policy bind; request one immediately and store the PDF. Tier 2 and Tier 3 clients will request it as part of vendor onboarding.

Section 2

The Authorization Letter

A signed SOW is a commercial agreement. It is NOT, by itself, legal cover to send security testing traffic at a production system. Under US, UK, and German law, unauthorized access to a computer system is a criminal offense regardless of whether a commercial contract exists. The contract proves both parties agreed to the engagement. The authorization letter proves an officer with actual authority over the system gave explicit permission to test it.

The statutes that make this matter

Why a developer signature is not enough

Three failure modes the authorization letter prevents:

  1. The signer was not authorised. A developer signs but did not have the authority to bind the company. The company later disputes the testing. Defense: only accept the letter from a VP-level signer or above, identified by title in the document.
  2. The testing window was unclear. You test on day 5 thinking the engagement runs days 1-7; the client's internal incident response team treats it as an external attack. Defense: explicit start-date and end-date in the letter.
  3. A finding caused service degradation. Your rate-limit test trips a circuit breaker and a production outage follows. Without an in-letter emergency-contact and an indemnification clause for in-scope testing, you absorb the loss. Defense: emergency contact, indemnification for in-scope testing, explicit non-destructive scope.

The Authorization Letter template (inline)

Single page, signed by an authorised Client officer, dated before the first byte of testing traffic. Store the signed PDF for at least 7 years after the engagement ends.

AUTHORIZATION LETTER FOR SECURITY TESTING

Date: <<DATE>>

To: <<Consultant Legal Name>>
    <<Consultant Address>>

Re: Authorization to perform security testing under SOW No. <<SOW-NUMBER>>


I, <<Authorized Officer Name>>, holding the title of <<Title (must be
Vice President or higher, or equivalent C-suite role)>> at <<Client
Legal Name>> ("Client"), and authorized to bind Client, hereby grant
explicit written authorization to <<Consultant Legal Name>>
("Consultant") to perform security testing of the systems identified
below, on the terms set out in this letter.

This letter is issued under, and supplements, the Statement of Work
referenced above and the Master Services Agreement between Client and
Consultant dated <<MSA-DATE>>.


1. AUTHORIZED TESTING WINDOW

Start: <<TESTING-START-DATE>> at <<START-TIME>> <<TIMEZONE>>
End:   <<TESTING-END-DATE>> at <<END-TIME>> <<TIMEZONE>>

Consultant is authorized to perform testing only within this window.
Testing outside this window requires a written extension signed by
an Authorized Officer of Client.


2. IN-SCOPE SYSTEMS

The following systems, URLs, and endpoints are in scope for testing:

   a. <<Primary URL or endpoint, e.g. https://app.client.com/ai-chat>>
   b. <<Secondary URL or endpoint, if any>>
   c. <<AI feature endpoints, API paths, or sub-domains in scope>>

No other systems, URLs, endpoints, sub-domains, or services owned or
operated by Client are authorized for testing under this letter.


3. AUTHORIZED TESTING TECHNIQUES

Consultant is authorized to use the following techniques:

   a. Manual security testing using web browsers, intercepting proxies
      (Burp Suite), and custom payloads.
   b. Tool-assisted security testing using publicly available,
      non-destructive scanning and probing tools (including Garak,
      PyRIT, Promptfoo, and similar AI-security tooling).
   c. Authentication and rate-limit probing within reasonable bounds
      (no sustained brute-force, no traffic volume designed to cause
      service degradation).
   d. Prompt-injection and output-handling probing against the in-scope
      AI feature.


4. PROHIBITED ACTIONS

Notwithstanding Section 3, Consultant will NOT:

   a. Perform Denial-of-Service or load testing designed to disrupt
      service availability.
   b. Exfiltrate production customer data beyond what is minimally
      necessary to demonstrate a finding (and even then, will redact
      or anonymise any extracted data in the Report).
   c. Perform social engineering, phishing, or pretexting against
      Client personnel or customers.
   d. Test physical security or attempt physical access.
   e. Modify, delete, or corrupt Client production data.
   f. Use credentials of real Client customers for testing.
   g. Test third-party systems not owned or controlled by Client.


5. CLIENT EMERGENCY CONTACT

If Consultant's testing causes or is suspected of causing service
degradation, an outage, or any other incident requiring immediate
response, Consultant will contact:

   Name:  <<Emergency Contact Name>>
   Title: <<Emergency Contact Title>>
   Phone: <<24-hour Phone Number>>
   Email: <<Emergency Contact Email>>

Client confirms this contact is available 24/7 throughout the
Authorized Testing Window.


6. CLIENT INDEMNIFICATION FOR IN-SCOPE TESTING

Client agrees to indemnify and hold Consultant harmless from any
third-party claim arising from Consultant's testing performed within
the scope authorized by this letter, except for claims arising from
Consultant's gross negligence or willful misconduct.


7. CLIENT REPRESENTATIONS

Client represents and warrants that:

   a. The undersigned is an Authorized Officer of Client with actual
      authority to bind Client to this letter.
   b. Client owns or has the legal right to authorize security testing
      of the systems identified in Section 2.
   c. Client has notified, or will notify before the Authorized Testing
      Window begins, all relevant internal teams (including security
      operations, incident response, and any third-party security
      monitoring providers).
   d. Client has obtained any third-party consents required (for
      example, from cloud providers whose acceptable-use policies
      require prior notice of penetration testing).


8. CRITICAL LEGAL ACKNOWLEDGMENT

Client acknowledges that this Authorization Letter is the legal basis
under applicable computer-crime statutes (including the US Computer
Fraud and Abuse Act, the UK Computer Misuse Act 1990, the German
Strafgesetzbuch sections 202a and 202c, and equivalent statutes in
other jurisdictions) for Consultant's testing activities. Without
this letter, the testing activities would constitute unauthorized
access. Client warrants that the authorization granted here is
genuine, current, and not revocable retroactively.


SIGNED FOR CLIENT BY AN AUTHORIZED OFFICER:

___________________________
Name:  <<Authorized Officer Name>>
Title: <<Title (VP or higher)>>
Date:  ____________________
Section 3

What MUST be in place BEFORE the first signed engagement

Every box below ticked before the first SOW is signed. No exceptions.

Pre-flight checklist
  • Cyber liability + E&O insurance BOUND (not just quoted). Policy effective-date earlier than any SOW signature date. COI PDF stored in 1Password and locally.
  • One-time legal review of MSA, SOW, and Authorization Letter templates completed by a lawyer in the chosen governing-law jurisdiction (Germany if Einzelunternehmen, US Delaware if US LLC, Thailand if Thai entity).
  • All four templates (MSA, SOW, NDA, Authorization Letter) saved as both editable source (Markdown or DOCX) and final-delivery format (PDF). Find-replace fields tested with a dummy client to confirm no orphan placeholders survive rendering.
  • Legal invoicing entity decided. German Einzelunternehmen if mostly EU clients, US LLC (Wyoming or New Mexico or Delaware) if mostly US, talk to a tax advisor familiar with German-Thai DTV residency before committing.
  • Payment infrastructure live. Stripe or Wise Business invoice link tested with a $1 test charge. 50% deposit non-refundable on signed SOW.
  • Encrypted backup of all signed contracts and Authorization Letters configured to an off-site location (1Password attached files, Proton Drive, or equivalent). Minimum 7-year retention.
  • Authorization Letter signer verified at VP-or-higher title. If the prospect tries to have a developer or junior eng sign, escalate before testing starts.
  • Testing window written into the letter with explicit start and end dates and times, timezone, no "TBD" anywhere.
  • Emergency contact line written into the letter with 24/7 phone and email. Confirm by calling the number once before kickoff.
  • Non-destructive scope explicitly listed in Section 3 of the letter. No DoS, no load testing, no real customer credentials, no third-party systems.

The simple rule

If a prospect pushes back on signing the Authorization Letter, or wants you to "just start", or tries to substitute a developer signature for a VP-level one, the engagement does not start. Walk. Your runway is long enough to be picky. One bad first engagement is much more expensive than waiting two weeks for a properly authorised one.

Source: knowledge/leads/sebastian-tagwercher/contracts-pack.md · Full MSA, SOW, NDA, and Authorization Letter templates at contracts.html.