Per the AWS Acceptable Use Policy, penetration testing of EC2 instances:

Per the AWS Acceptable Use Policy, penetration testing of EC2 instances:

Per the AWS Acceptable Use Policy, penetration testing of EC2 instances:

A.
May be performed by AWS, and will be performed by AWS upon customer request.

B.
May be performed by AWS, and is periodically performed by AWS.

C.
Are expressly prohibited under all circumstances.

D.
May be performed by the customer on their own instances with prior authorization from AWS.

E.
May be performed by the customer on their own instances, only if performed from EC2 instances

Explanation:

http://aws.amazon.com/security/penetration-testing/



Leave a Reply 13

Your email address will not be published. Required fields are marked *


w

w

imho A:

“Please complete and submit the AWS Vulnerability / Penetration Testing Request Form to request authorization for penetration testing to or originating from any AWS resources. ”

https://aws.amazon.com/security/penetration-testing/

Kelvin Wong

Kelvin Wong

D.

For “W”, that statement is to request authorization from AWS for you to perform penetration test on your systems

MTL

MTL

Read what you copy pasted. “request authorization for penetration testing”. AUTHORIZATION.

mr_tienvu

mr_tienvu

I choose D

kamleshj

kamleshj

D

Our Acceptable Use Policy describes permitted and prohibited behavior on AWS and includes descriptions of prohibited security violations and network abuse. However, because penetration testing and other simulated events are frequently indistinguishable from these activities, we have established a policy for customers to request permission to conduct penetration tests and vulnerability scans to or originating from the AWS environment.

Mayur

Mayur

D is correct

Duck Bro

Duck Bro

D
https://aws.amazon.com/security/penetration-testing/
Our Acceptable Use Policy describes permitted and prohibited behavior on AWS and includes descriptions of prohibited security violations and network abuse. However, because penetration testing and other simulated events are frequently indistinguishable from these activities, we have established a policy for customers to request permission to conduct penetration tests and vulnerability scans to or originating from the AWS environment.