1 個回答
- 最新
- 最多得票
- 最多評論
0
For the most up to date information on what you can and cannot execute in terms of penetration testing, please refer to https://aws.amazon.com/security/penetration-testing/. This will also include a list of prohibited activities.
At the time of this answer you're welcome to conduct security assessments against AWS resources that you own if they make use of the services listed below.
- Amazon EC2 instances, NAT Gateways, and Elastic Load Balancers
- Amazon RDS
- Amazon CloudFront
- Amazon Aurora
- Amazon API Gateways
- AWS Lambda and Lambda Edge functions
- Amazon Lightsail resources
- Amazon Elastic Beanstalk environments
相關內容
- 已提問 6 個月前
- AWS 官方已更新 3 年前
- AWS 官方已更新 1 年前
- AWS 官方已更新 2 年前
- AWS 官方已更新 1 年前