Further reading
To learn more on the topics covered in this chapter, you can visit the following links:
- Official AWS penetration testing policies: https://aws.amazon.com/security/penetration-testing/
- Official Microsoft pentesting rules of engagement: https://www.microsoft.com/en-us/msrc/pentest-rules-of-engagement
- Official Google pentesting policies: https://cloud.google.com/terms/aup
- MITRE’s CVE database:
- A full list of bug bounty programs through HackerOne: https://hackerone.com/bug-bounty-programs
- NIST’s CVSS system: https://nvd.nist.gov/vuln-metrics/cvss
- FIRST’s EPSS system: https://www.first.org/epss/