AWS vulnerability scanning
As an AWS customer, you are going to be consuming various services to build and deploy your cloud applications. You want to make sure that your cloud solutions are highly secure and protected. To that end, you will follow key guidelines and industry best practices while implementing security controls and procedures at the different levels of your cloud ecosystem.
But how you can confirm that the level of protection you have implemented is sufficient and whether the controls you have put in place work?
AWS allows its customers to conduct penetration testing on their workloads in the AWS cloud. Also known as pen testing, this is a simulated cyber-attack against your computer systems to check for vulnerabilities. This is usually conducted by your internal or appointed security team.
As a customer, you need to follow the service policy for penetration testing, which includes permitted services and prohibited activities. For example, you are prohibited...