O'Reilly logo

Federal Cloud Computing, 2nd Edition by Matthew Metheny

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 10

Security testing

Vulnerability assessments and penetration testing

Abstract

This chapter introduces the security testing assessment method, and differentiation between automated and manual techniques. Throughout the remainder of this chapter, a review of two types of security testing vulnerability scanning and penetration testing are provided, including the rules of engagement for documenting the purpose of the security test, and detailed guidelines and constraints regarding the execution of security testing. Finally, the FedRAMP security testing requirement are discussed with the focus on vulnerability and penetration testing activities.

Keywords

Security testing; penetration test; rules of engagement; ROE; vulnerability scanning; vulnerability ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required