| ▲ | kevin_nisbet an hour ago | |||||||
Do they? The only anecdotal thing I've seen is we hired a vendor to do a pentest a few years ago, and they setup some stuff in an AWS account and that account got totally yeeted out of existence by AWS if memory serves. | ||||||||
| ▲ | dannyw an hour ago | parent | next [-] | |||||||
You should not be conducting unauthorized penetration tests against third party infrastructure providers without permission. They have processes and systems and usually just wants a heads up of what you plan to test and t the duration / timestamps. Cuz otherwise you look like a threat actor. That’s assuming your vendor was pentesting AWS systems. If you meant you hired a vendor to pentest your own systems on AWS, that’s of course a totally different matter. | ||||||||
| ||||||||
| ▲ | alchemism an hour ago | parent | prev | next [-] | |||||||
I’m fairly certain you are supposed to contact any vendor before attempting to penetrate hosts with authorization, not the other way around. | ||||||||
| ||||||||
| ▲ | mixdup an hour ago | parent | prev | next [-] | |||||||
Responding to an unknown security tester like that is a selling point, not a cautionary tale | ||||||||
| ||||||||
| ▲ | 30 minutes ago | parent | prev [-] | |||||||
| [deleted] | ||||||||