Penetration and load test notification
If you, or a third party acting on your behalf, plan to perform a penetration test or significant load testing on your customer applications, please send the following information to cloud.gov support ahead of your planned test:
* Web applications or website under test: (e.g. _site_.agency.gov)
* Testing organization and contact/liaison information:
* Source IPs or IP ranges (for testers and their tools):
* Expected start date, (or starting immediately):
* Expected end date:
* Acknowledgement that you are abiding by the terms at https://cloud.gov/docs/compliance/pentest/
This notification is only necessary for in-depth security testing or significant load-testing, which is a common step in agency ATO processes for customer systems and in the software development lifecycle. You don’t need an approval, and cloud.gov doesn’t provide approvals. Simply sending the notification is sufficient. You can always run routine automated vulnerability scans on your own applications without special notification.
When arranging a security assessment or penetration test, the system under test is one of:
- cloud.gov Platform: your application at application-name.app.cloud.gov, or your external domain (e.g. https://agency.gov)
- cloud.gov Pages: your website at your preview URL, or your external domain
In either case, do not test the cloud.gov infrastructure, such as https://pages.cloud.gov or https://dashboard.fr.cloud.gov. All cloud.gov products are under regular testing by our team, and by third-party assessors, as part of our Continuous Monitoring plan. FedRAMP® makes the results available to authorized users.
Your assessment must not target other cloud.gov customers, nor perform or simulate denial of service attacks or otherwise violate the Amazon AWS testing policy.