Читать книгу CompTIA Pentest+ Certification For Dummies - Glen E. Clarke - Страница 74

First-party versus third-party hosted

Оглавление

As I mention earlier in this chapter, you need to verify where the targets are being hosted, whether by the customer (first party) or by an outside company (third party). If systems are hosted by a third-party company such as an ISP or cloud provider, you need to get authorization from the third party to perform the pentest on those assets.

CompTIA Pentest+ Certification For Dummies

Подняться наверх