Intl-English
  • International
  • Intl-繁体中文
  • Intl-简体中文
  • 中国站
  • 简体中文
Cloud Insight
Open
2020-11-26 22:46:06

Customers should fill in the following information truthfully

1.The detected IP host information;

2.The comparison of domain name registration information must be true and legal information of the customer;

3.The client is a e Cloud hosting user, and the user provides a list of domain names. After the analysis, it must be the e Cloud host IP to provide penetration testing services;

4. The application URL description provided by the customer must specify the function or purpose.

5.The contact information of the business interface person, the customer needs to provide a business interface person contact who has the right to decide on the penetration test plan and the problems that arise during the penetration test;

6.If customers have security protection equipment, they should add the public network IP used in the penetration test to the whitelist of security protection equipment at the beginning of the penetration test to avoid warnings caused by penetration testing. (If the client did not add the public network IP used in the penetration test to the whitelist of security protection equipment at the beginning of the penetration test, Party B shall not bear any responsibility for the resulting alerts and the impact on the penetration test results)

7.The client needs to sign a penetration test authorization letter.

 

Multi-cloud Service
Multi-cloud Service
e Cloud International
Cloud Host
Cloud Monitor
Cloud-Network Integration
Cloud Exchange
SD-WAN
Application Service
Cloud Conference
Cloud Mailbox
Contact Us

We use cookies to ensure your high-speed browsing experience. By continuing to browse this site, you agree to our use of cookies. Details