Intl-English
  • Intl-繁体中文
  • Intl-简体中文
Cloud Insight
Open
2020-11-26 22:46:06

Customers should fill in the following information truthfully

1.The detected IP host information;

2.The comparison of domain name registration information must be true and legal information of the customer;

3.The client is a e Cloud hosting user, and the user provides a list of domain names. After the analysis, it must be the e Cloud host IP to provide penetration testing services;

4. The application URL description provided by the customer must specify the function or purpose.

5.The contact information of the business interface person, the customer needs to provide a business interface person contact who has the right to decide on the penetration test plan and the problems that arise during the penetration test;

6.If customers have security protection equipment, they should add the public network IP used in the penetration test to the whitelist of security protection equipment at the beginning of the penetration test to avoid warnings caused by penetration testing. (If the client did not add the public network IP used in the penetration test to the whitelist of security protection equipment at the beginning of the penetration test, Party B shall not bear any responsibility for the resulting alerts and the impact on the penetration test results)

7.The client needs to sign a penetration test authorization letter.

 

Multi-cloud Service
Multi-cloud Service
Vulnerability Scanning
Vulnerability Scanning
Cloud Exchange
Cloud Exchange
Cloud WAF
Cloud WAF
SD-WAN
SD-WAN
Cloud Conference
Cloud Conference
Cloud Security Service Center
Cloud Security Service Center
Cloud Mailbox
Cloud Mailbox
Ecological Interconnection
Supplier
Contact Us

We use cookies to ensure your high-speed browsing experience. By continuing to browse this site, you agree to our use of cookies. Details