Penetration Testing Requirements
Overview
Federal agencies conducting penetration tests or load testing on Cloud.gov applications must notify the platform team before testing begins. This notification requirement applies to comprehensive security assessments and high-volume load tests typically performed during Authorized processes. Routine vulnerability scans and normal load testing do not require notification. This process ensures platform stability while enabling thorough security validation.
Prerequisites
- Testing Scope: Defined list of applications and domains under test
- Test Window: Planned start and end dates for testing
- Source IPs: IP addresses or ranges used by testing tools
- Contact Information: Security team and testing vendor details
- Testing Agreement: Confirmation of compliance with Cloud.gov policies
Process / Steps
1. Determine if Notification is Required
Notification Required:
- Third-party penetration testing
- High-volume automated scanning
- Load testing exceeding 1000 requests/second
- Denial-of-service testing (limited scope)
No Notification Needed:
- Routine vulnerability scans
- Normal application testing
- OWASP ZAP or similar during development
2. Prepare Notification Details
Customer Responsibility: Compile required information:
Subject: Penetration Test Notification - [Agency Name]
Testing Details:
* Applications under test:
- app1.app.cloud.gov
- app2.app.cloud.gov
- custom-domain.agency.gov
* Testing organization: [Company Name]
* Contact: [Name, Email, Phone]
* Source IP ranges:
- 192.0.2.0/24 (Scanner Network)
- 198.51.100.0/24 (Tester Workstations)
* Test window:
- Start: 2024-03-15 09:00 EDT
- End: 2024-03-22 17:00 EDT
* Test types:
- Web application scanning
- API security testing
- Authentication testing
I acknowledge compliance with /platform/compliance/pentest/
3. Submit Notification
Send notification to support@cloud.gov at least 48 hours before testing begins.
Note: No approval required - notification is sufficient to proceed.
4. Conduct Testing Within Scope
Allowed Testing:
- Application vulnerability scanning
- Authentication/authorization testing
- API security validation
- Container security via
cf ssh
- Moderate load testing
Prohibited Testing:
-
Attacks on the following domains:
- https://pages.cloud.gov
- https://pages-staging.cloud.gov
- https://cloud.gov
- https://*.fr.cloud.gov
-
Infrastructure attacks on Cloud.gov systems
-
Unlimited denial-of-service attempts
-
Social engineering of Cloud.gov staff
-
Physical security testing
5. Report Findings
If testing reveals Cloud.gov platform vulnerabilities:
- Stop testing that vector immediately
- Document vulnerability details
- Report via security.txt process: https://cloud.gov/.well-known/security.txt
FAQs
Q: How much notice should I provide? A: 48 hours preferred, but "starting immediately" notifications are accepted for urgent testing.
Q: Can I test during production hours? A: Yes. Choose test windows based on your application's usage patterns.
Q: What if I find a platform vulnerability? A: Stop testing that vector and report via security.txt. Do not expand testing to verify or exploit.
Q: Do I need Cloud.gov approval to proceed? A: No. Sending the notification is sufficient. We may contact you if we have concerns.
Q: Can I share my test results with Cloud.gov? A: Platform vulnerabilities must be reported. Application findings are your responsibility but may be shared for advisory purposes.