Skip to main content

05. AWS Penetration Testing Overview

Understand what penetration testing (pen testing) activities are allowed on AWS and which are prohibited.

🧩 1. What is Penetration Testing?

Penetration testing means intentionally attacking your own AWS resources to evaluate your security posture.

AWS allows customers to perform self-initiated security assessments without prior approval — but only for certain services.


✅ 2. Allowed Without Approval

You can perform pen testing on the following 8 AWS services:

ServiceExamples
Amazon EC2Instances & Elastic IPs
NAT GatewaysNetwork Address Translation resources
Elastic Load Balancers (ELB)ALB / NLB
Amazon RDS & AuroraDatabase instances
Amazon CloudFrontEdge distributions
AWS Lambda / Lambda@EdgeServerless functions
Amazon API GatewayAPI endpoints
Amazon LightsailSimplified compute & app hosting
Elastic BeanstalkManaged app environments

🧠 Exam Tip: Remember – no prior AWS approval needed for these eight.


❌ 3. Prohibited Activities

The following activities are not allowed:

CategoryExamples
Denial of Service (DoS/DDoS)Real or simulated DDoS attacks
Flooding AttacksPort, protocol, or request flooding
DNS Zone WalkingEnumeration via Route 53 Hosted Zones
Any Unapproved TestingTests outside the allowed service list

For any other testing, you must contact AWS Security for explicit approval.


🧠 4. Exam Tips

  • ✅ Allowed on EC2, RDS, CloudFront, API Gateway, Lambda, Aurora, Lightsail, Beanstalk
  • Never allowed: DDoS, flooding, or DNS zone walking
  • 📨 For others → Get AWS Security approval first

✅ Summary

AllowedNot Allowed
Self-initiated tests on 8 AWS servicesAny DoS, DDoS, flooding, or DNS attacks
No AWS approval requiredMust contact AWS Security for others
Purpose: test your own infrastructureNot to simulate or cause service disruption