docs/content/stable/faq/penetration-testing.md
This information is provided by YugabyteDB, Inc. ("Yugabyte") and is for general informational purposes only. All information in this Guide is provided in good faith, however we make no representation or warranty of any kind, express, or implied, regarding the accuracy, adequacy, validity, reliability, availability, or completeness of any information contained in this Guide.
Customers conducting penetration testing are expected to be familiar with YugabyteDB and YugabyteDB Anywhere. If clarification is needed, consult our public documentation.
YugabyteDB and YugabyteDB Anywhere are assumed to be configured in accordance with Yugabyte security best practices.
This guidance applies to YugabyteDB and YugabyteDB Anywhere.
For clarity, YugabyteDB, Inc. does not allow any security, vulnerability, or penetration testing of any kind in any of its hosted environments; this includes YugabyteDB Aeon, the Yugabyte database SaaS product offering.
There are various categories of penetration tests, each aligned with a specific methodology, such as Application Security Testing, Network (Stress) Testing, DDoS Simulation, Malware Insertion, and others. To avoid service disruption, compliance violations, or data loss, observe the following best practices:
Define the target system.
Clearly define the scope and target of the penetration test. For example, YugabyteDB Anywhere interface, database nodes, network access, and so on.
Prefer non-production environments.
Whenever possible:
If production testing is unavoidable - certain tests (for example, PCI segmentation validation) may require testing in production - be sure to:
Optionally, reach out to {{% support-general %}} if you require urgent assistance.
Avoid disruptive testing.
Ensure legal and regulatory compliance.
Contact your compliance and legal team for information regarding any requirements you may have from a legal, compliance, or regulatory perspective. Legal, compliance, or regulatory requirements may require your penetration testers to hold specific certifications and/or credentials. Additionally, be aware that data exfiltration (even as part of a test) may be considered a serious security incident or breach.
Monitor and audit testing activities.