2021-10-30T06:36:00Z

What to include into Service Level Agreement (SLA) when purchasing cloud penetration testing services?

EB
  • 2
  • 478
PeerSpot user
2

2 Answers

Jairo Willian Pereira - PeerSpot reviewer
Real User
Top 5
2021-11-22T21:30:20Z
Nov 22, 2021

Usually, CSPs provide a list of what is/isn´t presented in their SLA and services book. 


If your provider doesn't offer this info, consider asking for the deadlines (times in hours) that each service is resolved at each support level (Level1, L2, L3..., mapped w/each service|product).

Search for a product comparison in Vulnerability Management
EB
Community Manager
2021-11-16T08:35:49Z
Nov 16, 2021

Hi @Jairo Willian Pereira, @Rahul Patel, @KashifJamil ​and @Attila Mate Kovacs,


Do you have any experience with SLAs and possibly can share your knowledge here?


Thanks!

Find out what your peers are saying about Tenable Network Security, Orca Security, Wiz and others in Vulnerability Management. Updated: November 2023.
744,865 professionals have used our research since 2012.
Vulnerability Management
What is vulnerability management? Vulnerability management is the meticulous, exhaustive, systematic process implemented to discover any potential threats or vulnerabilities, stop those threats, and repair those vulnerabilities before any serious problems develop with your important operating systems. Vulnerability management also involves fixes and patches to repair those threats and vulnerabilities. It is generally accomplished in combination with additional risk assessment and...
Download Vulnerability Management ReportRead more

Related Q&As