Patent attributes
Embodiments of systems and methods are described for managing requests for security services to a provider of computing resources. In some implementations, a user can request that security services be provided to analyze or test a target network. For example, the user can request that security services conduct penetration testing of the target network in order to detect vulnerabilities with the target network's security infrastructure or configuration. The computing resource provider can dynamically provide the security services to the target network, for example, by instantiating one or more virtual machines that begin security testing of the target network in response to the user's request. In some embodiments, the provider of the security services may instantiate a security virtual machine instance (VMI) that can be connected to a customer's network using a secure connection, such as a virtual private network. The virtual machine instance can be physically located outside the customer's network while functioning as part of the customer's network. Thus, the security VMI can test security from either outside the network or from inside the network. In some embodiments, the VMI may test at multiple locations of the customer's network, for example, by establishing connections to multiple locations on the customer network.