As a penetration tester, you are contracted to perform a security assessment for a company that utilizes multiple public cloud services. Which of the following considerations is MOST important when defining the scope of your penetration test?
Ensure the cloud service provider's policy for penetration testing is followed.
Secure the written permission to attack from local government authorities.
Select the tools that will be used during the engagement.
Determine if other organizations hosted by the same provider inadvertently come into scope.