Objective |
To understand the status of application security versus the real-world scenario by using both manual and automated techniques for assessment |
What we do |
- Pre-Assessment Analysis
- Information Gathering
- Identifying OWASP Top-10 vulnerabilities
- Identifying other critical web application vulnerabilities
- Identifying Underlying server Infrastructure related vulnerabilities
- Mitigation Strategies to fix the identified issues
- Report Generation
|
Requirements |
- Sign a Non-Disclosure Agreement (NDA)
- Provide application details like URL, User Roles, Test User Accounts, etc.
- Backup of the data on the server/web application needs to be taken before running the test
|
What you get |
Security Assessment Reports:
- Executive (for executive managers) and Technical (for IT administrators) reports that include findings and recommendations
- Follow-up activities to assist in implementing the recommendations and mitigating the risks
|
Suggested frequency |
|