SlideShare a Scribd company logo
1 of 3
Download to read offline
INDUSTRY
Telecommunication Telecommunication
Internet Service Providers
Digital Television
OWASP, PTES, SANS, NIST, WASC,
OSSTMM, NCDRC MAST
STANDARDS PRIMARY SECTOR
ABOUT CUSTOMER
Our customer is one of the leading Telecommunication Organization throughout the world.
There are more than 100000+ employees in the organization. They have been the pioneers in
Telecommunication throughout Urban and sub urban cities by providing their excellent 3G/4G
services.
The Largest Mobile Application for a
Foremost Telecommunication Industry
Briskinfosec secured
TYPE OF SERVICES : Mobile Application Security Assessment
( for Fortune 500 Company in Telecommunication Sector )
CASE STUDY
OFFERED SERVICE
Penetration Test
Security Assessment
Worldwide
LOCATION
ASSESSMENT SCOPE
To identify and fix the vulnerabilities in the mobile application, the Client wanted us to conduct an effective mobile
application security assessment to find out the vulnerabilities and to resolve the issues in the application. As a result
of the security assessment, the mobile application is free from all vulnerabilities that makes the application not to
get compromised at any cost.
THE SOLUTION
Briskinfosec followed NCDRC MAST (National Cyber
Defence Research Center Mobile Application Security
Testing Framework) to identify all exposed vulnerabilities in
Mobile Application. Briskinfosec consultants mapped all
issues with OWASP Mobile Top 10 and recommended
perfect fix for identified vulnerabilities.
Key highlights of the Vulnerability fix are as below :
| Serious issues related to Input validation and
authorization, session management and cookies
handling were identified. The identifies vulnerabilities
were fixed by the Development Team.
| Platform level vulnerabilities were identified in the
mobile application safeguarding the Source code of
the application.
| We completely secured the mobile application
from OWASP common attack by hardening the
default configuration.
| We performed vulnerability assessment by both
automation and manual method to identifying the
issues.
| We provided the complete Vulnerability fixing
document as a reference to your development
team.
THE DELIVERABLE
The reports and remediation information provided were customized to match the Client’s operational environment
and development framework. Identified security issues were categorized through Code Fix, Configuration Fix and
Best Practices to make stakeholders understand the criticality of each vulnerabilities. The following reports were
submitted to the customer
| DAILY STATUS REPORT
This mobile security assessment consumed around 1-2
weeks of time including retest. During the process of
mobile testing, issues were identified and we shared
all identified issues with corresponding recommended
FIX over mail on a daily basis. Our prospect looked at
the given valid report (XLS) and started working the fix
right from Day 1 as they need not work laboriously on
Key highlights of the Vulnerability fix is below :
TECHNICAL SECURITY ASSESSMENT REPORT
Complete security testing was carried. All the
detected issues and the proof of concept ( POC )
will be covered with detailed steps in a PDF format.
ISSUE TRACKING SHEET
| All the identified issues were captured and will the
be subjected for the retest review in a XLS fomat.
| All the issues will be captured for the reassessment.
SECURITY ASSESSMENT REPORT
Step by step process carried out by the entire team
for each vulnerability.
the last day when the entire report is given by the
security team thus making their final assessment
report easier for preparation.
OWASP ASVS MAPPING SHEET
Application Security Verification Standard Checklist
was updated and shared the same.
FINAL BUG FIX REPORT
Overview of the entire engagement, the issues that
were identified, the recommendations and remedi-
ation’s which were made to mitigate the threats.
THE CHALLENGE
By conducting Mobile Application Security Assess-
ment and vulnerability fix, Briskinfosec Reduced the
Client's risk exposure in the Mobile application in an
excellent manner where the Telecom Regulatory
Authority of India (TRAI) is taking an extremely strict
approach towards security.
B R I S K I N F O S E C
TECHNOLOGY AND CONSULTING PVT LTD
contact@briskinfosec.com
www.briskinfosec.com
044 - 43524537
+91-8608634123
CUSTOMER SATISFACTION
Mobile Application Security Assessment was con-
ducted with minimum interruption and damage
across customer systems to identify security vulnera-
bilities, impacts, and potential risks.
CONCLUSION
We advised stakeholder on the measures they should take to remedy the various deficiencies in their systems and
processes. As part of the remediation stage, we recommended that their day to day network is segregated from
the network that stores sensitive personal information and financial systems. We also worked closely with our client
to improve the policies, procedures, and employee awareness programmes to increase their cyber maturity.
Stakeholder got impressed with our Zero Trust Cybersecurity Framework (ZCF) and they are looking forward to
adapt it.
RISK BENEFITS
Briskinfosec alleviated the security risks by assessing
the customer’s infrastructure vulnerabilities and
recommended solutions with proven methods to
enhance security.
COST SAVINGS
Briskinfosec suggested cost-effective measures based
on the customer’s business requirements that would
ensure security and continuity of the business.
SUPPORT
We have offered 1 year support with periodic
security assessment to maintain mobile app security
on highest standard.

More Related Content

Similar to Mobile Application Security Service.pdf

A Deep Dive into the Anatomy of a Network Incident.pdf
A Deep Dive into the Anatomy of a Network Incident.pdfA Deep Dive into the Anatomy of a Network Incident.pdf
A Deep Dive into the Anatomy of a Network Incident.pdfSecurityGen1
 
SecurityGen: Your Trusted Partner for Unrivaled Telecom Security
SecurityGen: Your Trusted Partner for Unrivaled Telecom SecuritySecurityGen: Your Trusted Partner for Unrivaled Telecom Security
SecurityGen: Your Trusted Partner for Unrivaled Telecom SecuritySecurity Gen
 
Dr Dev Kambhampati | Electric Utilities Situational Awareness
Dr Dev Kambhampati | Electric Utilities Situational AwarenessDr Dev Kambhampati | Electric Utilities Situational Awareness
Dr Dev Kambhampati | Electric Utilities Situational AwarenessDr Dev Kambhampati
 
NIST Guide- Situational Awareness for Electric Utilities
NIST Guide- Situational Awareness for Electric UtilitiesNIST Guide- Situational Awareness for Electric Utilities
NIST Guide- Situational Awareness for Electric UtilitiesDr Dev Kambhampati
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT InfrastructureChris Pepin
 
Solving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial servicesSolving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial servicesNowSecure
 
Best 5G Security Solutions - SecurityGen
Best 5G Security Solutions - SecurityGenBest 5G Security Solutions - SecurityGen
Best 5G Security Solutions - SecurityGenSecurity Gen
 
SecurityGen's OSS/BSS Solutions: Navigating the Complexity of Modern Operations
SecurityGen's OSS/BSS Solutions: Navigating the Complexity of Modern OperationsSecurityGen's OSS/BSS Solutions: Navigating the Complexity of Modern Operations
SecurityGen's OSS/BSS Solutions: Navigating the Complexity of Modern OperationsSecurityGen1
 
5G Security Program -Case Studies
5G Security Program -Case Studies 5G Security Program -Case Studies
5G Security Program -Case Studies Security Gen
 
5G Security Program Datasheet (2).pdf
5G Security Program Datasheet (2).pdf5G Security Program Datasheet (2).pdf
5G Security Program Datasheet (2).pdfSecurity Gen
 
Appsecco case studies 2019
Appsecco case studies 2019Appsecco case studies 2019
Appsecco case studies 2019Appsecco
 
Standards based security for energy utilities
Standards based security for energy utilitiesStandards based security for energy utilities
Standards based security for energy utilitiesNirmal Thaliyil
 
How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...
How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...
How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...Schneider Electric
 
Vulnerability Testing Services Case Study
Vulnerability Testing Services Case StudyVulnerability Testing Services Case Study
Vulnerability Testing Services Case StudyNandita Nityanandam
 
Unleashing the Power of Telecom Network Security.pdf
Unleashing the Power of Telecom Network Security.pdfUnleashing the Power of Telecom Network Security.pdf
Unleashing the Power of Telecom Network Security.pdfSecurityGen1
 
Strengthening Your Network Against Future Incidents with SecurityGen
Strengthening Your Network Against Future Incidents with SecurityGenStrengthening Your Network Against Future Incidents with SecurityGen
Strengthening Your Network Against Future Incidents with SecurityGenSecurityGen1
 
Telecom Resilience: Strengthening Networks through Cybersecurity Vigilance
Telecom Resilience: Strengthening Networks through Cybersecurity VigilanceTelecom Resilience: Strengthening Networks through Cybersecurity Vigilance
Telecom Resilience: Strengthening Networks through Cybersecurity VigilanceSecurityGen1
 
Supply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorSupply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorKaspersky
 

Similar to Mobile Application Security Service.pdf (20)

A Deep Dive into the Anatomy of a Network Incident.pdf
A Deep Dive into the Anatomy of a Network Incident.pdfA Deep Dive into the Anatomy of a Network Incident.pdf
A Deep Dive into the Anatomy of a Network Incident.pdf
 
SecurityGen: Your Trusted Partner for Unrivaled Telecom Security
SecurityGen: Your Trusted Partner for Unrivaled Telecom SecuritySecurityGen: Your Trusted Partner for Unrivaled Telecom Security
SecurityGen: Your Trusted Partner for Unrivaled Telecom Security
 
Dr Dev Kambhampati | Electric Utilities Situational Awareness
Dr Dev Kambhampati | Electric Utilities Situational AwarenessDr Dev Kambhampati | Electric Utilities Situational Awareness
Dr Dev Kambhampati | Electric Utilities Situational Awareness
 
NIST Guide- Situational Awareness for Electric Utilities
NIST Guide- Situational Awareness for Electric UtilitiesNIST Guide- Situational Awareness for Electric Utilities
NIST Guide- Situational Awareness for Electric Utilities
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
 
Solving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial servicesSolving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial services
 
Best 5G Security Solutions - SecurityGen
Best 5G Security Solutions - SecurityGenBest 5G Security Solutions - SecurityGen
Best 5G Security Solutions - SecurityGen
 
SecurityGen's OSS/BSS Solutions: Navigating the Complexity of Modern Operations
SecurityGen's OSS/BSS Solutions: Navigating the Complexity of Modern OperationsSecurityGen's OSS/BSS Solutions: Navigating the Complexity of Modern Operations
SecurityGen's OSS/BSS Solutions: Navigating the Complexity of Modern Operations
 
5G Security Program -Case Studies
5G Security Program -Case Studies 5G Security Program -Case Studies
5G Security Program -Case Studies
 
5G Security Program Datasheet (2).pdf
5G Security Program Datasheet (2).pdf5G Security Program Datasheet (2).pdf
5G Security Program Datasheet (2).pdf
 
SAND SKILLS
SAND SKILLSSAND SKILLS
SAND SKILLS
 
Appsecco case studies 2019
Appsecco case studies 2019Appsecco case studies 2019
Appsecco case studies 2019
 
Standards based security for energy utilities
Standards based security for energy utilitiesStandards based security for energy utilities
Standards based security for energy utilities
 
How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...
How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...
How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...
 
Arun Kumar Ramalingam
Arun Kumar RamalingamArun Kumar Ramalingam
Arun Kumar Ramalingam
 
Vulnerability Testing Services Case Study
Vulnerability Testing Services Case StudyVulnerability Testing Services Case Study
Vulnerability Testing Services Case Study
 
Unleashing the Power of Telecom Network Security.pdf
Unleashing the Power of Telecom Network Security.pdfUnleashing the Power of Telecom Network Security.pdf
Unleashing the Power of Telecom Network Security.pdf
 
Strengthening Your Network Against Future Incidents with SecurityGen
Strengthening Your Network Against Future Incidents with SecurityGenStrengthening Your Network Against Future Incidents with SecurityGen
Strengthening Your Network Against Future Incidents with SecurityGen
 
Telecom Resilience: Strengthening Networks through Cybersecurity Vigilance
Telecom Resilience: Strengthening Networks through Cybersecurity VigilanceTelecom Resilience: Strengthening Networks through Cybersecurity Vigilance
Telecom Resilience: Strengthening Networks through Cybersecurity Vigilance
 
Supply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorSupply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy Sector
 

More from Briskinfosec Technology and Consulting (8)

Web Application Penetration Testing.pdf
Web Application Penetration Testing.pdfWeb Application Penetration Testing.pdf
Web Application Penetration Testing.pdf
 
Website Penetration Testing Services.pdf
Website Penetration Testing Services.pdfWebsite Penetration Testing Services.pdf
Website Penetration Testing Services.pdf
 
Web Application Security Service.pdf
Web Application Security Service.pdfWeb Application Security Service.pdf
Web Application Security Service.pdf
 
Threatsploit Adversary Report November
Threatsploit Adversary Report NovemberThreatsploit Adversary Report November
Threatsploit Adversary Report November
 
The Future Is Blockchain Era
The Future Is Blockchain EraThe Future Is Blockchain Era
The Future Is Blockchain Era
 
Comprehensive Guide On Network Security
Comprehensive Guide On Network SecurityComprehensive Guide On Network Security
Comprehensive Guide On Network Security
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
 

Recently uploaded

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Mobile Application Security Service.pdf

  • 1. INDUSTRY Telecommunication Telecommunication Internet Service Providers Digital Television OWASP, PTES, SANS, NIST, WASC, OSSTMM, NCDRC MAST STANDARDS PRIMARY SECTOR ABOUT CUSTOMER Our customer is one of the leading Telecommunication Organization throughout the world. There are more than 100000+ employees in the organization. They have been the pioneers in Telecommunication throughout Urban and sub urban cities by providing their excellent 3G/4G services. The Largest Mobile Application for a Foremost Telecommunication Industry Briskinfosec secured TYPE OF SERVICES : Mobile Application Security Assessment ( for Fortune 500 Company in Telecommunication Sector ) CASE STUDY OFFERED SERVICE Penetration Test Security Assessment Worldwide LOCATION
  • 2. ASSESSMENT SCOPE To identify and fix the vulnerabilities in the mobile application, the Client wanted us to conduct an effective mobile application security assessment to find out the vulnerabilities and to resolve the issues in the application. As a result of the security assessment, the mobile application is free from all vulnerabilities that makes the application not to get compromised at any cost. THE SOLUTION Briskinfosec followed NCDRC MAST (National Cyber Defence Research Center Mobile Application Security Testing Framework) to identify all exposed vulnerabilities in Mobile Application. Briskinfosec consultants mapped all issues with OWASP Mobile Top 10 and recommended perfect fix for identified vulnerabilities. Key highlights of the Vulnerability fix are as below : | Serious issues related to Input validation and authorization, session management and cookies handling were identified. The identifies vulnerabilities were fixed by the Development Team. | Platform level vulnerabilities were identified in the mobile application safeguarding the Source code of the application. | We completely secured the mobile application from OWASP common attack by hardening the default configuration. | We performed vulnerability assessment by both automation and manual method to identifying the issues. | We provided the complete Vulnerability fixing document as a reference to your development team. THE DELIVERABLE The reports and remediation information provided were customized to match the Client’s operational environment and development framework. Identified security issues were categorized through Code Fix, Configuration Fix and Best Practices to make stakeholders understand the criticality of each vulnerabilities. The following reports were submitted to the customer | DAILY STATUS REPORT This mobile security assessment consumed around 1-2 weeks of time including retest. During the process of mobile testing, issues were identified and we shared all identified issues with corresponding recommended FIX over mail on a daily basis. Our prospect looked at the given valid report (XLS) and started working the fix right from Day 1 as they need not work laboriously on Key highlights of the Vulnerability fix is below : TECHNICAL SECURITY ASSESSMENT REPORT Complete security testing was carried. All the detected issues and the proof of concept ( POC ) will be covered with detailed steps in a PDF format. ISSUE TRACKING SHEET | All the identified issues were captured and will the be subjected for the retest review in a XLS fomat. | All the issues will be captured for the reassessment. SECURITY ASSESSMENT REPORT Step by step process carried out by the entire team for each vulnerability. the last day when the entire report is given by the security team thus making their final assessment report easier for preparation. OWASP ASVS MAPPING SHEET Application Security Verification Standard Checklist was updated and shared the same. FINAL BUG FIX REPORT Overview of the entire engagement, the issues that were identified, the recommendations and remedi- ation’s which were made to mitigate the threats. THE CHALLENGE By conducting Mobile Application Security Assess- ment and vulnerability fix, Briskinfosec Reduced the Client's risk exposure in the Mobile application in an excellent manner where the Telecom Regulatory Authority of India (TRAI) is taking an extremely strict approach towards security.
  • 3. B R I S K I N F O S E C TECHNOLOGY AND CONSULTING PVT LTD contact@briskinfosec.com www.briskinfosec.com 044 - 43524537 +91-8608634123 CUSTOMER SATISFACTION Mobile Application Security Assessment was con- ducted with minimum interruption and damage across customer systems to identify security vulnera- bilities, impacts, and potential risks. CONCLUSION We advised stakeholder on the measures they should take to remedy the various deficiencies in their systems and processes. As part of the remediation stage, we recommended that their day to day network is segregated from the network that stores sensitive personal information and financial systems. We also worked closely with our client to improve the policies, procedures, and employee awareness programmes to increase their cyber maturity. Stakeholder got impressed with our Zero Trust Cybersecurity Framework (ZCF) and they are looking forward to adapt it. RISK BENEFITS Briskinfosec alleviated the security risks by assessing the customer’s infrastructure vulnerabilities and recommended solutions with proven methods to enhance security. COST SAVINGS Briskinfosec suggested cost-effective measures based on the customer’s business requirements that would ensure security and continuity of the business. SUPPORT We have offered 1 year support with periodic security assessment to maintain mobile app security on highest standard.