SlideShare a Scribd company logo
INDUSTRY
Software Development Software
OWASP, PTES, SANS, NIST,
ISO27001, PCI-DSS
STANDARDS PRIMARY SECTOR
ABOUT CUSTOMER
Our stakeholder offers Strategic IT consulting and Managed Solutions to Technology compa-
nies.They have transformed over the years from a plain contract staffing service provider into a
leader in Consulting for myriad technologies ranging from application development using
Open Source, Microsoft, Java and Mainframe technologies to state of the art SMAC technolo-
gies. They have been the pioneer all over Globe providing the highest ethical standards of
service. They operate across eight major cities in India apart from the overseas operations. Their
scale of capabilities, offerings and customer engagements in the IT & ITES domain differentiates
them from other companies in the consulting and recruitment vertical.
Top Software Development
Company’s Website
Briskinfosec secured
TYPE OF SERVICES : Website Security Assessment
CASE STUDY
OFFERED SERVICE
Penetration Test
Middle East
LOCATION
ASSESSMENT SCOPE
To find the vulnerabilities in the Website, Stakeholder wanted us to conduct a proactive website Penetration test to
find any loopholes in Website for hackers to gain access. So, an URL was given directly for scanning vulnerabilities.
The kind of testing executed was Black Box Testing, testing without credentials. Most importantly, the ultimate goal
was to make the website free from any vulnerability that may compromise their site.
THE SOLUTION
Briskinfosec followed standards like Open Web Application
Security Project (OWASP) TOP 10 and Application Security
Verification Standards (ASVS) to identify all exposed
vulnerabilities in the Website. BriskInfosec’s security team
completely tested the Website
Key highlights of the bug fix are as below :
| Serious issues related to Input validation, Injection
attacks, Sensitive Data Exposure and Clickjacking
attacks were identified. The Development team then
fixed the identified bugs.
| We completely secured the web application from
OWASP common attack by hardening the default
configuration.
| We performed vulnerability assessment by both
automation and manual method of identifying the
issues.
| We provided the complete vulnerability fixing
document as a reference to your development
team.
| OWASP ASVS (APPLICATION SECURITY VERIFICATION
STANDARD) was also shared without failing.
THE DELIVERABLE
The reports and remediation information provided were customised to match the Client’s operational environment
and development framework. The following reports were submitted to the customer.
Key highlights of the bug fix are as below :
TECHNICAL SECURITY ASSESSMENT REPORT
Complete security testing was carried. All the
detected issues and the proof of concept ( POC )
will be covered with detailed steps in a PDF format.
ISSUE TRACKING SHEET
All the identified issues were captured and will the
be subjected for the retest review in an XLS format.
WORKFLOW REPORT
Every process was carried out by the entire team
without ignorance of anything.
DAILY STATUS REPORT
FINAL BUG FIX REPORT
Overview of the entire engagement, the issues
identified and the recommendations made to
mitigate the same.
This website security assessment consumed around
1-2 weeks of time including retest. During the process
of website testing, issues were identified and we
shared all identified issues with corresponding recom-
mendation Fix over mail on a daily basis. Our pros-
pect looked at the given valid report (XLS) and
started working the fix right from Day 1 as they need
not work laboriously on the last day when the entire
report is given by the security team thus making their
final assessment report easier for preparation.
OWASP ASVS
( APPLICATION SECURITY VERIFICATION STANDARD )
was shared.
THE CHALLENGE
During Vulnerability Assesment, a stunning number of
functional issues were identified because of which
there were many restrictions and disruptions during
testing. Due to this inconvenience, we were unable
to access certain credentials with restricted user
privilege experienced by our security team. Howev-
er, with dexterous perseverance, Brisk Infosec
reduced the Stakeholder risks of their site being
visible to breaches.
RISK BENEFITS
Brisk Infosec diminished security risks by assessing the
customer’s infrastructure vulnerabilities and recom-
mended solutions with proven methods to enhance
security.
B R I S K I N F O S E C
TECHNOLOGY AND CONSULTING PVT LTD
contact@briskinfosec.com
www.briskinfosec.com
044 - 43524537
+91-8608634123
CONCLUSION
We educated our Stakeholder on the measures to be taken for remedying the various flaws in their systems and
processes. For remediation, we educated them about the mandatory processes such as the monitoring of their
website daily and most significantly emphasizing them about the need to tighten their security to cult Quality. Also,
we insisted them that their day to day networks to be segregated from the network storing sensitive personal
information. We also worked closely with our Stakeholder to improve their policies, procedures and employee
awareness programmes to increase their security maturity.
CUSTOMER SATISFACTION
Website Pentest was conducted with minimum
interruption and damage across customer systems
to identify security vulnerabilities, impacts, and
potential risks.
COST SAVINGS
Brisk Infosec suggested cost-effective measures
based on the customer’s business requirements that
would ensure security and continuity of the
business.

More Related Content

Similar to Website Security Service.pdf

Indus Aviation Systems LLP
Indus Aviation Systems LLPIndus Aviation Systems LLP
Indus Aviation Systems LLP
indusaviation
 
Webinar - Nuage Networks Integration with Check Point vSEC Gateway
Webinar - Nuage Networks Integration with Check Point vSEC GatewayWebinar - Nuage Networks Integration with Check Point vSEC Gateway
Webinar - Nuage Networks Integration with Check Point vSEC Gateway
Hussein Khazaal
 
Software Testing Services | Best software testing consulting companies
Software Testing Services | Best software testing consulting companiesSoftware Testing Services | Best software testing consulting companies
Software Testing Services | Best software testing consulting companies
gnareshsem
 
Secure SDLC in mobile software development.
Secure SDLC in mobile software development.Secure SDLC in mobile software development.
Secure SDLC in mobile software development.
Mykhailo Antonishyn
 
Demand for Penetration Testing Services.docx
Demand for Penetration Testing Services.docxDemand for Penetration Testing Services.docx
Demand for Penetration Testing Services.docx
Aardwolf Security
 
Scaling AppSec through Education
Scaling AppSec through EducationScaling AppSec through Education
Scaling AppSec through Education
Grant Ongers
 
Softengi - Inspired Software Engineering
Softengi - Inspired Software EngineeringSoftengi - Inspired Software Engineering
Softengi - Inspired Software Engineering
Softengi
 
Datasheet app vulnerability_assess
Datasheet app vulnerability_assessDatasheet app vulnerability_assess
Datasheet app vulnerability_assessBirodh Rijal
 
RAYMOND L. WATSON
RAYMOND L. WATSONRAYMOND L. WATSON
RAYMOND L. WATSONRay Watson
 
Enterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A BossEnterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A Boss
rbrockway
 
7 measures to overcome cyber attacks of web application
7 measures to overcome cyber attacks of web application7 measures to overcome cyber attacks of web application
7 measures to overcome cyber attacks of web application
TestingXperts
 
Acunetix Training and ScanAssist
Acunetix Training and ScanAssistAcunetix Training and ScanAssist
Acunetix Training and ScanAssistBryan Ferrario
 
How to Get Started with DevSecOps
How to Get Started with DevSecOpsHow to Get Started with DevSecOps
How to Get Started with DevSecOps
CYBRIC
 
IBM Rational AppScan Product Overview
IBM Rational AppScan Product OverviewIBM Rational AppScan Product Overview
IBM Rational AppScan Product Overview
Ashish Patel
 
Brochure Swascan Overview
Brochure Swascan OverviewBrochure Swascan Overview
Brochure Swascan OverviewSara Colnago
 
Swascan
Swascan Swascan
Swascan
Pierguido Iezzi
 
Carlos Amador Resume 03 2010
Carlos Amador Resume 03 2010Carlos Amador Resume 03 2010
Carlos Amador Resume 03 2010CMA_SlideShare
 
Open text security services catalog
Open text security services catalogOpen text security services catalog
Open text security services catalog
Marc St-Pierre
 
Vulnerability Testing Services Case Study
Vulnerability Testing Services Case StudyVulnerability Testing Services Case Study
Vulnerability Testing Services Case Study
Nandita Nityanandam
 
Дмитро Терещенко, "How to secure your application with Secure SDLC"
Дмитро Терещенко, "How to secure your application with Secure SDLC"Дмитро Терещенко, "How to secure your application with Secure SDLC"
Дмитро Терещенко, "How to secure your application with Secure SDLC"
Sigma Software
 

Similar to Website Security Service.pdf (20)

Indus Aviation Systems LLP
Indus Aviation Systems LLPIndus Aviation Systems LLP
Indus Aviation Systems LLP
 
Webinar - Nuage Networks Integration with Check Point vSEC Gateway
Webinar - Nuage Networks Integration with Check Point vSEC GatewayWebinar - Nuage Networks Integration with Check Point vSEC Gateway
Webinar - Nuage Networks Integration with Check Point vSEC Gateway
 
Software Testing Services | Best software testing consulting companies
Software Testing Services | Best software testing consulting companiesSoftware Testing Services | Best software testing consulting companies
Software Testing Services | Best software testing consulting companies
 
Secure SDLC in mobile software development.
Secure SDLC in mobile software development.Secure SDLC in mobile software development.
Secure SDLC in mobile software development.
 
Demand for Penetration Testing Services.docx
Demand for Penetration Testing Services.docxDemand for Penetration Testing Services.docx
Demand for Penetration Testing Services.docx
 
Scaling AppSec through Education
Scaling AppSec through EducationScaling AppSec through Education
Scaling AppSec through Education
 
Softengi - Inspired Software Engineering
Softengi - Inspired Software EngineeringSoftengi - Inspired Software Engineering
Softengi - Inspired Software Engineering
 
Datasheet app vulnerability_assess
Datasheet app vulnerability_assessDatasheet app vulnerability_assess
Datasheet app vulnerability_assess
 
RAYMOND L. WATSON
RAYMOND L. WATSONRAYMOND L. WATSON
RAYMOND L. WATSON
 
Enterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A BossEnterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A Boss
 
7 measures to overcome cyber attacks of web application
7 measures to overcome cyber attacks of web application7 measures to overcome cyber attacks of web application
7 measures to overcome cyber attacks of web application
 
Acunetix Training and ScanAssist
Acunetix Training and ScanAssistAcunetix Training and ScanAssist
Acunetix Training and ScanAssist
 
How to Get Started with DevSecOps
How to Get Started with DevSecOpsHow to Get Started with DevSecOps
How to Get Started with DevSecOps
 
IBM Rational AppScan Product Overview
IBM Rational AppScan Product OverviewIBM Rational AppScan Product Overview
IBM Rational AppScan Product Overview
 
Brochure Swascan Overview
Brochure Swascan OverviewBrochure Swascan Overview
Brochure Swascan Overview
 
Swascan
Swascan Swascan
Swascan
 
Carlos Amador Resume 03 2010
Carlos Amador Resume 03 2010Carlos Amador Resume 03 2010
Carlos Amador Resume 03 2010
 
Open text security services catalog
Open text security services catalogOpen text security services catalog
Open text security services catalog
 
Vulnerability Testing Services Case Study
Vulnerability Testing Services Case StudyVulnerability Testing Services Case Study
Vulnerability Testing Services Case Study
 
Дмитро Терещенко, "How to secure your application with Secure SDLC"
Дмитро Терещенко, "How to secure your application with Secure SDLC"Дмитро Терещенко, "How to secure your application with Secure SDLC"
Дмитро Терещенко, "How to secure your application with Secure SDLC"
 

More from Briskinfosec Technology and Consulting

Web Application Penetration Testing.pdf
Web Application Penetration Testing.pdfWeb Application Penetration Testing.pdf
Web Application Penetration Testing.pdf
Briskinfosec Technology and Consulting
 
Website Penetration Testing Services.pdf
Website Penetration Testing Services.pdfWebsite Penetration Testing Services.pdf
Website Penetration Testing Services.pdf
Briskinfosec Technology and Consulting
 
Web Application Security Service.pdf
Web Application Security Service.pdfWeb Application Security Service.pdf
Web Application Security Service.pdf
Briskinfosec Technology and Consulting
 
Threatsploit Adversary Report November
Threatsploit Adversary Report NovemberThreatsploit Adversary Report November
Threatsploit Adversary Report November
Briskinfosec Technology and Consulting
 
The Future Is Blockchain Era
The Future Is Blockchain EraThe Future Is Blockchain Era
The Future Is Blockchain Era
Briskinfosec Technology and Consulting
 
Comprehensive Guide On Network Security
Comprehensive Guide On Network SecurityComprehensive Guide On Network Security
Comprehensive Guide On Network Security
Briskinfosec Technology and Consulting
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec Technology and Consulting
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec Technology and Consulting
 

More from Briskinfosec Technology and Consulting (8)

Web Application Penetration Testing.pdf
Web Application Penetration Testing.pdfWeb Application Penetration Testing.pdf
Web Application Penetration Testing.pdf
 
Website Penetration Testing Services.pdf
Website Penetration Testing Services.pdfWebsite Penetration Testing Services.pdf
Website Penetration Testing Services.pdf
 
Web Application Security Service.pdf
Web Application Security Service.pdfWeb Application Security Service.pdf
Web Application Security Service.pdf
 
Threatsploit Adversary Report November
Threatsploit Adversary Report NovemberThreatsploit Adversary Report November
Threatsploit Adversary Report November
 
The Future Is Blockchain Era
The Future Is Blockchain EraThe Future Is Blockchain Era
The Future Is Blockchain Era
 
Comprehensive Guide On Network Security
Comprehensive Guide On Network SecurityComprehensive Guide On Network Security
Comprehensive Guide On Network Security
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
 

Recently uploaded

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 

Website Security Service.pdf

  • 1. INDUSTRY Software Development Software OWASP, PTES, SANS, NIST, ISO27001, PCI-DSS STANDARDS PRIMARY SECTOR ABOUT CUSTOMER Our stakeholder offers Strategic IT consulting and Managed Solutions to Technology compa- nies.They have transformed over the years from a plain contract staffing service provider into a leader in Consulting for myriad technologies ranging from application development using Open Source, Microsoft, Java and Mainframe technologies to state of the art SMAC technolo- gies. They have been the pioneer all over Globe providing the highest ethical standards of service. They operate across eight major cities in India apart from the overseas operations. Their scale of capabilities, offerings and customer engagements in the IT & ITES domain differentiates them from other companies in the consulting and recruitment vertical. Top Software Development Company’s Website Briskinfosec secured TYPE OF SERVICES : Website Security Assessment CASE STUDY OFFERED SERVICE Penetration Test Middle East LOCATION
  • 2. ASSESSMENT SCOPE To find the vulnerabilities in the Website, Stakeholder wanted us to conduct a proactive website Penetration test to find any loopholes in Website for hackers to gain access. So, an URL was given directly for scanning vulnerabilities. The kind of testing executed was Black Box Testing, testing without credentials. Most importantly, the ultimate goal was to make the website free from any vulnerability that may compromise their site. THE SOLUTION Briskinfosec followed standards like Open Web Application Security Project (OWASP) TOP 10 and Application Security Verification Standards (ASVS) to identify all exposed vulnerabilities in the Website. BriskInfosec’s security team completely tested the Website Key highlights of the bug fix are as below : | Serious issues related to Input validation, Injection attacks, Sensitive Data Exposure and Clickjacking attacks were identified. The Development team then fixed the identified bugs. | We completely secured the web application from OWASP common attack by hardening the default configuration. | We performed vulnerability assessment by both automation and manual method of identifying the issues. | We provided the complete vulnerability fixing document as a reference to your development team. | OWASP ASVS (APPLICATION SECURITY VERIFICATION STANDARD) was also shared without failing. THE DELIVERABLE The reports and remediation information provided were customised to match the Client’s operational environment and development framework. The following reports were submitted to the customer. Key highlights of the bug fix are as below : TECHNICAL SECURITY ASSESSMENT REPORT Complete security testing was carried. All the detected issues and the proof of concept ( POC ) will be covered with detailed steps in a PDF format. ISSUE TRACKING SHEET All the identified issues were captured and will the be subjected for the retest review in an XLS format. WORKFLOW REPORT Every process was carried out by the entire team without ignorance of anything. DAILY STATUS REPORT FINAL BUG FIX REPORT Overview of the entire engagement, the issues identified and the recommendations made to mitigate the same. This website security assessment consumed around 1-2 weeks of time including retest. During the process of website testing, issues were identified and we shared all identified issues with corresponding recom- mendation Fix over mail on a daily basis. Our pros- pect looked at the given valid report (XLS) and started working the fix right from Day 1 as they need not work laboriously on the last day when the entire report is given by the security team thus making their final assessment report easier for preparation. OWASP ASVS ( APPLICATION SECURITY VERIFICATION STANDARD ) was shared. THE CHALLENGE During Vulnerability Assesment, a stunning number of functional issues were identified because of which there were many restrictions and disruptions during testing. Due to this inconvenience, we were unable to access certain credentials with restricted user privilege experienced by our security team. Howev- er, with dexterous perseverance, Brisk Infosec reduced the Stakeholder risks of their site being visible to breaches. RISK BENEFITS Brisk Infosec diminished security risks by assessing the customer’s infrastructure vulnerabilities and recom- mended solutions with proven methods to enhance security.
  • 3. B R I S K I N F O S E C TECHNOLOGY AND CONSULTING PVT LTD contact@briskinfosec.com www.briskinfosec.com 044 - 43524537 +91-8608634123 CONCLUSION We educated our Stakeholder on the measures to be taken for remedying the various flaws in their systems and processes. For remediation, we educated them about the mandatory processes such as the monitoring of their website daily and most significantly emphasizing them about the need to tighten their security to cult Quality. Also, we insisted them that their day to day networks to be segregated from the network storing sensitive personal information. We also worked closely with our Stakeholder to improve their policies, procedures and employee awareness programmes to increase their security maturity. CUSTOMER SATISFACTION Website Pentest was conducted with minimum interruption and damage across customer systems to identify security vulnerabilities, impacts, and potential risks. COST SAVINGS Brisk Infosec suggested cost-effective measures based on the customer’s business requirements that would ensure security and continuity of the business.