Penetration Test Audits
Penetration Test (ethical hacking) Audits assess the security robustness of a software asset through an examination of the application in its full running state. They include exploratory risk analysis to bypass security controls (such as WAF and input validation) as well as attempts to abuse business logic and user authorization to demonstrate how hackers might gain access and cause damage.
Static Application Security Test Audits
SAST Audits combine automated tool-based scans with a source code review to systematically find critical software security vulnerabilities such as SQL injection, cross-site scripting, buffer overflows, and the rest of the OWASP Top 10.
Security Controls Design Analysis
SCDA evaluates the design of key security controls—including password storage, identity and access management, and use of cryptography—against industry best practices to determine whether any are misconfigured, weak, misused, or missing. SCDA finds system defects related to security controls in the design of the application; no testing or analysis of the application or code is performed.