Service · VAPT · OWASP · PTES

VAPT services
for Indian organizations.

Vulnerability assessment and penetration testing across web applications, mobile apps, APIs, infrastructure, and cloud. Aligned to OWASP Top 10, PTES, CERT-In empanelment guidelines, and ISO 27001 Annex A.8.8 / A.8.29 evidence requirements.

OWASP · PTESMethodology baseline
2–6 wkTypical engagement
₹35K–₹3.5LScope-based pricing band
Re-testIncluded as standard

VAPT (Vulnerability Assessment and Penetration Testing) is the technical security testing layer that sits beneath ISO 27001 and underpins regulatory expectations from RBI, SEBI, IRDAI, CERT-In, and increasingly the DPDP Act. We deliver VAPT across five target categories — web applications, mobile (Android + iOS), APIs, network infrastructure, and cloud configuration — with deliverables formatted for CB Stage 2 audit evidence, RBI / SEBI submission, customer audit response, or internal stakeholder readiness.

Engagements are fixed-price per scope, delivered with a documented methodology (OWASP Web Security Testing Guide, OWASP MASTG for mobile, PTES for network, and cloud configuration benchmarks). The report is technical-but-readable: every finding ranked by CVSS, reproduction steps, remediation guidance, and an executive summary that a CISO can share with the board.

We bundle VAPT into our ISO 27001 engagements for consistency at Stage 2 audit, but VAPT runs equally as a standalone service — common drivers are RBI / SEBI annual testing requirements, customer audit responses, or pre-launch security validation for product releases.

What's in scope

What this engagement covers

Six explicit scope areas — what you can expect, end to end, on a typical engagement.

Web application testing

OWASP Top 10 + WSTG-aligned testing of web applications. Authentication, authorization, session management, input validation, business-logic flaws, third-party library exposure. Black-box, grey-box, or white-box per scope.

Mobile (Android + iOS)

OWASP MASTG-aligned mobile testing. Local storage, transport security, code obfuscation, jailbreak/root detection, deep links, IPC, certificate pinning, and reverse-engineering resistance. APK/IPA review + dynamic runtime testing.

API & microservice testing

OWASP API Security Top 10 — broken authorization, mass assignment, rate limiting, security misconfiguration, BOLA / BFLA. REST, GraphQL, gRPC. Documented endpoints + discovery for undocumented surface.

Network & infrastructure

Internal and external infrastructure VAPT — host enumeration, service-level vulnerability scanning, exploit verification (ethical), privilege escalation, lateral movement. PTES-aligned methodology. Includes Active Directory and segmentation testing.

Cloud configuration review

AWS / Azure / GCP configuration benchmarks against CIS, vendor-published baselines, and your own policy. IAM analysis, public-exposure scanning, encryption posture, logging adequacy, separation between environments.

Remediation guidance + re-test

Every finding ships with reproduction steps, screenshot evidence (responsibly redacted), CVSS v3.1 score, and concrete remediation guidance. Re-test of remediated findings included as standard — no surprise add-on cost.

How we deliver

The 4-stage delivery process

From kickoff to handover. Senior lead auditor accountable end to end.

  1. 01

    Scoping + rules of engagement (week 1)

    Scope workshop: targets, IP ranges, in-scope vs out-of-scope, test windows, escalation paths, customer authorization letters. Rules of Engagement document signed by both sides before any testing begins.

  2. 02

    Testing (week 2–4)

    Reconnaissance, vulnerability identification, exploit verification (ethical, non-destructive). Daily standup with your security team. Critical findings reported live, not at end-of-engagement.

  3. 03

    Report + readout (week 5)

    Technical report (per-finding) + executive summary (board-level). Joint readout call with your team to walk through every finding, answer questions, and align on remediation priority. Report ships in PDF + structured CSV/JSON for ticketing import.

  4. 04

    Re-test + closure (week 6)

    After your team remediates, we re-test every finding marked 'fixed' — verify the fix, validate no regression. Final clean report issued for stakeholder distribution (CB audit, customer, regulator, board).

Deliverables

What you walk away with

Concrete artefacts handed over at engagement close — not slides, not summaries.

  • 01 Rules of Engagement (RoE) document signed pre-engagement
  • 02 Technical finding report with per-issue reproduction + remediation
  • 03 Executive summary suitable for board / CB auditor / customer
  • 04 CVSS v3.1 ranking and prioritized remediation roadmap
  • 05 Structured export (CSV / JSON) for ticketing system import
  • 06 Re-test of remediated findings included as standard
  • 07 Final clean-state report after re-test for stakeholder distribution
  • 08 Attestation letter usable for customer audit response
Sector use cases

Where this engagement most often fits

Same service. Different control emphasis, different audit scrutiny.

Banks, NBFCs & PSPs

RBI Cyber Framework annual testing requirement, payment card environment scope, NPCI vendor expectations. Reports formatted for RBI / NPCI submission and board reporting.

Fintech & PayTech

Mobile + web + API combined scope, PCI DSS scope-overlap testing, KYC/eKYC flow validation, transaction integrity testing. Often quarterly cadence.

SaaS Exporters

Pre-launch security validation, annual penetration testing for SOC 2 Type II + ISO 27001 evidence, customer-requested testing per enterprise procurement asks.

BPO / KPO / ITeS

Client-specific testing per customer contract, customer audit response support, secure transmission validation for sensitive data flows.

Pricing model

How engagements are scoped and priced

Fixed-price wherever scope is well-defined; T&M or retainer where ongoing work needs flexibility.

Single application Web OR mobile OR API

One web app, one mobile platform, or one API surface. Fixed-price ₹35K–₹1.0L depending on complexity, authentication tiers, and business logic surface.

Combined scope Multi-target product

Web + mobile (iOS+Android) + API + cloud configuration for a single product. Fixed-price ₹1.2L–₹2.5L. Most common engagement size for fintech / SaaS.

Enterprise / network Infrastructure-heavy

Internal + external network VAPT, AD + segmentation testing, cloud configuration review, multi-site. ₹2.0L–₹3.5L. Suitable for banks, large SaaS, regulated entities.

Frequently asked

FAQs

01 What is the difference between vulnerability assessment and penetration testing?

Vulnerability assessment is broad-and-shallow — automated scanning + manual review to identify potential weaknesses. Penetration testing is narrow-and-deep — ethical exploitation to demonstrate real-world impact and prove which findings are exploitable in your environment. We deliver both as a single engagement: VA gives you breadth, PT gives you proof. Reports rank findings by exploitability, not just CVSS, because regulators and auditors care about the difference.

02 Is your VAPT report acceptable for RBI / SEBI / CERT-In submission?

Yes for RBI Cyber Framework annual testing requirements (banks, NBFCs, PSPs) and SEBI CSCRF expectations. CERT-In requires testing performed by CERT-In empanelled auditors for specific use cases — we coordinate with CERT-In empanelled testing partners on request for those scenarios.

03 Will the testing disrupt our production systems?

No — non-destructive testing is the default, and we agree the rules of engagement explicitly before testing begins. For high-risk targets (production payment systems, live trading platforms), we test in staging environments or schedule low-traffic windows. We never run automated brute-force or denial-of-service tests in production without explicit authorization.

04 How long does a typical engagement take?

Single web application: 1–2 weeks. Combined web + mobile + API: 3–4 weeks. Network + infrastructure VAPT: 2–4 weeks. Add 1 week for report delivery and 1 week for re-test cycle. Total typical engagement window 4–8 weeks.

05 Is re-test included?

Yes — re-test of every finding your team marks 'fixed' is included as standard. We verify the fix, confirm no regression, and re-issue a clean-state report after closure. No surprise add-on cost.

06 Do you provide an attestation letter for customer audit response?

Yes. Post re-test, we issue an attestation letter summarizing scope, methodology, dates of testing, and final remediation state. This is what most enterprise customers ask for in vendor security questionnaires — readable to procurement / GRC teams without exposing the full technical detail.

07 Can VAPT be bundled into an ISO 27001 engagement?

Yes — and it's our recommended approach. ISO 27001 Annex A.8.8 (vulnerability management) and A.8.29 (security testing) effectively require periodic technical testing. Bundling VAPT into the ISO 27001 engagement gives the CB Stage 2 auditor consistent evidence from one supplier. Standalone VAPT also works fine if you already have ISMS in place.

08 What if the test finds something critical mid-engagement?

Critical findings (CVSS ≥ 9.0 or active exploitation pathways) are reported within 24 hours of confirmation — not at end of engagement. Reported via signed communication to a named recipient. We pause testing in the affected area while your team contains. Engagement resumes once the immediate exposure is controlled.

Get a VAPT proposal in 48 hours.

Tell us your target scope (web / mobile / API / network / cloud), authentication model, and reporting deadline. We come back with a fixed-price proposal and a 4–8 week schedule.