You are here:

Security Testing

Vulnerability Scans
Penetrationstests
Hybrid Security Assessment
Source Code Audit
Security Audit and Hardening Check

Vulnerability Scans

Vulnerability scans are an essential part of a company’s preventive security strategy and also represent a cost-effective alternative to penetration tests. By conducting these scans regularly, potential security risks can be identified and remedied early on before they can be exploited by attackers. The aim of our service is to increase the security of our customers by conducting a comprehensive examination of their systems and networks, while keeping an eye on the cost-benefit factor.

Penetrationstest

With the help of a simulated attack, we penetrate your company’s IT infrastructure at various levels or examine your software product with regard to the current IT security level. The aim of the analyses is to improve IT security and minimize the risks of a cyber attack.

Hybrid Security Assessment

At SmartTECS Cyber Security, we have recognized that while penetration testing and vulnerability research both aim to improve system security, they are not the same. To meet the challenges of complex or highly integrated systems, we have evolved our approach. Our hybrid security assessments combine elements of vulnerability research with traditional penetration testing to provide a deeper understanding and more comprehensive assessment of our clients’ security posture.

source code audit

We use state-of-the-art static and dynamic code analysis tools to thoroughly examine your source code for vulnerabilities and potential security risks. We identify critical vulnerabilities and provide practical recommendations on how to fix the vulnerabilities.

Static application security testing (SAST) is the examination of an application system by reviewing the source code. The analysis covers various levels and perspectives of the application system:

  • application-level verification
    • e.g. implementation of application components, interaction with other software components, etc.
  • Checking at class and logic level
    • e.g. implementation of classes, control flows, input validation, etc.
  • checking configurations
    • e.g. for the application server, frameworks used, logging, etc.

Security Audit and Hardening Check

Our comprehensive audits are supported by modern security tools and technologies to examine your entire infrastructure for vulnerabilities and potential attack vectors. With our hardening checks, we ensure that your systems are up to date with the latest security standards to protect your data and systems.

A security audit and hardening check includes the review of a company infrastructure or individual applications in the form of guideline-based interviews with the responsible contacts in the customer organization. The subject of the audit is the security-relevant processes of the organization as well as the architecture and configuration of the IT systems. In addition, a detailed review of the configuration (hardening check) can be carried out for selected systems.

Sources

[1] The OWASP® Foundation, OWASP Application Security Verification Standard, https://owasp.org/www-project-application-security-verification-standard/

[2] The OWASP® Foundation, OWASP Code Review Guide, https://owasp.org/www-project-code-review-guide/

[3] Carnegie Mellon University Software Engineering Institute , SEI CERT Coding Standards, https://wiki.sei.cmu.edu/confluence/display/seccode/SEI+CERT+Coding+Standards

[4] IT-Grundschutz-Kompendium, BSI: https://www.bsi.bund.de/DE/Themen/Unternehmen-und-Organisationen/Standards-und-Zertifizierung/IT-Grundschutz/IT-Grundschutz-Kompendium/it-grundschutz-kompendium_node.html

[5] BSI standards for Internet security, BSI: https://www.bsi.bund.de/DE/Themen/Unternehmen-und-Organisationen/Informationen-und-Empfehlungen/ISI-Reihe/isi-reihe.html

[6] CIS Benchmarks, Center for Information Security (CIS): https://www.cisecurity.org/cis-benchmarks/