Our client is a US based private intelligence group that provides highly confidential information intelligence services to various federal agencies across the globe. Such intelligence is availed to them via different subscription models. Interested agencies can buy annual corporate licenses to access the confidential information available through the portal. Portal also segregates different views for anonymous, registered, client administrator and super administrators. Such intelligence is gathered using various resources like TV, Newspaper, tie-ups with local channels, research, etc. Information is highly sensitive in nature and is useful to federal agencies to build strong intelligence network across the globe.
Due to sensitive nature of the information that portal carries, there was a need to secure such information from attackers and also to ensure that information is available as per the access policies. Safe-guarding information assets in the application was on the top priority as the application was internet facing. Most challenging part was to assess different third party modules being called from the portal.
On the one side, our customer was serious about securing the information and was also pressurized by federal agencies to safe-guard such highly sensitive information so that it is not misused by malicious visitors. Development was done over the latest development framework with few third party modules plugged into the application.
Torrid suggested a thorough, security assessment to the customer. This involved doing a line-by-line inspection of the code to figure out code level vulnerabilities and backdoors in application, followed by in-depth application security assessment or grey-box testing.
Detailed code review, followed by an in-depth application security audit would make their development life-cycle more robust and making the developers aware about the common security mistakes while coding web applications.
The modus operandi being followed was as below:
Torrid helped them in assessing their overall security posture, strengthening their SDLC and mitigating the over all risks posed due to insecure code.
The detailed, multi-staged reporting processes, a heavy stress was laid on best practices and step-by-step tutorials on various security issues which would help them bear the brunt of such attacks in the future. Some brief trainings and sessions on secure coding were also imparted.