BEL

noun-screen-reader
Bharat Electronics Limited

Vulnerability Assessment & Penetration Testing /IT Security Audits

Next-Gen Security Services

A Shield of Protection for it Assets

Security Testing

  • Is intended to reveal flaws in the security mechanisms of an information asset
  • Protects the data and maintain functionality as intended
  • Focuses on the various layers of an information system across infrastructure, database, network and application
  • Helps in detecting all possible security risks in the system and makes the applications & assets free from vulnerabilities
security-audit-1

Benefits

  • Secures IT networks from internal and external attacks
  • Secures applications from business logic flaws
  • Increases ROI on IT security
  • Safeguards the organization from loss of reputation and money
  • Safe guards organization data
  • Show real time risks
  • Security awareness
  • Maintain trust

Delivering Secure Systems Through VAPT

security-audit-2

Vulnerability Assessment

DEVICE DISCOVERY

  • Identify
  • Ping
  • Syn Scan

SERVICE ENUMERATION

  • TCP Ports
  • UDP Ports

  • Web Services

SCANNING

  • Configuration Issues
  • Missing Patches
  • Dangerous Services

VALIDATION

  • False Positive Removal
  • Manual Verification
  • Review Scan Logic

Penetration Testing

DEVICE DISCOVERY

  • Analysis
  • Footprint
  • Identify

SERVICE ENUMERATION

  • Ping
  • Map
  • Collect

APPLICATION LAYER TESTING

  • Manual
  • Depth
  • Blind

EXPLOIT

  • Attack
  • Penetrate
  • Compromise

POST EXPLOITATION

  • Persistence
  • Search
  • Exfiltrate

APPLICATION VAPT

Identifying potential threats to Applications – including Standalone, Web Applications, Mobile Apps etc., and provide counter-measures to secure.

DATABASE VAPT

Identifying weak points in database such as SQL injection attacks and configuration settings and provide recommendations to secure.

HOST VAPT

To identify vulnerabilities in Servers, Workstations and other Network hosts and provide solutions to secure.

NETWORK VAPT

Network VAPT is pentesting conducted over the network targeting network services offered by the target.

Services Offered

Testing Services
  • Threat Modelling            
  • Risk Assessment
  • Network Mapping                
  • Vulnerability Assessment
  • Mobile Apps VAPT                
  • Malware/ Backdoor Detection
  • Penetration Testing              
  • Security Compliance Audits
  • VAPT Awareness Training
  • Application Security Assessment
  • VAPT Implementation Consultation
  • Secure Code Analysis /Static Analysis
  • Assessment of Exploitation of the Vulnerabilities
  • Review and Assessment of Security Policies and Controls as per Best Practices

Vulnerability Assessment & Penetration Testing (VAPT) Process Flow

security-audit-3
  1. Goals & Objectives
  2. Scope
  3. Information Gathering
  4. Vulnerability Detection
  5. Information Analysis & Planning
  6. Attack & Penetration
  7. Privilege Escalation
  8. Result Analysis
  9. Reporting
  10. Clean-up

Why BEL VAPT Services?

  • With industry-leading IT security domain expertise, the Cyber Security group of BEL combines proven IT security technology and industrial know-how to ensure business continuity and maximize productivity.
  • We provide innovative IT security services to defence and non-defence customers to secure their Software projects, IT assets, information, operations and people.

  • Our complete portfolio leverages on years of expertise and experience in process control and cyber security resulting in the application of proprietary methodologies, best practices, and a comprehensive understanding of cyber security requirements for the process control domain.

Our Approach

Step 1: Understand the Scope of Assessment

Step 2: Sign an NDA (Non-Disclosure Agreement/ RoE (Rules of Engagement)

Step 3: Study the Project/ IT Network

Step 4: Perform Vulnerability Assessment

Step 5: Perform Penetration Testing

Step 6: Report and Provide Recommendations

Step 7: Issue Safe to Host Certificate