Automated tests
We begin the assessment with the deployment of web security scanners. These tools efficiently cover certain test points and provide a global impression of the application.
Interactive tests
We manually examine the application in search for vulnerabilities and further map out the functionality. We select test points for further research on the basis of application knowledge, chance of vulnerability and impact.
Code reviews
We check functionality with a high risk for security vulnerabilities by analyzing the code. For this we use static code analysis: we check your program code manually and with tooling. For potential vulnerabilities, we verify whether they can actually be exploited.