Tier3's Web Application Security Assessment will comprehensively appraise the security of an application. The tests are carried out from both the authenticated and un authenticated perspective and will offer an evaluation of the sites security posture from both valid users who aim to escalate access privileges, and unauthorised users.
The service provides the client with a report that is comprehensive, clear and concise. The report is designed to provide information for a diverse audience of readers .
The report delivers :
Executive Summary – The opening section of the report provides, in plain English a executive summary overview of the entire assessment including recommendations to improve the security posture of the in scope environment.
Graphical Summary – Key findings are ranked, split into three impact categories and positioned in a graphical table according to the relative risk or likelihood of exploit.
Security Evaluation by Category – The evaluation ratings compare information gathered during the course of the engagement to “best in class” criteria for security standards. An evaluation of “Excellent”, “Satisfactory”, “Fair” or “Improvement Required” is provided. Each category includes a best practice statement, evaluation result and recommendation to achieve best practice.
Vulnerability Analysis – The vulnerability analysis section provides a detailed description of each discovered flaw including any necessary technical information and corrective recommendations.
Exploitation Probability – Each listed vulnerability is assigned a “Probability” rating based upon how likely the vulnerability is to be exploited.