Risk Management

Risk management is an essential solution, especially during the system design phase.

One of our clients was developing and maintaining a CRM solution for small and medium-sized businesses. Their platform allows businesses to effectively manage and engage with customers, automate processes and provide management reporting. As the client processes a large amount of sensitive information, including customer data and financial transactions, it is critical to ensure a high level of cybersecurity and compliance with regulatory requirements. In addition, the client mentioned that they were working with a vendor who had been tasked with developing a new module of system, and they wanted to evaluate the proposed solution. As a result, the client requested a risk management assessment of both the existing solution and the vendor-developed system to identify vulnerabilities and evaluate the solutions as a whole.

We began by analysing the existing solution and evaluating the modules being developed for it. We reviewed the project documentation and conducted interviews with management and the development team. The coding approaches, release processes and testing procedures were assessed. In addition, we analysed the architecture of the solution and performed threat modelling of the modules being developed by the vendor. Compliance with GDPR and CCPA requirements was also verified.

You will learn about the methodologies and approaches we used during the presale phase 😉
 
The following categories were analyzed in total:
  • Risk Management
  • Government regulations (GDPR, CCPA)
  • Company processes (documentation, meetings, etc.)
  • Architecture
  • Cloud
  • Network security
  • Code, frameworks, packages
  • Continuous Integration (CI) and Continuous Deployment (CD)
  • Authentication/Authorization (organizational structure, roles, accesses, policies)

Additionally, the following recommendations were made for future actions:
  • Social engineering (emails, messaging apps, etc.)
  • Penetration testing
  • Cybersecurity training
  • National Security Strategy
  • Incident Response Plans (IRP)

The results of our audit identified several issues with the existing solution, such as a non-standardised coding approach using a code of conduct from a different language and framework. There was also a problem with system recovery in the event of an unsuccessful release.

Threat modelling of the auxiliary system being developed by the vendor revealed component vulnerabilities and weaknesses in inter-service communication. This allowed us to incorporate security measures into the designed system early on, rather than developing insecure and inefficient solutions that would have required rework later. This saved the client resources and reduced development time.

In total, the services/reports were provided:
  • Cybersecurity Business Report
  • Detailed Cybersecurity Technical Report


The client did not expect a cybersecurity audit during the development phase to uncover complex issues and prevent their future implementation, which had a significant impact on the vendor's estimated timeline and reduced project costs. The client was pleased with the verification of GDPR and CCPA compliance. As a result, they expressed interest in continuing to work with us and requested a phased analysis of the vendor's ongoing development.

Cybersecurity Audit of Vendor Solutions

Regular independent cybersecurity audits are critical, especially when working with an external vendor. They provide an objective assessment of the vendor’s solutions and help identify potential vulnerabilities in advance. External assessments complement internal reviews and ensure compliance with security standards, minimising risk.

Threat modeling

Threat modeling should be seen as an integral part of the development process. It helps to identify potential threats at an early stage, saving resources and ensuring a secure solution/application architecture.

Planning for Cybersecurity

Plan for cybersecurity in advance to avoid vulnerabilities during development and implementation. This proactive approach ensures effective protection of systems and data, minimising future risks and saving costs in the long run.

What gets measured gets managed.

- Peter Drucker

Safety Project

Securing Your Future Projects

Connect Today

United for Your Safety

Have a project in mind?

Do not hesitate to say