One of our clients was developing and maintaining a CRM solution for small and medium-sized businesses. Their platform allows businesses to effectively manage and engage with customers, automate processes and provide management reporting. As the client processes a large amount of sensitive information, including customer data and financial transactions, it is critical to ensure a high level of cybersecurity and compliance with regulatory requirements. In addition, the client mentioned that they were working with a vendor who had been tasked with developing a new module of system, and they wanted to evaluate the proposed solution. As a result, the client requested a risk management assessment of both the existing solution and the vendor-developed system to identify vulnerabilities and evaluate the solutions as a whole.
We began by analysing the existing solution and evaluating the modules being developed for it. We reviewed the project documentation and conducted interviews with management and the development team. The coding approaches, release processes and testing procedures were assessed. In addition, we analysed the architecture of the solution and performed threat modelling of the modules being developed by the vendor. Compliance with GDPR and CCPA requirements was also verified.
The results of our audit identified several issues with the existing solution, such as a non-standardised coding approach using a code of conduct from a different language and framework. There was also a problem with system recovery in the event of an unsuccessful release.
Threat modelling of the auxiliary system being developed by the vendor revealed component vulnerabilities and weaknesses in inter-service communication. This allowed us to incorporate security measures into the designed system early on, rather than developing insecure and inefficient solutions that would have required rework later. This saved the client resources and reduced development time.
The client did not expect a cybersecurity audit during the development phase to uncover complex issues and prevent their future implementation, which had a significant impact on the vendor's estimated timeline and reduced project costs. The client was pleased with the verification of GDPR and CCPA compliance. As a result, they expressed interest in continuing to work with us and requested a phased analysis of the vendor's ongoing development.
Regular independent cybersecurity audits are critical, especially when working with an external vendor. They provide an objective assessment of the vendor’s solutions and help identify potential vulnerabilities in advance. External assessments complement internal reviews and ensure compliance with security standards, minimising risk.
Threat modeling should be seen as an integral part of the development process. It helps to identify potential threats at an early stage, saving resources and ensuring a secure solution/application architecture.
Plan for cybersecurity in advance to avoid vulnerabilities during development and implementation. This proactive approach ensures effective protection of systems and data, minimising future risks and saving costs in the long run.