The aims of this process are to ensure that an application or a service is free from vulnerabilities, before they become an operational product and to develop a procedure of secure maintenance and management of its lifecycle. For this process, established code analysis and vulnerability discovery techniques/methods are being used, also by taking into consideration the various recommendations of authoritative organisations.
The methodology according to which this service is applied, ensures the organisation’s uninterrupted operation, as well as the confidentiality and discretion of the results.