Macksofy Technologies
Chennai · Web App Pentest
CERT-In EmpanelledChennai

Web Application Security in Chennai · OMR SaaS, PSU Banks & TNeGA

OWASP ASVS L3 AppSec for Chennai OMR SaaS, PSU bank customer apps, Sriperumbudur auto OEM customer portals and TNeGA citizen apps.

01
Four playbooks
SaaS + PSU + auto + govt
02
ASVS L0
Default methodology
03
Tamil-language
State-government scope
04
0-7 wks
Typical engagement
Web App Pentest in Chennai

How a Macksofy web app pentest engagement runs in Chennai.

Chennai web-application-security work breaks across four buyer profiles with distinct application surfaces. OMR (Old Mahabalipuram Road) SaaS unicorns and product companies face OWASP ASVS Level 3 + SOC 2 Type II + ISO 27001:2022 enterprise procurement standards. PSU bank customer-facing applications (net-banking, mobile-banking, customer-portal, branch-portal) face RBI Master Direction on IT Governance plus DFS circular cyber clauses. Auto OEM customer portals (Hyundai, Renault-Nissan, BMW dealer-portals and customer-engagement-portals) face IT-services-customer-procurement-driven control catalogues plus DPDP §16 cross-border overlay. TNeGA / Tamil Nadu state-government citizen-portal applications face CERT-In + DPDP + TNeGA + Tamil-language documentation requirements. Macksofy's Chennai AppSec practice runs all four playbooks from the Mumbai-and-Hyderabad dual-anchor bench with a Chennai-resident senior consultant for multi-quarter PSU bank programmes.

OMR SaaS AppSec follows the Bengaluru pattern at platform-level — OWASP ASVS Level 3 default, manual-first methodology, multi-tenant authz at every role boundary, identity-federation testing (SAML / OIDC / OAuth 2.0 with Okta / Entra ID / AWS Cognito), cloud-native testing (IaC misconfiguration, CI/CD pipeline trust, AWS / GCP / Azure IAM-and-KMS), and OWASP Top 10 for LLM Applications (2025) for AI surfaces. The OMR buyer profile is increasingly international-customer-focused — US Fortune 500 and EU enterprise customer base — so dual-format reporting (CERT-In + SOC 2 CC + ISO 27001:2022 + HIPAA + GDPR overlay) is the default.

PSU bank customer-app AppSec is the Chennai-specific lane. The scope traverses the customer-facing application surface — net-banking, mobile-banking, customer-portal, branch-portal — calibrated to PSU bank reality (heterogeneous platform mix with Finacle + BaNCS coexisting, 4,000-15,000 branch nodes, legacy mainframe-RACF on the back-end). Test surface covers transaction-graph abuse (velocity-control bypass, OTP reuse, beneficiary-add race, reconciliation drift), authorisation-matrix exercise role-by-role (customer / branch-officer / supervisor / treasury / mainframe-RACF integration roles), KYC-impersonation paths and (where the PSU bank offers Aadhaar-enabled digital onboarding) UIDAI Authentication Regulations 2016 evidence. Every finding maps to RBI Master Direction Annex-1 clauses and the DFS circular submission-format.

Auto OEM customer-portal AppSec layers in the customer-engagement-portal scope unique to Chennai. Hyundai dealer-portal, Renault-Nissan customer-engagement-portal, BMW customer-config-portal, Daimler Trucks fleet-customer-portal each face IT-services-customer-procurement-driven control catalogues from the foreign-OEM parent. Test surface covers customer authentication, customer-data isolation (so a customer cannot see another customer's vehicle or service history), payment-flow abuse paths, service-request authorisation, dealer-portal-to-OEM-back-end trust chain, and (where connected-vehicle integration is in scope) the customer-vehicle-data-isolation evidence the European customer-procurement function asks for.

TNeGA citizen-portal AppSec is the fourth playbook layer. Tamil Nadu e-Governance Authority (TNeGA), Aavin Dairy, Tamil Nadu state PSU customer-portals, citizen-services-portals and the Aadhaar AUA / KUA-enabled service surfaces face CERT-In + DPDP + TNeGA-specific monitoring and Tamil-language data-handling requirements. State-government citizen-portal AppSec engagements include Tamil-language frontend testing, Aadhaar AUA / KUA replay-resistance evidence per UIDAI Authentication Regulations 2016, and DPDP §16 cross-border-transfer-control evidence where citizen data routes outside Tamil Nadu's data-residency boundary.

Identity is a cross-cutting concern. OMR SaaS clients run hybrid identity with Okta or Microsoft Entra ID as central IDP. PSU bank clients run on-premises AD with mainframe-RACF integration. Auto OEM customer portals federate with the foreign-OEM parent's identity stack (typically Azure AD or Okta). TNeGA citizen-portal scopes federate with the central UIDAI / Aadhaar AUA / KUA infrastructure. The AppSec engagement tests federation trust paths end-to-end per scope — SCIM, SAML, OIDC, OAuth 2.0, JWT, Conditional Access, MFA — and the privileged-access path discovery that always exists.

Procurement reality matters. OMR SaaS AppSec engagements close through the CTO and head of customer security in a single weekly sync. PSU bank customer-app AppSec closes through the GM-IT and CISO with the bank's board-IT-committee secretary copied. Auto OEM customer-portal AppSec closes through the IT head with the foreign-OEM-customer cyber-security function copied. TNeGA / state-government engagements close through the procuring department's IT head with TN-eGA panel routing and Tamil-language deliverable agreement. Engagement length is typically 3-4 weeks for OMR SaaS, 5-7 weeks for PSU bank customer-app, 4-5 weeks for auto OEM customer-portal, and 4-5 weeks for TNeGA scope with Tamil-language overhead.

Onsite cadence — Mumbai → MAA flight is 90 minutes; Hyderabad → MAA flight is 60 minutes; drive from MAA to OMR is 45 minutes, to Tidel Park 30 minutes, to Sriperumbudur 90 minutes. Same-day onsite arrival is feasible from either anchor. For sustained PSU bank programmes we maintain a Chennai-resident senior analyst with a local mobile.

Engagement workflow

Five phases. Chennai timeline.

Every Macksofy web app pentest engagement in Chennai runs through the same phased protocol — adapted to Chennai-specific procurement, regulator and delivery realities.

01
Phase 01
Sub-Playbook Selection
  • Joint kickoff with CTO + customer-security (OMR SaaS) / GM-IT + CISO (PSU bank) / IT head + customer cyber-security (auto OEM) / IT head + TNeGA panel (govt)
  • Application inventory with authorisation-matrix and data-flow mapping per scope
  • OWASP ASVS L3 + (PSU: RBI Master Direction Annex-1) + (auto OEM: ISO/SAE 21434) + (TNeGA: Tamil-language) catalogue selected
  • Tamil-language deliverable agreement codified for state-government scope
02
Phase 02
Recon & Surface Map
  • Authenticated and unauthenticated surface mapping with Burp Pro, Caido and Nuclei against staging and controlled prod
  • Authorisation-matrix discovery role-by-role per scope (customer / branch-officer for PSU; tenant / role for SaaS; customer / dealer for auto OEM; citizen / officer for govt)
  • Identity-federation footprint enumeration — SAML, OIDC, OAuth, JWT, Aadhaar AUA / KUA
  • AI surface inventory — AI-customer-service-assistant, AI-recommendation, AI-citizen-services
03
Phase 03
Manual Exploitation
  • OMR SaaS — BOLA, tenant-bleed, IAM Pass Role, CI/CD trust, identity federation, LLM-application surfaces
  • PSU bank — transaction-graph abuse, branch-portal authz, mainframe-RACF integration role-by-role
  • Auto OEM — customer-data isolation, payment-flow abuse, dealer-portal-to-OEM-back-end trust chain
  • TNeGA — citizen-portal authorisation, Aadhaar AUA / KUA replay, Tamil-language frontend abuse
04
Phase 04
Dual-Format Reporting
  • OMR SaaS — CERT-In + SOC 2 CC + ISO 27001:2022 Annex A + (where applicable) HIPAA + GDPR overlay
  • PSU bank — RBI Master Direction Annex-1 + DFS submission-format for CSITE / DFS thematic review
  • Auto OEM — ISO/SAE 21434 customer-data-protection clauses + customer-procurement-driven control catalogue
  • TNeGA — CERT-In + DPDP + TNeGA submission-format with Tamil-language documentation
05
Phase 05
Closure & Re-test
  • Free re-test of every Critical and High inside the regulator / audit-window remediation period
  • Joint readout with the engineering team at OMR / Tidel Park / Sriperumbudur / state-government office
  • Findings exported to Linear / Jira / GitHub Issues with owner, severity, CWE and ETA
  • Continuous-AppSec retainer offer for OMR SaaS clients with weekly release trains
Industries served

Which Chennai verticals we deliver Web App Pentest for.

OMR SaaS unicorns

OMR product companies — OWASP ASVS L3 + SOC 2 + ISO 27001:2022 + DPDP §16 evidence on demand.

PSU bank customer-apps

Indian Bank / IOB / cooperative banks — net-banking / mobile-banking / branch-portal AppSec with RBI Master Direction Annex-1 closure.

Auto OEM customer portals

Hyundai / Renault-Nissan / BMW / Daimler Trucks customer-engagement portals — customer-data isolation + ISO/SAE 21434 clauses.

TNeGA citizen portals

Tamil Nadu state citizen-portals — Tamil-language frontend + Aadhaar AUA / KUA + DPDP §16 overlay.

Healthcare & clinical research

Chennai healthcare delivery and clinical research web platforms — HIPAA + DPDP §16 evidence on customer-facing apps.

BPO / IT services delivery centres

OMR / Tidel Park IT-services customer-facing applications — customer's third-party-AppSec-standard with TPRM drop-in.

What ships

The Chennai deliverable pack.

Every Chennai web app pentest engagement closes with the pack below — regulator-ready evidence, technical detail and board-readable summaries.

  • OWASP ASVS L3 AppSec report with reproducible exploit code per High and Critical
  • PSU bank RBI Master Direction Annex-1 + DFS submission-format AppSec pack
  • Auto OEM ISO/SAE 21434 customer-data-protection clauses + customer-procurement evidence
  • TNeGA + DPDP citizen-portal AppSec with Tamil-language documentation
  • OMR SaaS CERT-In + SOC 2 CC + ISO 27001:2022 + HIPAA + GDPR dual-format report
  • Aadhaar AUA / KUA replay-resistance evidence per UIDAI Authentication Regulations 2016 where applicable
  • Reproducible exploit code (curl / Burp .req / Python) per High and Critical
  • Free re-test of every Critical and High inside the regulator-defined remediation window
Recent Chennai engagement

A Chennai web app pentest case study.

Chennai-headquartered OMR SaaS Unicorn (Whitefield-equivalent OMR HQ, US-Fortune-500 + EU enterprise customer base, RAG-backed AI customer-service assistant)
Scope

4-week OWASP ASVS L3 + LLM Top 10 (2025) + SOC 2 + ISO 27001:2022 + HIPAA + GDPR AppSec — 18 services in the platform, AWS hub-and-spoke topology, Okta IDP federation, GitHub Actions CI/CD, RAG-backed AI assistant; one OMR kickoff onsite and one closing readout

Outcome

Three cross-tenant BOLA paths in the customer-API closed pre-disclosure; one indirect-prompt-injection-via-RAG path that allowed cross-customer FAQ leakage closed and corpus-isolation control redesigned; two GitHub Actions OIDC trust-misconfiguration paths closed at D+8; report shipped into the next SOC 2 Type II audit with zero customer-security-questionnaire follow-ups for the quarter; HIPAA Security Rule evidence pack accepted by two US-customer compliance functions; GDPR evidence pack accepted by one EU-customer DPO without rework.

What clients say · Trusted India + UAE

Rated 4.9 ★ from 612 client reviews.

CERT-In Empanelled
Govt of India · MeitY
EC-Council ATC
Authorized Training
ISO 27001 Certified
Info Security Mgmt
We've worked with three Big 4 firms before Macksofy. None found what their team did in our payments stack. The most actionable report we've received in a decade.
AK
Aisha Khan
Information Security Manager · Listed Fintech · BKC, Mumbai
The CHFI training Macksofy delivered for our cyber cell raised investigation quality measurably. Practical, India-context-aware, and respectful of our operational realities.
IK
Inspector K. Joshi
Cyber Cell · Maharashtra Police · Mumbai
Came in with zero security background. 5 weeks later I was running Burp Suite and Metasploit confidently. Cleared CEH on the first attempt.
VI
Vivek Iyer
DevSecOps Lead · Healthcare SaaS · Hyderabad
FAQ

Questions Chennai buyers ask before signing.

Yes — finding-to-control mapping uses SOC 2 CC6 / CC7 / CC8 by default. Where ISO 27001:2022, HIPAA and GDPR also apply, the crosswalk is on the same page. Chennai-area SOC 2 Type II auditors accept the report as evidence without rework. The vendor-pack annex is the customer-procurement-attachment your customer-success team uses on enterprise RFPs.
More services in Chennai

Other Macksofy engagements in Chennai.

Web App Pentest in other cities

Same engagement, other Macksofy metros.

Talk to us

Get a fixed-price proposal in 48 hours.

Tell us about your security need — pentest, audit, training or a wider engagement. A senior consultant will reply within a few business hours.

CERT-In Empanelled
Information Security Auditor · India
  • CERT-In Empanelled
  • EC-Council ATC · CompTIA Authorized
  • 20,000+ professionals trained
  • India + UAE engagements
Human verification· Cloudflare Turnstile

By submitting this form you agree to be contacted by Macksofy. We typically respond within a few business hours and never share your details. Protected by Cloudflare Turnstile and rate limiting.