Macksofy Technologies
Delhi NCR · Pentest
CERT-In EmpanelledDelhi NCR

Penetration Testing in Delhi · Gov + PSU

CERT-In empanelled penetration testing for Delhi-headquartered ministries, PSUs, regulators and central agencies — STQC, NIC and GeM-compatible deliverables in regulator-readable format.

01
0+
Delhi government engagements
02
GeM Cat-0
Listed cybersecurity vendor
03
Next-day
Onsite from Mumbai BKC
04
0 hr SLA
CERT-In incident-reporting clock
Pentest in Delhi NCR

How a Macksofy pentest engagement runs in Delhi NCR.

Delhi penetration testing is dominated by central-government, ministry, PSU and regulator buyers, with a long tail of public-sector banks, central PSEs and statutory bodies headquartered in Shastri Bhawan, Nirman Bhawan, Rail Bhawan, Krishi Bhawan, Sanchar Bhawan and the CGO Complex. Scopes typically cover citizen-facing portals built on the National Informatics Centre (NIC) stack, internal MPLS networks running on NICNET, regulator data-exchange APIs, the Aadhaar AUA / KUA integration where the ministry consumes UIDAI services, and the long tail of legacy on-prem applications that ministries still run on RHEL / WebLogic / Oracle. Procurement, contracting and reporting expectations are very different from a private-sector VAPT — and a vendor who has never read a GeM contract does not survive the first review.

We deliver penetration testing on Delhi government and PSU estates in CERT-In empanelled format with STQC and NIC-friendly reporting structure — the explicit observation / risk / recommendation table format, traceable evidence per finding (with the screenshot, request / response and exploit witness numbered to the finding ID), and the empanelled-auditor letter required for the next regulator inspection or audit closure with the Comptroller and Auditor General (CAG). The report goes into the ministry's file-noting system, gets file-numbered, moves through the additional secretary's office and lands on the secretary's desk — and at every step a vendor-format Burp HTML export gets returned with objections. We ship in the format the ministry expects.

Common scopes for ministries and central PSEs we have delivered against: citizen-services portal — e-Office (NIC), parivahan-style transport portals, e-Hospital, the long list of state-deployed Mission-mode-project (MMP) portals; internal MPLS / NICNET / SD-WAN segmentation review including the dial-back from NIC datacentre to ministry LAN; data-exchange API between the ministry and state implementations where the centre publishes a master record and states consume / write back; Active Directory and RBAC review on the central IT estate; Aadhaar AUA / KUA integration audit against UIDAI's published compliance checklist and the data-vault tokenisation expectation; and the dependency on shared NIC infrastructure (NIC-hosted virtual machines, NIC-managed firewalls, NIC SOC feeds) where the boundary between in-scope and out-of-scope blurs daily.

Onsite kickoff in Delhi is next-day from Mumbai BKC — flights land at IGI Terminal 3 and consultants are at Shastri Bhawan, Rail Bhawan, Nirman Bhawan or the CGO Complex inside the morning, with badges arranged the previous evening through the ministry's security cell. For multi-week engagements we keep a Delhi-resident lead consultant onsite throughout the testing window — same person on the first kickoff and the final sign-off, no bait-and-switch staffing. The testing window itself routinely runs across weekends and government holidays because that is when the application owner can take portal downtime.

Government engagement plans always assume the ministry's own IT cell, the NIC team supporting the deployment, and (where the system holds Aadhaar data) the UIDAI compliance representative will need to sit through portions of the test live. We schedule those joint-test sessions in advance, share a daily testing-log e-mail with the additional secretary's office, and provide read-out memos after each major milestone so file-noting and approvals do not stall while waiting for the final report. The CERT-In incident-reporting clock — six hours under the 28 April 2022 directive — is treated as a hard SLA inside the engagement, with a pre-defined escalation path to the CERT-In handle.

Where the scope crosses state implementations of a centrally-sponsored scheme (CSS) — Ayushman Bharat, PMAY, e-Hospital state instances, agriculture extension portals — we coordinate with the state IT secretariat to evidence the boundary contract: what the centre owes (master record integrity, API contract enforcement, data-fiduciary obligations under the DPDP Act), what the state owes (instance hardening, regional language UI, state DPDP overlay), and where joint controls apply (Aadhaar masking, SDC hosting, BCP region). That avoids the most common audit gap on centre-state platforms and is the single most-asked-about clarification we have seen from CAG audit teams.

Adversary modelling for ministry estates is not theoretical. We test against the actual TTPs that have hit Indian government systems in the last 24 months — credential-stuffing waves against e-Office and parivahan-style portals, SQL-injection chains in regional MMP deployments, JWT misuse and IDOR variants on Aadhaar-AUA wrappers, ransomware-affiliate footholds (LockBit, ALPHV, RansomHub) on PSU IT estates, and the supply-chain compromise pattern where a third-party application-vendor's CI/CD pipeline became the foothold (a recurring 2024-25 pattern). The report explicitly maps each finding to the TTP and the threat actor most likely to weaponise it.

Procurement and commercial nuance is part of the engagement. Macksofy is GeM-listed (category 99 / cybersecurity audit services) and accepts direct purchase orders from central and state government buyers through the GeM portal; we also participate in CPPP and ministry-specific tenders. Our PAN, GST, MSME registration, CERT-In empanelment number and ISO 27001 / 9001 certification are kept current on the GeM dashboard so the procurement-cell verification on the bidder side completes in hours, not days. For ministries that procure through the National Informatics Centre Services Inc (NICSI) rate contract route, we deliver via NICSI's empanelment too.

Engagement workflow

Five phases. Delhi NCR timeline.

Every Macksofy pentest engagement in Delhi NCR runs through the same phased protocol — adapted to Delhi NCR-specific procurement, regulator and delivery realities.

01
Phase 01
Pre-engagement + GeM Contract
  • GeM / CPPP / NICSI procurement-route confirmation + contract drafting
  • Ministry security-cell badge process + onsite-access clearance
  • Scope definition with explicit NIC / NICSI boundary contract
  • DPDP Act + Aadhaar Act applicability scoping where citizen-data in scope
02
Phase 02
Threat Model + Recon
  • Adversary modelling against 2024-25 ministry-targeting TTPs (LockBit, ALPHV, app-vendor supply chain)
  • Application architecture review with ministry IT cell + NIC engineer
  • External recon — citizen-portal surface, MMP-instance discovery, certificate / DNS hygiene
  • Aadhaar AUA / KUA wrapper review against UIDAI compliance checklist
03
Phase 03
Exploit + Lateral
  • Citizen-portal abuse — authn bypass, IDOR, BOLA, SQLi, JWT misuse, file-upload chains
  • Internal MPLS / NICNET / SD-WAN segmentation review with the ministry network team
  • Active Directory / RBAC privilege-path enumeration (BloodHound, PingCastle)
  • Centre-state data-exchange API authz and contract-enforcement tests
04
Phase 04
Report + File-noting
  • STQC / NIC observation-risk-recommendation report with finding-ID-numbered evidence
  • Daily testing-log e-mail to additional secretary's office for file-noting parity
  • CERT-In empanelled auditor letter + executive summary for secretary-level review
  • Centre-state boundary contract clarification memo for CSS / CAG audit
05
Phase 05
Closure + Re-test
  • 30-day re-test of all critical and high findings included in SoW
  • Closure ledger filed with CSITE / CAG / regulator as required
  • Joint sign-off meeting with ministry IT cell + NIC + (if applicable) UIDAI
  • Optional continuous-monitoring retainer for subsequent quarterly reviews
Industries served

Which Delhi NCR verticals we deliver Pentest for.

Central ministries

Shastri Bhawan, Nirman Bhawan, Rail Bhawan, Krishi Bhawan portfolios on NIC + NICNET infrastructure.

Public sector banks + PSEs

Delhi-headquartered PSU banks, oil + power PSEs and central public-sector enterprises under CAG audit.

Statutory regulators

Sector regulators with Connaught Place / Janpath HQ — citizen-facing portal + data-exchange API scope.

Aadhaar AUA / KUA consumers

Ministries and PSEs consuming UIDAI Aadhaar services with the data-vault tokenisation obligation.

Defence + aerospace PSUs

PSU defence + aerospace estates with the additional layered-disclosure and segregation expectations.

Centrally-sponsored schemes

Centre-state CSS portals where boundary clarity between central master and state instance is the audit pain point.

What ships

The Delhi NCR deliverable pack.

Every Delhi NCR pentest engagement closes with the pack below — regulator-ready evidence, technical detail and board-readable summaries.

  • STQC / NIC observation-risk-recommendation report with finding-ID-numbered evidence
  • CERT-In empanelled auditor letter for ministry / PSU / CAG audit closure
  • Aadhaar AUA / KUA compliance-checklist evidence pack against UIDAI requirements
  • MPLS / NICNET segmentation review report with annotated network diagram
  • Active Directory / RBAC privilege-path map (BloodHound + PingCastle artefacts)
  • Centre-state boundary contract clarification memo for CSS programmes
  • 30-day re-test closure ledger + secretary-level executive summary
  • GeM / NICSI-compatible deliverable bundle for file-noting and CAG submission
Recent Delhi NCR engagement

A Delhi NCR pentest case study.

Central ministry (Shastri Bhawan) — citizen-services portal + state implementations
Scope

CERT-In empanelled penetration test of central master + 9 state-instance deployments of a Mission-mode-project portal, including Aadhaar AUA wrapper review and NICNET segmentation

Outcome

47 findings closed in 5 weeks · 3 critical Aadhaar-wrapper data-leak paths remediated before file-noting reached the secretary · CERT-In letter accepted by CAG audit team first read · centre-state boundary contract clarified across 9 states with the state IT secretariat sign-off.

What clients say · Trusted India + UAE

Rated 4.9 ★ from 612 client reviews.

CERT-In Empanelled
Govt of India · MeitY
EC-Council ATC
Authorized Training
ISO 27001 Certified
Info Security Mgmt
We've worked with three Big 4 firms before Macksofy. None found what their team did in our payments stack. The most actionable report we've received in a decade.
AK
Aisha Khan
Information Security Manager · Listed Fintech · BKC, Mumbai
The CHFI training Macksofy delivered for our cyber cell raised investigation quality measurably. Practical, India-context-aware, and respectful of our operational realities.
IK
Inspector K. Joshi
Cyber Cell · Maharashtra Police · Mumbai
Came in with zero security background. 5 weeks later I was running Burp Suite and Metasploit confidently. Cleared CEH on the first attempt.
VI
Vivek Iyer
DevSecOps Lead · Healthcare SaaS · Hyderabad
FAQ

Questions Delhi NCR buyers ask before signing.

Yes — Macksofy is a GeM-listed cybersecurity services vendor under category 99 (cybersecurity audit + VAPT services). We accept direct purchase orders from central and state government buyers through GeM, and our PAN, GST, MSME, CERT-In empanelment and ISO 27001 / 9001 certification are kept current on the dashboard so procurement-cell verification completes inside hours.
More services in Delhi NCR

Other Macksofy engagements in Delhi NCR.

Pentest in other cities

Same engagement, other Macksofy metros.

Talk to us

Get a fixed-price proposal in 48 hours.

Tell us about your security need — pentest, audit, training or a wider engagement. A senior consultant will reply within a few business hours.

CERT-In Empanelled
Information Security Auditor · India
  • CERT-In Empanelled
  • EC-Council ATC · CompTIA Authorized
  • 20,000+ professionals trained
  • India + UAE engagements
Human verification· Cloudflare Turnstile

By submitting this form you agree to be contacted by Macksofy. We typically respond within a few business hours and never share your details. Protected by Cloudflare Turnstile and rate limiting.