Web Application Security in Delhi · Government & Fintech
OWASP ASVS L3 AppSec for Delhi central-government citizen portals, PSU banks, ministry-adjacent applications and Delhi-NCR fintech.
How a Macksofy web app pentest engagement runs in Delhi NCR.
Delhi web-application-security demand is overwhelmingly driven by central-government, PSU bank and ministry citizen-portal scope — Aadhaar AUA / KUA-enabled applications, DigiLocker-integrated services, APIGW-of-India inter-ministry consumers, regional-language Bhashini frontends, and the customer-facing citizen-service portals that drive the Digital India ecosystem. The secondary buyer profile is Delhi-NCR fintech in the Connaught Place / Karol Bagh / Saket corridor running RBI master-direction-aligned applications. Macksofy operates a GeM-listed AppSec capability with Delhi-resident bid-desk + Indian-soil-only delivery option for defence-adjacent ministry scope.
Central-government citizen-portal AppSec is the headline lane. The scope traverses authentication and identity (often Aadhaar-enabled), authorisation matrix (citizen / officer / supervisor / departmental-admin roles), regional-language frontend testing (Hindi + Bhashini regional-language frontends carry their own abuse surface), Aadhaar AUA / KUA integration trust-chain (UIDAI Authentication Regulations 2016 evidence), DigiLocker integration (MeitY partner-onboarding checklist), and APIGW-of-India consumer-side authentication and consent-and-purpose-binding compliance. We test biometric-replay resistance, eKYC consent-flow integrity, virtual-ID handling, audit-log retention compliance, and the citizen-data-export-anomaly paths the inspector cares about.
PSU bank customer-app AppSec mirrors our Chennai PSU bank AppSec practice. The scope traverses the customer-facing application surface — net-banking, mobile-banking, customer-portal, branch-portal — calibrated to PSU bank reality (heterogeneous platform mix with Finacle + BaNCS coexisting, 4,000-15,000 branch nodes, legacy mainframe-RACF on the back-end). Test surface covers transaction-graph abuse, authorisation-matrix exercise role-by-role, KYC-impersonation paths, Aadhaar-enabled digital onboarding evidence, and the GeM-procurement-format submission readiness for the bank's annual CSITE Cell evidence cycle.
Ministry-adjacent SaaS and IT-services AppSec adds a third sub-playbook. Several private-sector SaaS and IT-services majors operate ministry-and-PSU-adjacent customer-facing platforms — e-governance vendors, e-procurement integrators, government-payments aggregators, citizen-services platforms operated under PPP arrangements. The AppSec scope covers the customer-facing application surface with both the ministry's expectations (CERT-In + DPDP + Aadhaar AUA / KUA) and the private-sector procurement standards (OWASP ASVS L3 + SOC 2 + ISO 27001:2022) crosswalked. Dual-format reporting from one engagement is standard.
Delhi-NCR fintech AppSec follows the Mumbai BFSI playbook adapted for Delhi-NCR buyer reality. The Connaught Place / Karol Bagh / Saket fintech corridor and Greater-Kailash / South-Extension lending fintech operate RBI master-direction-aligned applications. The scope covers RBI PA-PG (for payment-aggregator licensees), RBI Digital Lending Guidelines (for lending fintech), Aadhaar AUA / KUA / DigiLocker / account aggregator integration trust chains, KYC vendor trust chain, and the inspector-readable submission-format Delhi-NCR fintech needs at the next CSITE / DPSS thematic review.
Defence-adjacent AppSec scope adds Indian-soil-only delivery and Indian-passport-only senior consultant requirements (same model as our Delhi SOC defence-adjacent capability). Engagement runs from the Indian-soil-only delivery floor with attestation that satisfies the procuring department's information-security policy. No-cloud-data-transfer and India-soil-only-data-residency clauses are honoured in the engagement letter.
AI / LLM application security has become standard for both ministry and fintech scope in 2026. Ministries are deploying citizen-facing LLM customer-service assistants (multi-lingual via Bhashini), AI document-processing for grievance-redressal, and AI-driven decision-support for officer roles. Fintechs are deploying customer-service LLMs, AI KYC document-processing, AI fraud-detection / underwriting. OWASP Top 10 for LLM Applications (2025) is the default catalogue. For ministry scope, the LLM application surface also faces specific Indian-context citizen-impersonation and regional-language prompt-injection abuse paths that generic LLM-AppSec vendors miss.
Procurement reality matters. Central-government / ministry AppSec engagements close through GeM with the empanelment certificate + GeM seller-ID + comparable-engagement experience as the three levers. PSU bank AppSec closes through the GM-IT + CISO + board-IT-committee secretary. Delhi-NCR fintech AppSec closes through the CTO + AppSec lead in faster CTO-and-AppSec-lead signoff cycles. Engagement length is typically 4-5 weeks for ministry citizen-portal AppSec, 5-7 weeks for PSU bank customer-app AppSec, 3-4 weeks for Delhi-NCR fintech, 4-6 weeks for ministry-adjacent SaaS dual-format.
Onsite cadence — Mumbai → DEL flight is 2 hours; Aerocity → Connaught Place / ITO / Bhavan-area is 30 minutes; total mobilisation inside 3 hours. Engagements include one onsite kickoff and one onsite closing readout with the remainder running remote. For sustained ministry programmes we maintain a Delhi-resident lead consultant.
Five phases. Delhi NCR timeline.
Every Macksofy web app pentest engagement in Delhi NCR runs through the same phased protocol — adapted to Delhi NCR-specific procurement, regulator and delivery realities.
- GeM / CPPP / Defence e-Procurement bid response with empanelment certificate, GeM seller-ID, comparable-engagement list
- Joint kickoff with procuring department's IT secretary or PSU bank GM-IT + CISO or fintech CTO + AppSec lead
- Indian-soil-only delivery attestation + Indian-passport-only consultant deployment where required
- MeitY / NCSC submission-format reporting selected for ministry scope
- Citizen-portal + regional-language frontend + Aadhaar AUA / KUA + DigiLocker + APIGW component inventory
- PSU bank net-banking / mobile-banking / customer-portal / branch-portal inventory
- Delhi-NCR fintech RBI PA-PG / Digital Lending Guidelines licensee scope inventory
- AI surface inventory — ministry LLM customer-service assistant, fintech LLM customer-service assistant
- Aadhaar AUA / KUA — biometric-replay, eKYC consent-flow integrity, virtual-ID handling per UIDAI Authentication Regulations 2016
- DigiLocker — OAuth scope-handling per MeitY partner-onboarding checklist
- APIGW-of-India — consumer-side authentication + consent-and-purpose-binding testing
- Hindi + Bhashini regional-language frontend abuse — character-set, translation-layer, URL-parameter abuse
- Ministry — MeitY / NCSC office submission-format AppSec report
- PSU bank — RBI Master Direction Annex-1 + DFS submission-format
- Delhi-NCR fintech — RBI PA-PG + Digital Lending Guidelines submission-format
- Dual-format — ministry + private-sector procurement evidence packs for ministry-adjacent SaaS
- Re-test of every Critical and High inside the regulator / procurement-defined remediation window
- Ministry — MeitY / NCSC inspection-defence support
- PSU bank — DFS / RBI thematic-review inspection-defence
- Delhi-NCR fintech — RBI CSITE / DPSS thematic-review inspection-defence
Which Delhi NCR verticals we deliver Web App Pentest for.
Central government departments
Citizen-portal + Aadhaar AUA / KUA + APIGW-of-India AppSec with MeitY / NCSC submission-format.
Public-sector banks
Delhi-area PSU bank customer-apps — RBI Master Direction Annex-1 + DFS submission-format AppSec.
Defence-adjacent ministries
Indian-soil-only delivery + Indian-passport-only senior consultants for defence-adjacent ministry, PSU and department engagements.
Aadhaar ecosystem actors
AUA / KUA / Sub-AUA entities — Authentication Regulations 2016 evidence with biometric-replay testing.
Delhi-NCR fintech & lending
Connaught Place / Karol Bagh / Saket fintech corridor — RBI master-direction-aligned AppSec with fast CTO-signoff cycles.
Ministry-adjacent SaaS & IT-services
e-governance vendors / e-procurement integrators / citizen-services platforms — dual-format ministry + private-sector AppSec.
The Delhi NCR deliverable pack.
Every Delhi NCR web app pentest engagement closes with the pack below — regulator-ready evidence, technical detail and board-readable summaries.
- OWASP ASVS L3 AppSec report with reproducible exploit code per High and Critical
- Ministry — MeitY / NCSC submission-format AppSec pack with citizen-portal evidence
- Aadhaar AUA / KUA — Authentication Regulations 2016 evidence with biometric-replay testing
- DigiLocker — MeitY partner-onboarding checklist coverage
- APIGW-of-India consumer-side authentication + consent-and-purpose-binding evidence
- PSU bank — RBI Master Direction Annex-1 + DFS submission-format AppSec
- Delhi-NCR fintech — RBI PA-PG + Digital Lending Guidelines submission-format AppSec
- Indian-soil-only delivery attestation signed by Macksofy authorised signatory
A Delhi NCR web app pentest case study.
5-week OWASP ASVS L3 + MeitY / NCSC submission-format + LLM Top 10 (2025) AppSec — ministry citizen-services portal (Hindi + 8 regional-language Bhashini frontends, Aadhaar AUA / KUA layer, DigiLocker OAuth integration, APIGW-of-India inter-ministry consumer, RAG-backed AI customer-service assistant); Indian-soil-only delivery; Indian-passport-only senior consultants
Six Aadhaar AUA authentication-API rate-limit gaps closed pre-disclosure; two DigiLocker OAuth scope-handling issues closed in coordination with MeitY's DigiLocker team; one APIGW-of-India consent-and-purpose-binding bypass closed; three regional-language Bhashini frontend prompt-injection paths closed via Bhashini-aware filter tuning; one indirect-prompt-injection-via-RAG path on the AI customer-service assistant closed and corpus-isolation control redesigned; MeitY / NCSC AppSec report accepted on first read.
Rated 4.9 ★ from 612 client reviews.
“We've worked with three Big 4 firms before Macksofy. None found what their team did in our payments stack. The most actionable report we've received in a decade.”
“The CHFI training Macksofy delivered for our cyber cell raised investigation quality measurably. Practical, India-context-aware, and respectful of our operational realities.”
“Came in with zero security background. 5 weeks later I was running Burp Suite and Metasploit confidently. Cleared CEH on the first attempt.”
Questions Delhi NCR buyers ask before signing.
Other Macksofy engagements in Delhi NCR.
Same engagement, other Macksofy metros.
Get a fixed-price proposal in 48 hours.
Tell us about your security need — pentest, audit, training or a wider engagement. A senior consultant will reply within a few business hours.
- CERT-In Empanelled
- EC-Council ATC · CompTIA Authorized
- 20,000+ professionals trained
- India + UAE engagements
