Web Application Security in Mumbai · BFSI & Fintech
OWASP ASVS L3 manual AppSec for Mumbai BFSI net-banking, broker portals, payment gateways and SEBI MII platforms — RBI / SEBI / IRDAI overlay.
How a Macksofy web app pentest engagement runs in Mumbai.
Mumbai web-application-security is the deepest single-domain practice we run — the BFSI customer-facing web and API surface is where the largest book-of-record value moves through Indian banking. The scope is structurally different from a broader VAPT (which covers infrastructure, network, AD, mainframe and OT in addition to web) and different from a scenario-led pentest (which is graded against a single objective). A Mumbai AppSec engagement is the application-layer-and-below depth: authentication, session, authorisation, transaction-flow, integration, third-party-trust-chain and the regulator-clause closure. Macksofy delivers from BKC with senior consultants who have shipped enough RBI / SEBI / IRDAI inspections to know the difference between a finding the inspector will read and a finding the inspector will discard.
Methodology defaults to OWASP ASVS Level 3 plus OWASP API Security Top 10 (2023) plus the BFSI-specific abuse-case catalogue Macksofy has accumulated across 200+ Mumbai engagements. Burp Suite Pro, Caido and Nuclei run as supporting infrastructure. Every High and Critical finding is manually validated with a reproducible exploit (curl, Burp .req, Python harness or proxy script) attached to the report. The deliverable is a regulator-grade binder the bank's audit committee chair reads at the quarterly cyber review — not a Burp HTML export.
Net-banking and mobile-banking web-application security has its own playbook. The transaction-graph end-to-end: customer authentication, OTP / 2FA challenge, beneficiary-add flow, IMPS / NEFT / RTGS / UPI rails, reconciliation-to-book-of-record, dispute-flow and the fraud-stack integration. Abuse-case testing on velocity-control bypass, OTP reuse via SS7-style mobile-side weaknesses, beneficiary-add race conditions, reconciliation-drift exploitation, IMPS dispute-fraud paths and the UPI VPA-spoofing surface. Every finding maps to RBI Master Direction on IT Governance, Risk, Controls and Assurance Practices (November 2023) Annex-1 clauses and the RBI Cyber Security Framework CSITE Cell submission format.
Broker-terminal and AMC web-platform scope is the second Mumbai sub-segment. SEBI-regulated broker web platforms (Zerodha-style Kite, equivalent broker-terminals), AMC investor-portal apps and the broker-OMS-to-exchange gateway. Test surface includes broker-authorisation matrix exercise (sub-broker, dealer, RM, customer roles), algo-API rate-limit bypass, market-data tampering on Refinitiv / Bloomberg feed-handlers, order-management-to-NSE / BSE gateway authorisation, and the SEBI CSCRF Annexure-K AppSec evidence (CCI / CRMM scoring requires application-layer evidence the inspector reads).
Payment-gateway and aggregator web-platform scope is third. RBI PA-PG licensees in BKC and Lower Parel run merchant-portal apps, payout-and-settlement APIs, dispute-flow systems and reconciliation-layer apps. AppSec scope here closes RBI Payment Aggregator and Payment Gateway Master Direction clauses through the application-layer evidence — payment-flow abuse cases (token replay, refund-race, settlement-spoof, payout-amount tampering, merchant-side payment-intent manipulation), partner-merchant-onboarding-API hygiene, KYC-vendor-integration trust chain and the merchant-portal authorisation matrix.
Insurer web-platform scope adds IRDAI overlay. Life and general insurer customer-facing apps (policy issuance, claims-intake, renewal flows), Policy Administration System (PAS) web modules and partner-agent portals. Test surface includes claims-fraud paths (OVD-tamper, multi-policy-stitching, beneficiary-impersonation), KYC-impersonation via OVD upload portals and the PAS authorisation matrix tested role-by-role. Every finding maps to IRDAI Information and Cyber Security Guidelines (April 2023) clauses for the insurer's next IRDAI cyber-supervision review.
MII platform scope is the rarest and most consequential. SEBI Market Infrastructure Institutions (NSE, BSE, NSDL, CDSL) and the clearing-corporation web platforms face the highest evidence-quality bar in Indian financial-services AppSec. Macksofy's Mumbai bench has shipped AppSec into MII and MII-adjacent platforms — the methodology runs deeper, the report format follows SEBI's MII-specific guidelines, and the engagement letter includes a no-data-exfiltration acknowledgement plus an explicit market-disruption-prevention clause.
Procurement reality matters. Mumbai BFSI AppSec procurement closes through the CISO, the AppSec lead and (for the larger banks) the chief technology officer in a single weekly sync, plus a one-page engagement letter from the General Counsel covering production safe-harbour and regulator-submission attribution. Engagement letters typically include a Bombay High Court jurisdiction clause and explicit no-data-exfiltration acknowledgement. Reports are encrypted, double-key delivered (Macksofy senior + CISO) and the master is destroyed inside 30 days of closure unless the bank requests retention. Onsite cadence — BKC walk-in same day for kickoff and exit; Andheri MIDC, Powai, Goregaon SEEPZ, Thane and Navi Mumbai reachable inside four hours. Engagement length is typically 4-6 weeks per AppSec scope, scaled by application count.
Five phases. Mumbai timeline.
Every Macksofy web app pentest engagement in Mumbai runs through the same phased protocol — adapted to Mumbai-specific procurement, regulator and delivery realities.
- Joint kickoff with CISO, AppSec lead and CTO; regulator profile confirmed (RBI / SEBI / IRDAI / MII)
- Application inventory with money-movement-graph and authorisation-matrix mapping
- Engagement letter — Bombay High Court jurisdiction, no-data-exfiltration acknowledgement, production safe-harbour
- OWASP ASVS L3 + API Top 10 + BFSI abuse-case catalogue selected per application profile
- Authenticated and unauthenticated surface mapping with Burp Pro, Caido and Nuclei against staging and controlled prod
- Authorisation-matrix discovery role-by-role (customer, sub-broker, dealer, RM, agent, vendor)
- Third-party integration inventory (KYC vendor, account aggregator, credit bureau, exchange gateway)
- Mobile-app reversing on the latest Play Store and App Store builds (Frida, MobSF, Objection)
- Transaction-graph abuse — velocity bypass, OTP reuse, beneficiary race, reconciliation drift
- Broker-terminal authorisation-matrix exercise role-by-role with algo-API rate-limit bypass
- Payment-flow abuse — token replay, refund-race, settlement-spoof, payout-amount tampering
- Insurer claims-fraud paths — OVD-tamper, multi-policy-stitching, beneficiary-impersonation
- Executive summary in RBI MD-ITGRC + SEBI CSCRF + IRDAI 2023 language, clause-mapped
- CVSS v3.1 plus Macksofy business-impact scoring calibrated to transaction value-at-risk
- SEBI CSCRF Annexure-K AppSec evidence for broker / AMC / MII scopes
- Reproducible exploit code (curl / Burp .req / Python) per High and Critical
- 60-day re-test window covering every Critical and High at no extra cost
- Encrypted double-key board-pack delivery to CISO + audit-committee chair
- CERT-In empanelled closure letter and SAR / inspection-defence support
- Risk register update synced to the bank's GRC tool
Which Mumbai verticals we deliver Web App Pentest for.
Private bank web platforms
BKC / Lower Parel / Andheri net-banking and mobile-banking apps — transaction-graph and authorisation-matrix testing.
Stock brokers & AMCs
BKC broker-terminal and AMC investor-portal apps — CSCRF Annexure-K AppSec evidence with algo-API rate-limit testing.
SEBI MII platforms
Market Infrastructure Institution web platforms — MII-specific submission-format reporting with market-disruption-prevention clauses.
Payment aggregators
BKC / Lower Parel PA-PG licensees — merchant-portal and payment-flow abuse testing with RBI PA-PG closure.
Life & general insurers
Worli / Andheri insurer customer apps and PAS web modules — IRDAI 2023 cyber guidelines clause closure.
NBFCs & lending fintech
Lower Parel NBFC apps — RBI Scale-Based Regulation and Digital Lending Guidelines AppSec evidence.
The Mumbai deliverable pack.
Every Mumbai web app pentest engagement closes with the pack below — regulator-ready evidence, technical detail and board-readable summaries.
- OWASP ASVS L3 AppSec report with reproducible exploit code per High and Critical
- RBI MD-ITGRC + SEBI CSCRF + IRDAI 2023 clause crosswalk per finding
- BFSI abuse-case evidence pack (transaction-graph, broker-terminal, payment-flow, claims-fraud paths)
- SEBI CSCRF Annexure-K AppSec evidence for broker / AMC / MII scopes
- Authorisation-matrix evidence per role exercised (customer / sub-broker / dealer / RM / agent)
- Reproducible exploit code (curl / Burp .req / Python) per High and Critical
- Encrypted double-key delivery to CISO + audit-committee chair only
- Free re-test of every Critical and High inside a 60-day window
A Mumbai web app pentest case study.
OWASP ASVS L3 AppSec across 28 customer-facing endpoints — net-banking, mobile-banking, UPI app, beneficiary-add flow, IMPS / NEFT / RTGS rails, customer dispute-flow and fraud-stack integration; 5-week engagement with two BKC onsite legs
Three velocity-control bypass paths on the IMPS rail closed pre-disclosure; one reconciliation-drift path that allowed beneficiary-add-without-debit closed; one UPI VPA-spoofing path via mobile-side weakness closed; SEBI CSCRF Annexure-K AppSec evidence accepted on first read; 11 Critical and 18 High findings closed inside 38 days; encrypted board-pack delivered to CISO and audit-committee chair on schedule.
Rated 4.9 ★ from 612 client reviews.
“We've worked with three Big 4 firms before Macksofy. None found what their team did in our payments stack. The most actionable report we've received in a decade.”
“The CHFI training Macksofy delivered for our cyber cell raised investigation quality measurably. Practical, India-context-aware, and respectful of our operational realities.”
“Came in with zero security background. 5 weeks later I was running Burp Suite and Metasploit confidently. Cleared CEH on the first attempt.”
Questions Mumbai buyers ask before signing.
Other Macksofy engagements in Mumbai.
Same engagement, other Macksofy metros.
Get a fixed-price proposal in 48 hours.
Tell us about your security need — pentest, audit, training or a wider engagement. A senior consultant will reply within a few business hours.
- CERT-In Empanelled
- EC-Council ATC · CompTIA Authorized
- 20,000+ professionals trained
- India + UAE engagements
