Use our comprehensive security certificate to demonstrate IT security awareness to customers and users.
Only companies whose applications, systems or infrastructures have been tested receive this certificate. This proof is to be understood as a snapshot and serves as evidence of the best possible protection against third parties.
Security audits are snapshots and serve as evidence of the best possible protection for the respective assets. Side-channel attacks or zero-day attacks still represent a risk. This certificate is only awarded to companies whose tested applications, systems or infrastructures have no critical vulnerabilities and have achieved a good to very good result.
This analysis looks at a web service or infrastructure that is accessed over a network (e.g., the Internet) and via (HTTP or HTTPS-based). The analysis includes a brief review of the services that can be accessed on the systems and the upstream protection functions (e.g., a firewall). Furthermore, the analysis is performed according to the OWASP Testing Guide 5.0 and thus also takes into account the current OWASP Top10 vulnerabilities.
The scope defines the environment to be tested, including all systems and applications to be included.
Type | Url | Description |
---|---|---|
Web Application | https://dateneingabe.oregis.digital/ | Testing of web services and APIs according to the OWASP Web Security Testing Guide. |
Web Application | https://dashboard.oregis.digital/ | Testing of web services and APIs according to the OWASP Web Security Testing Guide. |
Web Application | https://test.oregis.digital/operations/ | Testing of web services and APIs according to the OWASP Web Security Testing Guide. |