CREST OVS (OWASP verification standard) is a new standard that has been created by CREST that utilises the OWASP ASVS (Application security verification standard) methodology. This methodology is an in-depth approach to assessing the overall security of an application, its underlying server, and its operating system. This standard should be utilised by security mature companies that have performed standard penetration tests against their applications and are looking to understand the overall security of their applications, as opposed to their remote threat landscape.
Get a Quote
There Are Two Levels to The CREST OVS Assessment
CREST OVS level one utilises the ASVS tier one methodology which takes an in-depth approach to assess the overall security of an application.
At this level, no access to source code is needed but significant client interaction and time with developers/system administrators is required.
CREST OVS level two utilises the ASVS level two methodology which takes an even more in-depth approach to application security.
It likely requires access to source code, detailed documentation, and requires a lot of client interaction.
CREST OVS level one utilises the ASVS tier one methodology which takes an in-depth approach to assess the overall security of an application.
At this level, no access to source code is needed but significant client interaction and time with developers/system administrators is required.
CREST OVS level two utilises the ASVS level two methodology which takes an even more in-depth approach to application security.
It likely requires access to source code, detailed documentation, and requires a lot of client interaction.
A typical application penetration test is designed to assess the security of an application from a remote threat actor’s point of view, looking for any vulnerabilities that can be exploited without having access to the source code, underlying operating system, or detailed documentation.
A CREST OVS web application assessment covers the remote security of an application but it also focuses on the underlying operating system, and user accounts and examines technical documentation and internal processes to ensure these are up to a high standard.
For example, the consultant may require source code and detailed documentation describing each major data flow within the application. Due to a large portion of the methodology being points that cannot be determined remotely, this type of assessment requires significantly more client interaction than a typical Penetration Test.
Our experts will listen to you and your needs to develop a tailored testing strategy. From here our consultants will use a wide variety of penetration testing tools and resources to gather information on your organisation.
Now the test is complete our consultants will fill out a detailed report of their findings, broken down by category and type, adding any remediation advice to the exploits and vulnerabilities they discovered. This data will be accessible via SecurePortal and follow up calls will be made to walkthrough the test and the steps required to remove the risks found.
SecurePortal provides clients with a new way to monitor and analyse the data you receive in your penetration tests. Rather than a lengthy physical report you gain a range of simple features that highlight your test findings and vulnerabilities.
Easily access remediation advice from our team of consultants on discovered vulnerabilities and assign them to your team for fast and efficient resolution. Receive overview and trend data of all of the current security issues you face in your organisatio and so much more./
The CREST OVS Assessment for Web Applications is a thorough test that assesses not just the build of your web applications but also the processes and policies used in the build.
Improving customer confidence: Customers are becoming increasingly aware of the risks associated with data breaches and may avoid businesses that have a poor security record. By conducting the CREST OVS Web App Assessment and addressing any vulnerabilities, a business can show customers that it takes security seriously, which can lead to improved customer confidence and loyalty
Ensuring compliance with regulations: Many industries have regulations that businesses must comply with, and the CREST OVS Web App Assessment can help a business ensure that it is meeting those requirements. This can help the business avoid costly fines
Identifying vulnerabilities before attackers do: One of the main benefits of the CREST OVS Web App Assessment is that it can identify vulnerabilities in the business's web applications before attackers have a chance to exploit them. By detecting and fixing these vulnerabilities, the business can reduce the risk of a security breach and protect sensitive data
Businesses should aim to achieve the CREST OVS standard once they believe that they are a security mature organisation, that has already performed penetration tests against their application(s) and want a more in depth assessment.
The service works in a similar manner to a standard penetration test, however, on top of providing us with a URL and credentials, we will need detailed technical documentation of each major logic flow throughout the application and also some time booked with developers and system administrators to ask questions about the underlying server’s operating system and it’s user accounts.
Pentest People are accredited to CREST and UK NCSC CHECK standards and can provide infrastructure penetration testing against all types of IT infrastructure used within your organisation
Experienced Consultant Team
Penetration testing is a key component of any effective cybersecurity strategy, and it requires well-trained professionals to execute. Our consultant team needs are highly trained in order to test your business for vulnerabilities and identify potential threats before they cause harm. Our team have a deep understanding of the systems and protocols involved in protecting against hackers, malware, and data breaches.
Need More Info on Our Infrastructure Testing?
The results of the assessment are uploaded to your SecurePortal account, with individual issues ranked in order of severity. The results will also contain a management summary with totals, key points, and detailed consultants comments, ensuring that vulnerabilities are presented realistically and in the context of your environment.