<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>CERT-in Cyber Security Audit Archives | Threatsys | Eradicating Threats Globally | Global Cyber Security Provider |</title>
	<atom:link href="https://threatsys.co.in/nproject-tag/cert-in-cyber-security-audit/feed/" rel="self" type="application/rss+xml" />
	<link>https://threatsys.co.in/nproject-tag/cert-in-cyber-security-audit/</link>
	<description>We Defend, We Protect, We Secure</description>
	<lastBuildDate>Fri, 23 May 2025 05:06:09 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://threatsys.co.in/wp-content/uploads/2021/05/cropped-Final-1-Logo-PNG-32x32.png</url>
	<title>CERT-in Cyber Security Audit Archives | Threatsys | Eradicating Threats Globally | Global Cyber Security Provider |</title>
	<link>https://threatsys.co.in/nproject-tag/cert-in-cyber-security-audit/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>CM Dashboard Odisha CERT-in Cyber Security Audit</title>
		<link>https://threatsys.co.in/projects/cm-dashboard-odisha/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 23 Jan 2023 11:32:05 +0000</pubDate>
				<guid isPermaLink="false">https://threatsys.co.in/?post_type=nproject&#038;p=3853</guid>

					<description><![CDATA[<p>The post <a href="https://threatsys.co.in/projects/cm-dashboard-odisha/">CM Dashboard Odisha CERT-in Cyber Security Audit</a> appeared first on <a href="https://threatsys.co.in">Threatsys | Eradicating Threats Globally | Global Cyber Security Provider |</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Overview</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div  class="wpb_single_image wpb_content_element vc_align_left wpb_content_element">
		
		<figure class="wpb_wrapper vc_figure">
			<div class="vc_single_image-wrapper   vc_box_border_grey"><img fetchpriority="high" decoding="async" width="700" height="240" src="https://threatsys.co.in/wp-content/uploads/2023/01/Screenshot-2023-01-25-142013-Custom.png" class="vc_single_image-img attachment-full" alt="" title="Screenshot 2023-01-25 142013 (Custom)" srcset="https://threatsys.co.in/wp-content/uploads/2023/01/Screenshot-2023-01-25-142013-Custom.png 700w, https://threatsys.co.in/wp-content/uploads/2023/01/Screenshot-2023-01-25-142013-Custom-300x103.png 300w" sizes="(max-width: 700px) 100vw, 700px" /></div>
		</figure>
	</div>
<div class="vc_empty_space"   style="height: 32px"><span class="vc_empty_space_inner"></span></div>
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p><span style="font-weight: 400;">The Chief Minister Dashboard, Government of Odisha is a flagship technology initiative of the Government of Odisha to achieve the 5T goal. The chief minister&#8217;s office directed that all departments create data dashboards in order to deliver data-driven governance. This project makes use of cutting-edge AI, machine learning, and data science technology to monitor schemes, ensure transparency, and make data-driven decisions.</span></p>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div>
	<div class="wpb_raw_code wpb_raw_html wpb_content_element" >
		<div class="wpb_wrapper">
			<h6 style="margin:6px 0;display:inline-block;">Client:</h6> CM Dashboard<br>
<h6 style="margin:6px 0;display:inline-block;">Industry:</h6> Government of Odisha<br>
<h6 style="margin:6px 0;display:inline-block;">Services:</h6> CERT-in Web Application Security Audit<br>
<h6 style="margin:6px 0;display:inline-block;">Company:</h6>  OCAC Government of Odisha</a><br>
<h6 style="margin:6px 0;display:inline-block;">Development Company:</h6> CSM Technologies Pvt. Ltd.<br>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 60px"><span class="vc_empty_space_inner"></span></div></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Challenge</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p><span style="font-weight: 400;">The web portal of “CM Dashboard, Government of Odisha” satisfies the demand for real-time monitoring to find out all security loop holes and protects sensitive information&#8217;s of government. There was a several  user access for different rules and we need to test with the standard of OWASP, SAMS, SANS, OSSTMM, CERT-IN guidelines.</span></p>
<p>The challenges was to complete the whole cyber security audit with in 15 day&#8217;s of time with supporting the developers a all the bug&#8217;s can be fixed.</p>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 60px"><span class="vc_empty_space_inner"></span></div></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Solution</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p><span style="font-weight: 400;">Threatsys Technologies assigned 2 Cyber Security Resources under the Guidance of our CEO, Deepak Kumar Nath. The Threatsys Red team is started this project by performing Black Box Testing, White Box Testing along with our Industry Centric Checklist.</span></p>
<p><span style="font-weight: 400;">After testing the Web Application from the production URL, we discovered many problems that have been classified as Critical, High, Medium, and Low based on their severity. Our team is always striving to provide developer-friendly reports that are readily readable and include clear proof of ideas.</span></p>
<p><span style="font-weight: 400;"> We create proof-of-concept video with adequate evidence so that security problems may be simply understood and corrected. We have assigned a time frame to each Severity category in which the issue must be resolved. During that time, our staff was often assisting the developers in resolving such difficulties as rapidly as possible. After the patch was performed, our team re-audited the application to ensure that the fixes were done correctly.</span></p>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 60px"><span class="vc_empty_space_inner"></span></div></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Results</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p><span style="font-weight: 400;">Threatsys issued the CERT-IN Safe to Host Certificate, and the CM Dashboard, Government of Odisha is successfully hosted in the State Data Center. Because it belongs to the government of Odisha, it is safely managed to authenticate with all of Odisha&#8217;s departments for their monitoring process, perfect management and procedure, and secure information storage for everyone.</span></p>

		</div>
	</div>
</div></div></div></div></div>
</div><p>The post <a href="https://threatsys.co.in/projects/cm-dashboard-odisha/">CM Dashboard Odisha CERT-in Cyber Security Audit</a> appeared first on <a href="https://threatsys.co.in">Threatsys | Eradicating Threats Globally | Global Cyber Security Provider |</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>UT Dashboard Jammu and Kashmir CERT-in Cyber Security Audit</title>
		<link>https://threatsys.co.in/projects/ut-dashboard-jammu-and-kashmir/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 23 Jan 2023 11:19:53 +0000</pubDate>
				<guid isPermaLink="false">https://threatsys.co.in/?post_type=nproject&#038;p=3851</guid>

					<description><![CDATA[<p>The post <a href="https://threatsys.co.in/projects/ut-dashboard-jammu-and-kashmir/">UT Dashboard Jammu and Kashmir CERT-in Cyber Security Audit</a> appeared first on <a href="https://threatsys.co.in">Threatsys | Eradicating Threats Globally | Global Cyber Security Provider |</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Overview</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div  class="wpb_single_image wpb_content_element vc_align_left wpb_content_element">
		
		<figure class="wpb_wrapper vc_figure">
			<div class="vc_single_image-wrapper   vc_box_border_grey"><img decoding="async" width="869" height="400" src="https://threatsys.co.in/wp-content/uploads/2023/01/Screenshot-2023-01-23-170848-Custom.jpg" class="vc_single_image-img attachment-full" alt="" title="Screenshot 2023-01-23 170848 (Custom)" srcset="https://threatsys.co.in/wp-content/uploads/2023/01/Screenshot-2023-01-23-170848-Custom.jpg 869w, https://threatsys.co.in/wp-content/uploads/2023/01/Screenshot-2023-01-23-170848-Custom-300x138.jpg 300w, https://threatsys.co.in/wp-content/uploads/2023/01/Screenshot-2023-01-23-170848-Custom-768x354.jpg 768w" sizes="(max-width: 869px) 100vw, 869px" /></div>
		</figure>
	</div>
<div class="vc_empty_space"   style="height: 32px"><span class="vc_empty_space_inner"></span></div>
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>The UT dashboard is a groundbreaking endeavor by the Government of Jammu and Kashmir to use Big Data and Analytics to drive crucial administrative decisions. This technology-first strategy is driven by the government&amp;#39;s determination to seamlessly integrate transparency and governance by facilitating the rapid flow of information from the grassroots to the upper rungs of the UT machinery.</p>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div>
	<div class="wpb_raw_code wpb_raw_html wpb_content_element" >
		<div class="wpb_wrapper">
			<h6 style="margin:6px 0;display:inline-block;">Client:</h6> UT Dashboard<br>
<h6 style="margin:6px 0;display:inline-block;">Industry:</h6> Government of Jammu and Kashmir<br>
<h6 style="margin:6px 0;display:inline-block;">Services:</h6> CERT-in Web Application Security Audit<br>
<h6 style="margin:6px 0;display:inline-block;">Company:</h6>  Government of Jammu and Kashmir</a><br>
<h6 style="margin:6px 0;display:inline-block;">Development Company:</h6> CSM Technologies Pvt. Ltd.<br>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 60px"><span class="vc_empty_space_inner"></span></div></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Challenge</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>The &amp;quot;UT Dashboard&amp;quot; web platform serves the requirement for real-time monitoring. The UT<br />
Dashboard was established to collect detailed data on ground-level effect, which supports the state administration&amp;#39;s two important goals of openness and accountability. The examination of the ground-level impact assists in keeping track of how various administrative departments are operating. The dashboard promotes the flow of information from the lowest to the top of the state administrative hierarchy.</p>
<p>Our task was to test the website for the top ten OWASP vulnerabilities and to assist the developers in addressing any potential risks in accordance with CERT-IN and Threatsys Web Apps Penetration Testing Guidelines. The application must handle sensitive data and may be required to consider data privacy and security considerations.</p>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 60px"><span class="vc_empty_space_inner"></span></div></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Solution</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>Threatsys Technologies assigned 2 Cyber Security Resources under the Guidance of our CEO, Deepak Kumar Nath. The Threatsys Red team is started this project by performing Black Box Testing, White Box Testing along with our Industry Centric Checklist.</p>
<p>After testing the Web Application from the production URL, we discovered many problems that have been classified as Critical, High, Medium, and Low based on their severity. Our team is always striving to provide developer-friendly reports that are readily readable and include clear proof of ideas. We create proof-of-concept video with adequate evidence so that security problems may be simply understood and corrected. We have assigned a time frame to each Severity category in<br />
which the issue must be resolved. During that time, our staff was often assisting the developers in resolving such difficulties as rapidly as possible. After the patch was performed, our team reaudited the application to ensure that the fixes were done correctly.</p>

		</div>
	</div>
<div class="vc_empty_space"   style="height: 60px"><span class="vc_empty_space_inner"></span></div></div></div></div></div></div><div style="" class="vc_row wpb_row vc_row-fluid"><div class="row-inner"><div class="wpb_column vc_column_container vc_col-sm-3"><div class="vc_column-inner"><div class="wpb_wrapper"><h4 style="text-align: left" class="vc_custom_heading vc_do_custom_heading" >Results</h4><div class="vc_empty_space"   style="height: 20px"><span class="vc_empty_space_inner"></span></div></div></div></div><div class="wpb_column vc_column_container vc_col-sm-9"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>Threatsys issued the CERT-IN Safe to Host Certificate, and the UT Dashboard is successfully hosted in the State Data Center. Because it belongs to the government of Jammu and Kashmir, it is safely managed to authenticate with all of Jammu and Kashmir&amp;#39;s departments for their monitoring process, perfect management and procedure, and secure information storage for everyone.</p>

		</div>
	</div>
</div></div></div></div></div>
</div><p>The post <a href="https://threatsys.co.in/projects/ut-dashboard-jammu-and-kashmir/">UT Dashboard Jammu and Kashmir CERT-in Cyber Security Audit</a> appeared first on <a href="https://threatsys.co.in">Threatsys | Eradicating Threats Globally | Global Cyber Security Provider |</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
