Software Secured Company Logo.
Services
Services
WEB, API & MOBILE SECURITY

Manual reviews expose logic flaws, chained exploits, and hidden vulnerabilities

Web Application Pentesting
Mobile Application Pentesting
Secure Code Review
Infrastructure & Cloud Security

Uncovers insecure networks, lateral movement, and segmentation gaps

External Network Pentesting
Internal Network Pentesting
Secure Cloud Review
AI, IoT & HARDWARE SECURITY

Specialized testing validates AI, IoT, and hardware security posture

AI Pentesting
IoT Pentesting
Hardware Pentesting
ADVANCED ADVERSARY SIMULATIONS

We simulate attackers, exposing systemic risks executives must address

Red Teaming
Social Engineering
Threat Modelling
PENETRATION TESTING AS A SERVICE

PTaaS provides continuous manual pentests, aligned with release cycles

Penetration Testing as a Service
OWASP TOP 10 TRAINING

Practical security training strengthens teams, shifting security left effectively

Secure Code Training
Ready to get started?
Identify real vulnerabilities confidently with zero-false-positive penetration testing
Learn More
Industries
Industries
INDUSTRIES
Data and AI

AI pentesting uncovers adversarial threats, ensuring compliance and investor trust

Healthcare

Penetration testing protects PHI, strengthens compliance, and prevents healthcare breaches

Finance

Manual pentests expose FinTech risks, securing APIs, cloud, and compliance

Security

Penetration testing validates SecurTech resilience, compliance, and customer trust

SaaS

Pentesting secures SaaS platforms, proving compliance and accelerating enterprise sales

CASE STUDY

“As custodians of digital assets, you should actually custodize assets, not outsource. Software Secured helped us prove that our custody technology truly delivers on that promise for our clients in both the cryptocurrency and traditional finance”

Nicolas Stalder,
CEO & Co-Founder, Cordial Systems
Ready to get started?
Our comprehensive penetration testing and actionable reports have 0 false positives so you can identify
Learn More
Compliance
Compliance
COMPLIANCE
SOC 2 Penetration Testing

Pentesting validates SOC 2 controls, proving real security to auditors and customers

HIPAA Penetration Testing

Manual pentesting proves HIPAA controls protect PHI beyond documentation

ISO 27001 Penetration Testing

Pentests uncover risks audits miss, securing certification and enterprise trust

PCI DSS Penetration Testing

Pentesting validates PCI DSS controls, protecting sensitive cardholder data

GDPR Penetration Testing

GDPR-focused pentests reduce breach risk, regulatory fines, and reputational loss

CASE STUDY

“Software Secured’s comprehensive approach to penetration testing and mobile expertise led to finding more vulnerabilities than our previous vendors.”

Kevin Scully,
VP of Engineering, CompanyCam
Ready to get started?
Our comprehensive penetration testing and actionable reports have 0 false positives so you can identify
Learn More
PricingPortal
Resources
Resources
COMPLIANCE
Blogs
Case Studies
Events & Webinars
Partners
Customer Testimonials
News & Press
Whitepapers
cybersecurity and secure authentication methods.
API & Web Application Security Testing

The Highest Threat: The Hidden Weakness in Modern API & Web Application Security

Alexis Savard
November 21, 2025
Ready to get started?
Our comprehensive penetration testing and actionable reports have 0 false positives so you can identify
Learn More
Login
Book a Consultation
Contact
Legal

Secure Engineering Policy

This Policy outlines the practices and procedures Software Secured follows to ensure any products or services delivered to our customers adhere to this philosophy.

Table of contents
Text Link
Text Link

1. Overview

Software Secured is committed to working with our customers as securely as possible. This Policy outlines the practices and procedures Software Secured follows to ensure any products or services delivered to our customers adhere to this philosophy. The policy comprises secure engineering activities including but not limited to Threat Modelling, Static Analysis, Dynamic Analysis, and Penetration Testing.  

2. Purpose

The purpose of this policy is to establish a standard practice for always delivering and shipping secure code.

3. Scope

The scope of this policy includes all personnel who have or are responsible writing code or delivering products or services to Software Secured clients. It encompasses all software Software Secured has ownership of which contains customer data.

4. Policy

4.1 Threat Modeling

4.1.1 A Threat Modeling exercise will be conducted during the creation of any new product or service to identify security risks and avoid or mitigate serious risks by design.

4.1.2 A smaller targeted Threat Modeling Exercise will be performed on any new features before they are added.

4.1.3 A Threat Modeling Exercise will be performed annually on all components that contain or may contain any form of customer data.

4.2 Secure Code Review & Scanning

4.2.1 All code will undergo either an automated scan using a company approved tool or manual secure code review prior to initial release or significant updates.

4.2.2 All Dependencies will also be scanned using a company approved tool or evaluated for weakness prior to inclusion on any project and on a bi-annual basis.

4.2.3 Identified issues will be addressed per the Vulnerability Management process in 4.5.

4.3 Dynamic Analysis

4.3.2 New features will undergo targeted dynamic scanning prior to release.

4.3.3 Identified issues will be addressed per the Vulnerability Management process in 4.5.

4.4 Penetration Testing

4.4.1 Penetration Testing will be performed on all components on a quarterly basis.

4.4.2 Identified issues will be addressed per the Vulnerability Management process in 4.5.

4.5 Vulnerability Management

4.5.1 All confirmed vulnerabilities will have severity scored for impact (based on CVSS) and risk (Based on DREAD) in accordance with Software Secured Scoring guidelines

4.5.2 All known issues will be logged in the SRC’s Issue tracking page and when appropriate also in Github under the associated project for development tracking.

4.5.3 Vulnerability SLA’s: Critical Severity issues will be addressed prior to release or within a maximum 5 business days for already deployed code High Severity issues will be addressed prior to release or within a maximum 30 business days for already deployed code Medium Severity issues will be addressed within a maximum 90 business days for already deployed code Low Severity issues will be addressed within a maximum 180 business days for already deployed code Informational Severity issues will be evaluated and addressed if warranted at the discretion of Software Secured

4.5.4 Exception/Extension Process

If an evaluated vulnerability cannot be addressed within SLA due to complexity, time, expense, or other factors an exception may be requested.  The specific issue(s) will undergo additional risk assessment to determine:

a) if an exception is warranted

b) A feasible timeline and action plan for addressing the issue

c) Additional controls or mitigations which can be implemented to reduce the risk of exploitation.  

If the SRC approves an Exception/Extension it will be clearly documented along with the short term and long term application plan in the associated ticket.

5. Disclosure

5.1 Vulnerabilities in Shipped Code: Software Secured will issue a public disclosure for any vulnerabilities detected and remediated in code it delivers to customers indicating the type of vulnerability, risk level, and patching or mitigation instructions.

‍5.2 Vulnerabilities in Hosted Code: Software Secured will evaluate and fix vulnerabilities in hosted code in accordance with the above policy.  If Software Secured observes evidence of vulnerability exploitation or IOC’s for high or critical severity vulnerabilities Software Secured will make efforts to contact any impacted customers and notify them of any risk or potential exposure to their data as transparently as possible as indicated by the security incident response policy.

6. Policy Compliance

6.1 Compliance Measurement: The SRC will verify compliance to this policy through various methods, including but not limited to, periodic walk-throughs, video monitoring, business tool reports, internal and external audits, and feedback to the policy owner.

‍6.2 Exceptions: Any exception to the policy must be approved by the SRC in advance.

‍6.3 Non-Compliance: An employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment.

Helping companies identify, understand, and solve their security gaps so their teams can sleep better at night

Book a Consultation
Centralize pentest progress in one place
Canadian based, trusted globally
Actionable remediation support, not just findings
Web, API, Mobile Security
Web App PentestingMobile App PentestingSecure Code Review
Infrastructure & Cloud Security
External Network PentestingInternal Network PentestingSecure Cloud Review
AI, IoT & Hardware Security
AI PentestingIoT PentestingHardware Pentesting
More
PricingPortalPartnersContact UsAbout UsOur TeamCareers
More Services
Pentesting as a ServiceSecure Code Training
Industries
Data and AIFinanceHealthcareSecuritySaaS
Compliance
GDPR PentestingHIPAA PentestingISO 27001 PentestingPCI DSS PentestingSOC 2 Pentesting
Resources
BlogsCase StudiesEvents & WebinarsCustomer TestimonialsNews & PressWhitepapers
More
PricingPortalPartnersContact UsAbout UsOur TeamCareers
Resources
BlogsCase StudiesEvents & WebinarsCustomer TestimonialsNews & PressWhitepapers
Security & CompliancePrivacy PolicyTerms & Conditions
2025 ©SoftwareSecured