AffectLog Basic assessment determines an application's ability to protect against common vulnerabilities. It is also a good starting point for a multi-phase security effort or for applications that do not handle sensitive data. AffectLog Basic assessment is done automatically or manually without access to the source code. AffectLog Basic is designed to assess application capabilities against low-effort attacks used to identify and exploit vulnerabilities. It's not meant to protect against more determined attackers who will specifically target the application. If the data processed by the application has high value, it's generally not recommended to stop at AffectLog Basic review.
AffectLog Enhanced assessment is considered to have adequate protection against most of the common risks associated with applications today. AffectLog Enhanced is typically appropriate for applications that handle important transactions, such as those that process healthcare information or sensitive assets, or those that implement business-critical or sensitive functions. This level is also relevant for industries where integrity is a critical aspect of their business. Threats to applications at this level are likely to come from motivated attackers targeting specific applications and using highly effective tools and techniques to discover and exploit weaknesses.
AffectLog Ultimate assessment is the highest level of verification typically used for critical applications such as those in military, health, safety, and critical infrastructure. It requires in-depth analysis of architecture, coding, and testing, and is designed to defend against advanced security vulnerabilities and promote good security design. The AffectLog platform uses Machine Learning to identify potential threats and vulnerabilities that may have been missed by manual checklist processes, especially in large codebases.
AffectLog ML360° is trained on the ASVS requirements and is used to automatically evaluate the security of a web application against those requirements. This helps organizations save time and resources by automating the assessment processes.
AffectLog ML360° is used to analyze the code identify potential vulnerabilities or weaknesses. This helps AI driven organizations identify and address security issues before they become a problem.
AffectLog ML360° is used to analyze the security of an application and provide recommendations for improvement based on the ASVS requirements. This could help organizations identify areas where their security profile could be strengthened.
AffectLog ML360° helps continuously monitor the security of an application and alert us to any changes or issues that may arise. This helps us stay on top of our security posture and quickly address any issues that arise.
The AffectLog W360° Platform builds on the latest Application Security Verification Standard (ASVS) to provide a comprehensive set of security requirements that can be used to assess the security of applications. It includes requirements for verifying the security of various components of an application, including:
AffectLog M360° runs a comprehensive set of security requirement checks to assess the security of mobile applications. It includes requirements for verifying the security of various components of a mobile application, including:
AffectLog ML360° risk assessment is used to help ensure the security of ML powered applications by verifying that appropriate safeguards are in place to protect sensitive data, ensure the quality and accuracy of the model, and secure the model against potential attacks. AffectLog ML360° Platform extends legacy ASVS to include requirement checks that are specifically relevant to machine learning (ML) powered applications, including:
The AffectLog API360° assessment builds on the latest ASVS to provide a comprehensive set of security requirements that can be used to assess the security of applications. It includes requirements for verifying the security of various components of an application, including:
AffectLog extends widely adopted industry standards for risk assessment, such as OWASP, UNESCO Recommendation on Ethics of AI, EU AI Act draft text, and NIST, to build its functionalities.
AffectLog’s audit checklist encompasses Mobile Security Testing Guide, the Web Application Security Consortium (WASC) Threat Classification, Privacy Risk Assessment Methodology (PRAM) and the GDPR Data Protection Impact Assessment (DPIA) to assess the relevant security and data privacy risks of mobile and web applications.
The platform aims to provide an auditable, explainable and transparent system to document the assessment checklist and the assessment scores.
Full working setup in under 24 hours.