The GDPR security check in accordance with Art. 32 is an indispensable measure for companies that operate technical systems that process personal data. Whether websites, software solutions or IT infrastructures - as an operator, you are legally obliged to carry out and document regular security checks.
With our service, you receive a comprehensive security analysis of your website that is specifically tailored to the requirements of the GDPR. At the end of the audit, you will receive a certified audit report that will serve as proof in the event of an official inspection or incident.
Missing or incomplete safety documentation can no longer be provided retrospectively and often results in high fines.
Test description: Security and vulnerability analysis
Our test performs a comprehensive technical analysis of your web applications and networks to uncover security gaps and minimise vulnerabilities. The tests include:
- Security header analysis
Checking the HTTP headers for security guidelines such asContent security policy,Strict transport securityandX-Content-Type-Optionsto prevent manipulation and attacks. - Directory fuzzing
Systematic searching of directory structures to find unprotected or hidden resources such as admin panels or configuration files. - Form security
Tests input forms for vulnerabilities such as cross-site scripting (XSS) and SQL injection to prevent attacks through malicious input. - SSL/TLS check
Validates the configuration of SSL/TLS certificates, including protocol support, encryption strength and expiry dates to ensure secure connections. - Passive safety test
Analyses publicly available information and metadata without direct access to the target to uncover sensitive data leaks. - Wapiti Vulnerability Scan
Performs automated tests for vulnerabilities in web applications, including file inclusion, command injection and weak session handling mechanisms. - Nmap network scan
Scans network ports, identifies running services and checks for insecure configurations or potentially dangerous open ports. - WhatWeb fingerprinting analysis
Recognises technologies and frameworks used by a website, such as CMS, database types or web servers, to identify potential points of attack. - Compliance Check
Checks whether your systems comply with the applicable standards and regulations (e.g. GDPR, ISO 27001) and identifies deviations.
Technical advantage:
The pentest combines state-of-the-art analysis tools with practical methods to provide comprehensive insights into your security situation and proactively minimise risks. Ideal for companies that want to protect their digital infrastructure and make it audit-compliant.