What is VAPT?
VAPT — Vulnerability Assessment and Penetration Testing — is a two-phase security exercise that first scans an asset for known weaknesses (the VA phase) and then attempts to exploit them under controlled conditions to confirm real-world impact (the PT phase). It produces a prioritized risk report with proof-of-concept evidence, severity scoring (CVSS), and remediation guidance. Used by banks, fintechs, SaaS, and healthcare to meet ISO 27001, SOC 2, RBI, and PCI-DSS testing requirements.
VAPT is the standard term in enterprise procurement for an end-to-end security test. The 'VA' half is an automated breadth-first sweep — running CVE scanners, configuration analyzers, and dependency auditors against the in-scope asset to enumerate weaknesses. The 'PT' half is the manual depth phase — a qualified tester (typically OSCP-, eCPPT-, or OSCE-certified) attempts to exploit the highest-impact findings to demonstrate real-world business risk.
The pair matters because either phase alone is misleading. A VA report by itself overstates risk: it lists every known CVE without confirming exploitability. A pure pen-test understates breadth: testers prioritize what they can chain, ignoring lower-hanging vulns that an opportunistic attacker would pick first. VAPT combines both, then ranks findings by exploited-impact rather than CVSS alone.
A typical VAPT engagement at Infilux runs 5–10 working days for a single web application or 3–7 days for an internal network. It produces an executive summary, a technical findings register with CVSS v3.1 scoring, a chained-exploit narrative, and a remediation matrix. All engagements include a complimentary retest within 30 days to verify the fixes landed correctly.
Key points
- Two-phase: breadth-first scan (VA) followed by depth-first exploit (PT).
- Standard requirement under ISO 27001 A.5.30, SOC 2 CC7.1, PCI-DSS 11.4, RBI Cyber Security Framework.
- Deliverables: executive summary, technical findings register, exploit proof-of-concepts, remediation roadmap, retest verification.
- Typical scope: web apps, mobile apps, APIs, internal/external networks, cloud (AWS / Azure / GCP), thick clients, source code.
- Run by certified offensive practitioners (OSCP, eCPPT, OSCE, CRTP).
