NeedSec logo
Case Studies

Real engagements. Real findings. Real results.

Every engagement is different, but the goal is always the same: find what matters, explain the risk clearly, and help the organisation fix it before it becomes a breach.

Evidence-led outcomes

Sample scenarios showing how testing turns into remediation, assurance, and clearer security decisions.

Web Application TestingCritical severity

FinTech

IDOR and broken access control found across multi-tenant SaaS platform

Challenge

A fast-growing FinTech SaaS was preparing for a Series A round. The platform handled sensitive financial data across multiple tenants and the investor due diligence process required evidence of a recent penetration test.

What We Did

NeedSec performed a full web application penetration test covering authentication flows, API endpoints, business logic, and data access. Testing focused on tenant isolation and cross-account data exposure.

Result

NeedSec identified critical IDOR vulnerabilities allowing one tenant to access another's financial records, plus three high-severity authentication flaws. All findings were remediated before the due diligence window closed.

Key Findings

IDOR across tenant boundaries
Broken object-level authorisation
Session token reuse after logout
API Penetration TestingHigh severity

Healthcare

Unauthenticated API endpoints exposing patient data in healthcare portal

Challenge

A healthcare technology company building a patient-facing portal needed an API security review before go-live. The platform integrated with multiple clinical systems and handled sensitive health records.

What We Did

NeedSec assessed all REST API endpoints for authorisation gaps, data leakage, and injection vulnerabilities. Testing included role boundary testing between clinician, admin, and patient accounts.

Result

Five unauthenticated endpoints were discovered that returned patient demographic and appointment data without any authorisation check. The findings were fixed before launch, preventing potential GDPR and clinical data exposure.

Key Findings

Unauthenticated data endpoints
Role bypass between clinician and patient
Excessive data in API responses
Cloud Security AssessmentCritical severity

E-commerce

Publicly accessible S3 buckets and overprivileged IAM roles in AWS environment

Challenge

An e-commerce business undergoing rapid AWS infrastructure growth asked NeedSec to review its cloud environment after an internal audit flagged potential misconfigurations. The environment included RDS databases, ECS containers, and Lambda functions.

What We Did

NeedSec performed a full AWS cloud security assessment covering IAM policies, S3 bucket ACLs, VPC configuration, EC2 hardening, secrets management, and logging coverage.

Result

Two publicly accessible S3 buckets were found containing customer order exports. IAM roles had wildcard permissions allowing lateral movement to production databases. All findings were remediated with prioritised guidance.

Key Findings

Public S3 bucket with customer data
Overprivileged IAM role escalation path
Missing CloudTrail logging on production accounts
Infrastructure TestingCritical severity

Professional Services

Active Directory privilege escalation path from standard user to domain admin

Challenge

A professional services firm requested an internal network penetration test as part of its annual security review. The environment included a Windows Active Directory domain, file servers, and remote access infrastructure.

What We Did

NeedSec performed a full internal infrastructure test starting from a standard user network position. Testing covered Active Directory enumeration, privilege escalation techniques, lateral movement, and sensitive data exposure.

Result

A Kerberoastable service account with a weak password allowed privilege escalation to domain admin in under four hours. The attack path was fully documented with remediation steps for both the immediate issue and longer-term AD hardening.

Key Findings

Kerberoastable service account with domain admin rights
Lateral movement via SMB relay
Sensitive credentials in SYSVOL scripts
Cyber Essentials PlusMedium severity

Manufacturing

Cyber Essentials Plus certification awarded by NeedSec after remediation of failing controls

Challenge

A manufacturing company was required to hold Cyber Essentials Plus certification to maintain a government supply chain contract. A previous attempt with another body had failed due to unpatched systems and misconfigured endpoint controls.

What We Did

NeedSec, as an IASME-licensed certification body, conducted the full Cyber Essentials Plus technical assessment across all five control areas, recorded the failing controls, confirmed the required action, and carried out the final technical verification.

Result

All failing controls were resolved within three weeks. NeedSec awarded Cyber Essentials Plus certification directly and the organisation maintained its government supply chain contract.

Key Findings

Unpatched OS on 12 in-scope endpoints
MFA not enforced on admin accounts
Antimalware definitions outdated on remote workers
Vibe Coded App SecurityCritical severity

SaaS Startup

Missing RLS policies and exposed Supabase keys in AI-generated application

Challenge

A startup had built its MVP using an AI coding tool and Supabase as the backend. The founders wanted a security review before onboarding paying customers, concerned that AI-generated code may have missed security fundamentals.

What We Did

NeedSec reviewed the Supabase configuration, RLS policies, API routes, environment variable handling, and frontend bundle for exposed secrets. Testing covered auth flows, data access boundaries, and injection risk.

Result

Row-level security was disabled on three tables containing user data. An API key with full database access was present in the frontend JavaScript bundle. Both were fixed before customer onboarding began.

Key Findings

RLS disabled on user data tables
Service role key exposed in frontend bundle
Missing auth guards on three API routes

Ready to find out what is in your environment?

Share your scope, systems, and goals. NeedSec will help define the right assessment approach and deliver findings you can act on.

Book an Assessment