Most Indian SaaS founders treat penetration testing as a compliance check-box — something to do once before the enterprise sales cycle demands an attestation. That's a missed opportunity. A good pentest finds real exploitable issues that would have cost you the customer, the data, and the reputation. A bad pentest finds 47 informational-severity items, none of them exploitable, and gives you a 200-page PDF nobody acts on.

Here's a checklist for getting the good kind. Use it to scope your next engagement, evaluate vendors, and know what to demand.

Before scoping: get the basics right

Pre-pentest hygiene that vendors will quietly thank you for and that materially improves what they find:

  • Patch your dependencies. Run npm audit / pip-audit / bundle audit. Fix anything high or critical before the test starts. Otherwise the report wastes half its space on known CVEs.
  • Run an SCA scan (Snyk, Dependabot, GitHub Security). Fix obvious misconfigurations.
  • Check your own basics: HTTPS everywhere, secure cookies, CSP headers, HSTS, no debug pages in production, no `.git` exposed, no `.env` in the build.
  • Audit your secrets. git secrets or trufflehog on your repos. Fix any leaks before handing the codebase to anyone.

This costs you nothing and dramatically raises the signal-to-noise ratio of the findings.

Scoping — the most important conversation

Bad pentests start with bad scoping. Get these right:

1. Define the target precisely

Not "our SaaS product." Specifically: which URLs, which API endpoints, which mobile apps, which infrastructure (cloud account, Kubernetes cluster, VPC). Provide a written inventory. The narrower the scope, the deeper the test goes.

2. Pick the depth model

  • Black-box: tester knows nothing, simulates external attacker. Tests perimeter and obvious flaws. Misses business-logic issues.
  • Grey-box: tester has credentials for typical user roles. Tests authenticated flows and privilege escalation. Sweet spot for most SaaS.
  • White-box: tester has source code access and architecture diagrams. Deepest test. Best ROI for complex business logic.

For most B2B SaaS: grey-box with multiple user roles. Add white-box on critical modules (auth, billing, data access).

3. Define what's in scope and what's not

In scope: web app, API, mobile apps, cloud infra. Out of scope: physical security, social engineering (unless explicitly asked), third-party services you don't control.

Get this in writing. Saves arguments later.

4. Decide on disclosure approach

  • Standard: tester reports findings at end of engagement. You fix in your own time.
  • Real-time disclosure: tester flags critical findings immediately. You can patch during the test. Better for production systems.
  • Continuous: ongoing engagement with monthly reports. Right for SaaS that ships weekly.

What a real pentest must cover

The OWASP Top 10 (still relevant in 2026)

  1. Broken Access Control — IDOR, privilege escalation, horizontal access between tenants. Critical for multi-tenant SaaS.
  2. Cryptographic Failures — weak password hashing, secrets in URLs, unencrypted PII at rest.
  3. Injection — SQLi, NoSQLi, command injection, LDAP injection. Less common in 2026 but still happens.
  4. Insecure Design — the category for architecture-level issues that no scanner finds.
  5. Security Misconfiguration — exposed admin panels, default credentials, verbose errors, missing headers.
  6. Vulnerable and Outdated Components — libraries with known CVEs.
  7. Identification and Authentication Failures — weak password policies, broken session management, missing MFA on admin.
  8. Software and Data Integrity Failures — unsigned updates, untrusted CI/CD plugins, deserialization issues.
  9. Security Logging and Monitoring Failures — events not logged, no audit trail, no detection of incidents.
  10. Server-Side Request Forgery (SSRF) — particularly nasty in cloud environments.

SaaS-specific tests beyond OWASP

  • Multi-tenant isolation. Can user A from tenant 1 access tenant 2's data via any path? Test IDOR exhaustively.
  • API authentication and rate limiting. Can someone brute-force endpoints? Are there public endpoints that shouldn't be?
  • Billing and pricing bypass. Can users access features they didn't pay for? Manipulate quotas?
  • File upload and processing. Path traversal, server-side rendering exploits, XXE in document parsing.
  • Webhook security. Are incoming webhooks verified? Outgoing webhooks rate-limited?
  • OAuth and SSO implementations. Common source of subtle vulnerabilities.

Cloud and infra-specific

  • IAM permissions audit (overly broad roles, unused privileges, shared keys)
  • S3 / blob storage permissions (public buckets, unintended access)
  • Network segmentation (services exposed beyond intended scope)
  • Secrets in environment variables, CI/CD pipelines, code
  • Container security (base images, runtime privileges)
  • Kubernetes RBAC and network policies (if applicable)

What to demand in the report

A useful pentest report has these sections. Reject ones that don't.

  1. Executive summary — written for non-technical readers, 1 page
  2. Scope and methodology — exactly what was tested, what wasn't, and how
  3. Findings — each with: title, severity, CVSS score, business impact (not just technical), reproduction steps, affected components, recommended remediation
  4. Proof-of-concept evidence — screenshots, request/response examples, video where relevant
  5. Risk-prioritised remediation plan — what to fix first, what can wait, what's defensible to accept
  6. Re-test offer — confirming fixes works. Often bundled.

What to push back on: reports padded with informational-severity items that aren't exploitable. Reports that conflate "lack of security header X" with "exploitable vulnerability." Reports without business-context impact. Reports that don't tell you how to fix things.

Pricing reality for Indian SaaS pentests

Realistic 2026 ranges from competent India-based security firms:

ScopeTypical priceDuration
Single web app, grey-box₹1.5L–₹3.5L1–2 weeks
Web + API, grey-box, multiple roles₹2.5L–₹5L2–3 weeks
Web + API + 2 mobile apps₹4L–₹7L3 weeks
Cloud infrastructure audit (AWS/Azure/GCP)₹2L–₹6L1–2 weeks
Full stack: web + API + mobile + cloud₹6L–₹12L4–6 weeks
Continuous (monthly retainer)₹80K–₹2L/moOngoing

Below ₹1L for a real web app pentest is usually a junior with a vulnerability scanner — fine for the first round of cheap-checking, useless for serious findings.

How often should you pentest?

  • Before launch. Always.
  • Annually. Minimum for production SaaS handling any sensitive data.
  • After major release. New features = new attack surface.
  • Before SOC 2 / ISO 27001 audit. Auditors expect a recent pentest report.
  • Continuous for any SaaS that ships weekly or handles payment/PHI/financial data.

Acting on findings

A pentest report has zero value if nothing happens after. The post-test workflow that works:

  1. Within 24 hours: read the executive summary and review critical findings
  2. Within a week: assign owners and target dates for critical and high findings
  3. Within 30 days: fix all critical findings, most high findings
  4. Within 90 days: re-test to confirm fixes
  5. Ongoing: include security regression checks in CI/CD for the issues found

If your team can't commit to this, you don't need a pentest yet — you need a security plan. Pentests are for organisations ready to fix what they find.

For more on our security services, see the cybersecurity overview.