Headquartered in London, National Grid is an international energy delivery business operating across regulated electricity and natural gas industries. It is one of the ten largest investor-owned utilities globally and is responsible for installing, maintaining, and repairing gas meters and pipelines. The organisation employs more than 20,000 people worldwide.
Energy & Utilities
Vulnerability Assessment and Penetration Testing
Utilities
National Grid aimed to enhance the protection of its online services against cyber-attacks. They needed to identify security weaknesses across their web applications and network services and mitigate risks related to misuse of these services. The engagement focused on evaluating security risks, ensuring end-to-end protection, maintaining high availability, enabling secure transitions, and strengthening authentication mechanisms.
Evaluated security risks across business-critical web applications and network services
Analysed information available from public resources
Conducted vulnerability assessments and black/white box penetration testing using automated tools
Executed controlled hacking to validate identified, hidden vulnerabilities and strengthened authentication using MFA
Testing live, business-critical applications required controlled execution to identify vulnerabilities without impacting availability.
Ensuring complete visibility into configuration weaknesses and potential misuse points across network access layers required multiple testing approaches.
We followed a structured security testing approach aligned with OWASP security testing guidelines. Through vulnerability assessment, penetration testing, and controlled exploitation, we helped National Grid gain clear visibility into its security posture and understand risks across its information systems and network services.
Delivered detailed test plans, testing approaches, and black box / white box penetration testing reports
Identified vulnerabilities and configuration weaknesses exploitable through network access points and shared countermeasure recommendations
Completed risk assessments and outlined future plans aligned with emerging technologies