/ 5

Client Reviews

Yacouba N.

Vulnerability analysis, API and access security, data protection, identity and authentication management, application environment hardening, security best practices.

I analyze backend applications, APIs, and SaaS platforms to identify security vulnerabilities and associated risks. I support teams in implementing concrete and tailored recommendations to strengthen security while preserving performance and usability. I rely on current standards and best practices in application cybersecurity. In addition, my expertise in systems, infrastructure, networks, and cloud computing allows me to have a comprehensive and coherent view of security.

Expertise

(01)
App & SaaS Security Audit – Cybersecurity Back-End & Cloud Expert

French

Pack 1 - API & Auth Security Audit

5h
630
arrow up right

Secure authentication, access rights, and endpoints (where the most leaks occur):

  • Review authN/authZ (JWT/OAuth, roles, scopes, permissions)
  • OWASP API Top 10 checks (IDOR, injection, rate limit, errors, CORS…)
  • Exposure verification (documentation, overlooked endpoints, environments, versions)
  • Prioritized remediation plan + hardening recommendations (gateway/WAF, throttling, headers, logs)

Pack 2 - Hardening Exposed Servers & Services

12h
1512
arrow up right

Reduce the attack surface of accessible servers and services (internet/VPN/inter-site):

  • Review ports/services + firewall rules + network segmentation
  • OS hardening (Linux/Windows): accounts, permissions, admin MFA, RDP/SSH, policies, patching
  • Service hardening (reverse proxy, web server, database, bastion host, admin access)

Pack 3 - Express Application Security Audit

5h
630
arrow up right

Detect major application-side risks (auth, sessions, data, endpoints):

  • Review of data flows: login, roles, permissions, sessions
  • Web security controls: OWASP Top 10 (injection, XSS, CSRF, IDOR, etc.)
  • Verification of errors, logs, headers, CORS, uploads, and sensitive data handling
  • Top 10 probable vulnerabilities and remediation priorities

Pack 4 - Application Observability & Detection

4h
504
arrow up right

Quickly detect attacks and obtain evidence (without unnecessary logs):

  • Define security events to log + format (correlation)
  • Alerting recommendations (thresholds/rate) + monitoring integration
  • Action-oriented "Incident-ready" plan

Special Pack - Application Security & Microsoft 365 Subscription

15h
1890
arrow up right

Coverage of all types of applications, including M365 and business applications, with governance, clear decision-making, and a remediation backlog tracked monthly:

  • Mapping and inventory of applications, flows, and sensitive data
  • Monthly express audit: access, authentication, permissions, exposure, and critical configurations
  • Prioritized action plan
  • Harnessing and guidance: MFA/SSO, WAF/API Gateway, secrets, logs/alerts, and OWASP best practices
  • M365 security: Entra ID, Exchange, SharePoint/OneDrive, and Teams (external sharing, admins, and rules)
  • Ready-to-execute remediation backlog (clear tickets and tracking)
  • Monthly security committee meetings, support, and guidance in case of incidents
The best talent to advise you
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Pourquoi BOHA-GROUP ADVISORY

(05)

Pourquoi nous faire confiance

Expertise issue du terrain
Approche directe et honnête
Temps senior, sans intermédiaire
Solutions éprouvées, orientées résultats
Gain de temps, clarté et sérénité
Appui sur l’écosystème BOHA-Group (apps, produits, ventures)
Nous conseillons comme nous entreprenons :
avec pragmatisme, responsabilité et exigence.