Penetration Testing

What Is VAPT? Vulnerability Assessment and Penetration Testing Explained

A practitioner's guide to VAPT for Indian SaaS startups. What vulnerability assessment and penetration testing actually involve, what you get in a report, when you need one, and how to pick a vendor.

RG&AK
Rathnakara GN & Ashok Kamat
Cyber Secify
7 min read

You’ve been asked for a “VAPT report.” Maybe a client put it in their vendor questionnaire. Maybe your compliance team flagged it. Maybe an investor asked during due diligence. You nodded and said “we’ll get that done,” and now you’re Googling what VAPT actually means.

Here’s the short version: VAPT stands for Vulnerability Assessment and Penetration Testing. It’s two distinct activities, usually bundled together, especially in India. This post breaks down what each part involves, what you actually get at the end, and how to avoid wasting money on the wrong engagement.

Vulnerability Assessment vs Penetration Testing

These are not the same thing. They get bundled under “VAPT” so often that people treat them as one activity, but they test different things in different ways.

Vulnerability Assessment (VA)

A vulnerability assessment is a broad, mostly automated scan of your systems. The goal is coverage: find as many known vulnerabilities as possible across your entire attack surface.

What happens: A security engineer configures a scanner (Nessus, Qualys, OpenVAS, or similar), runs it against your infrastructure or application, and reviews the output. The scanner checks for known CVEs, misconfigurations, default credentials, missing patches, and weak TLS settings.

What you get: A list of vulnerabilities ranked by severity (Critical, High, Medium, Low, Informational). Each finding includes a description, affected asset, and remediation guidance.

What it doesn’t do: A VA doesn’t prove exploitability. It tells you “this port is running an outdated version of Apache with a known vulnerability.” It doesn’t tell you whether an attacker can actually chain that with other weaknesses to steal data or gain access.

Penetration Testing (PT)

A penetration test is a manual, targeted exercise where a security tester tries to break into your system the way a real attacker would. The goal is depth: prove what damage is actually possible.

What happens: A tester (following methodologies like PTES or the OWASP Testing Guide) manually probes your application for logic flaws, authentication bypasses, privilege escalation paths, and data exposure issues. They chain findings together to demonstrate real attack scenarios.

What you get: A report with proof-of-concept exploits, attack narratives, screenshots, and business impact analysis. Not just “this is vulnerable” but “here’s how we used this to access your admin panel and export your customer database.”

What it doesn’t do: A pentest doesn’t give you a complete inventory of every low-severity issue. It’s focused on what matters, not on listing every missing header.

Side-by-Side Comparison

Vulnerability AssessmentPenetration Testing
ApproachAutomated scanning + manual reviewManual testing + selective tooling
GoalFind all known vulnerabilitiesProve real-world exploitability
CoverageBroad (scans everything)Deep (focuses on critical paths)
FindsKnown CVEs, misconfigs, missing patchesLogic flaws, auth bypasses, chained exploits
OutputVulnerability list with severity ratingsAttack narratives with proof-of-concept
EffortHours to daysDays to weeks
Skill requiredMid-level engineer with scanner expertiseSenior tester with manual exploitation skills

Why “VAPT” Is an Indian Thing

If you talk to security teams in the US or Europe, they say “pentest” or “vulnerability scan.” The bundled term “VAPT” is mostly used in India, driven by compliance requirements from RBI, SEBI, CERT-In, and IRDAI that specifically reference “VAPT” in their guidelines.

The practical effect: Indian companies often buy a single engagement labeled “VAPT” and assume they’re getting both. Sometimes they are. Sometimes they’re getting an automated scan with a cover page that says “VAPT Report.” The difference matters.

What a Good VAPT Report Contains

A report worth paying for includes:

  1. Executive Summary - Business-language overview for leadership. What’s the risk posture? What needs immediate attention?
  2. Scope and Methodology - What was tested, what wasn’t, which methodology was followed (OWASP, PTES, NIST SP 800-115)
  3. Findings with Evidence - Each vulnerability documented with: severity rating, affected component, steps to reproduce, screenshots or request/response pairs, and business impact
  4. Attack Narratives - How findings chain together into real attack scenarios (this is what separates a pentest from a scan)
  5. Remediation Guidance - Specific, actionable fixes. Not “improve input validation” but “add parameterized queries to the /api/users endpoint, line 42 of userController.js
  6. Retest Confirmation - After you fix the issues, the tester verifies the fixes work. If your vendor doesn’t include retesting, ask why.

Red flag: If your report is 200 pages of scanner output with a logo slapped on top, you paid for a VA and got sold a “VAPT.”

When Do You Need a VAPT?

You definitely need one if:

  • A client or partner is asking for a pentest report as part of vendor onboarding
  • You’re preparing for SOC 2 or ISO 27001 certification
  • You’re processing payments and need PCI DSS compliance
  • You’ve just shipped a major feature or rewritten a core module
  • You’re handling sensitive data (health records, financial data, PII) and haven’t tested in 12+ months
  • CERT-In, RBI, SEBI, or IRDAI guidelines apply to your business

You probably don’t need one yet if:

  • You’re pre-product with no users and no production environment
  • You already ran a pentest last quarter and haven’t shipped significant changes

A common cadence for growing startups: pentest once or twice a year, and run vulnerability scans quarterly or after major releases.

How to Choose a VAPT Vendor

Questions to ask before signing:

About the testing:

  • Will testing be manual, automated, or both? What percentage is manual?
  • Which methodology do you follow? (Look for OWASP, PTES, or NIST references)
  • How many days of active testing are included?
  • Does the engagement include retesting after remediation?

About the team:

  • Who will actually do the testing? (Not the sales team, the testers)
  • What certifications does the testing team hold? (OSCP, CREST, CEH, CompTIA PenTest+)
  • Will the same person test and write the report?

About the output:

  • Can I see a sample report?
  • Will findings include proof-of-concept exploits or just scanner output?
  • Do you provide remediation support or just the report?

Red flags:

  • “We’ll run our proprietary scanner” (you’re buying a VA, not a VAPT)
  • No named testers or certifications mentioned
  • Turnaround under 3 days for a web application (not enough time for real manual testing)
  • Report delivered as a PDF export from Nessus/Burp with no custom analysis

Typical VAPT Cost in India

Pricing varies based on scope (number of applications, APIs, infrastructure components), depth of testing, and vendor reputation. Here’s what the market looks like:

ScopeTypical Range (INR)What to Expect
Single web app (basic)50,000 - 1,50,000VA + limited manual testing
Single web app (thorough)1,50,000 - 3,00,000Full manual pentest + retesting
Web app + mobile app + API2,50,000 - 5,00,000Multi-scope engagement
Infrastructure (cloud/on-prem)1,00,000 - 4,00,000Depends on number of IPs/hosts

Beware of vendors offering “full VAPT” for under 20,000. At that price, you’re getting an automated scan and a templated report. That has its place, but don’t confuse it with a penetration test.

Where to Start

If you know your scope and want to get moving:

  • Startup Pentest (INR 74,999) - 1 application scope, 7 days of testing, founder-led engagement. Good for a single web app or API that needs a proper manual pentest before a client audit or compliance milestone.

  • Growth Pentest (INR 1,79,999) - 2 scopes (e.g., web app + API, or web app + mobile app), 10 days of testing. Includes SOC 2 + ISO 27001 audit prep and is built for startups heading into enterprise sales.

Both plans include a Brand Protection Snapshot and retesting after remediation.

Not sure what you need? Start with a Security on Demand session (INR 9,999). It’s 4 hours of founder-led consultation where we assess your current security posture and recommend the right scope. Full refund if you don’t continue. Continue with us, and the fee comes off the price.

The Bottom Line

VAPT is two things: an automated scan for breadth and a manual test for depth. You need both, but you need to know which one you’re actually buying. Ask your vendor hard questions about methodology, manual effort, and report quality. A good VAPT doesn’t just hand you a list of CVEs. It shows you what an attacker can actually do with your system and tells you exactly how to fix it. See our penetration testing services for details on scope, methodology, and what each plan includes.

Frequently Asked Questions

What is VAPT?

VAPT stands for Vulnerability Assessment and Penetration Testing. It combines automated scanning to find known vulnerabilities with manual testing to find business logic flaws, authentication bypasses, and chained exploits that scanners miss.

How much does VAPT cost in India?

VAPT costs in India range from 50,000 to 3 lakh INR for a single scope depending on the vendor. At Cyber Secify, the Startup Pentest plan is 74,999 INR for 1 scope with a 7-day delivery.

What is the difference between vulnerability assessment and penetration testing?

A vulnerability assessment scans for known issues using automated tools and produces a list of findings. A penetration test goes further with manual exploitation, testing business logic, chaining vulnerabilities, and attempting real-world attack paths.

Share this article
VAPTvulnerability assessmentpenetration testingsecurity testingstartup securityVAPT Indiapentest report