What to Include in Product Security Testing
What is included in a Product Security Test , often referred to as "the scope", greatly depends on the product’s features and the customer’s specific security objectives. Each test is tailored to the technology stack, threat landscape, and operational context of the product, ensuring relevant and high-impact coverage.
During our planning with the customer and what we discover as penetration testers, we might find the testing to include a variety of elements, all which our team can assess. These layers are on hardware, infrastructure, software and network, as the picture below shows:

Digging deeper into the layers, we see evidence of deeper layers, which our team can help assess. Read more about them in the grouping below.
Our hardware testing focuses on uncovering weaknesses across critical physical components. This includes chips and system-on-chips (SoC), memory such as DRAM and SRAM, storage types like ROM, EEPROM, Flash, and eMMC, as well as internal buses and SPI interfaces. Each of these layers exposes unique attack surfaces, and our specialized testing ensures they are thoroughly evaluated for security before your product reaches the field.


The Full Stack Peneration Tester
Product Security Testing, sometimes referred to as Device or Hardware Security Testing, is a specialized area within penetration testing. It requires a skilled team to assess a broad range of technologies, attack surfaces, and potential threat scenarios, ensuring that products are evaluated against both known vulnerabilities and complex, real-world attack paths across hardware and software layers.
Instead of relying on a single individual to conduct penetration testing, River Security’s methodology is built around structured collaboration. Our approach enables fine-grained prioritization and efficient distribution of tasks across a skilled team, ensuring deeper coverage, faster execution, and a more thorough assessment of complex products.
Our goal is clear and focused: to ensure that our customers' security posture aligns with the level users expect and assume. By identifying and addressing vulnerabilities early, we help prevent issues from being exploited in the wild- protecting both the product and the trust placed in it.
River Security Hardware Testing Lab
To uncover the kinds of vulnerabilities that matter at the hardware level, specialized tools and a controlled environment are essential. Our dedicated hardware lab enables deep technical analysis using techniques like fault injection, bus monitoring, and chip-level interrogation. This setup allows us to go far beyond surface checks, identifying weaknesses in components such as memory, storage, and internal communication pathways. This means greater assurance that your product has been rigorously tested under real-world attack conditions, before it ever reaches your customers.
At River Security, our dedicated lab is equipped to safely and thoroughly explore the full attack surface of the products we test. With specialized tools and controlled conditions, we can perform in-depth hardware and embedded security analysis while ensuring both the product and our equipment remain protected throughout the process.
Testimonials
Don't let us do the talking, but instead the customers. Take a look at your testimonials page and you will find many customer cases and testimonials. A carousel of our latest testimonals can be seen below.
Zaptec
“Partnering with River Security has given us real-time visibility and proactive protection for our expanding infrastructure. Their independent guidance and hands-on approach help us make informed decisions, ensuring our technology remains secure as we grow. It’s inspiring to work with a Norwegian tech company that truly understands our ambitions.” Henning Berland
Read MoreOslo Taxi AS
“Oslo Taxi is a technology company. We work with AI, large data sets, and have strict privacy requirements. That means we also need a security strategy that gives us full control. River Security doesn’t just hand over a report and walk away—they stay involved. When vulnerabilities are found, we fix them together. That’s the kind…
Read MoreTravel Retail Norway
“Following the cyberattack we experienced in early 2024, we wanted to explore new ways to increase and strengthen our cybersecurity measures. We already employ a range of advanced solutions, but by choosing Active Focus from River Security, we have gained something new: The ability to efficiently map our entire externally exposed digital attack surface and…
Read MoreWilhelmsen
“Over the past four years, Active Focus has become an indispensable part of our security operations. The service provides continuous, real-time visibility into our attack surface across multiple business units, enabling us to stay ahead of potential threats. Having a structured and categorized overview isn’t just convenient—it’s critical. A key benefit is how Active Focus keeps our…
Read MoreLisa Solutions
“At Lisa Solutions, ensuring the security of our software and protecting our customers’ data are top priorities. We are pleased to share that River Security recently conducted a penetration test, which confirmed the strength and resilience of our systems. This outcome reflects our commitment to maintaining the highest security standards. Regular security assessments are a…
Read MoreOrbyt
«We are very pleased with our decision to work with River Security. Their testers handled a scope that included both authenticated and unauthenticated attack vectors targeting several services, delivering high-quality recommendations within the agreed timeline. Collaborating with them was a pleasant experience, both digitally and in person. We highly recommend River Security for their skilled expertise and…
Read MoreSkagerak Energi
We had the pleasure of hosting a Secure Coding Session for our developers, led by Chief Hacking Officer Chris Dale from River Security AS. The workshop from River Security was tailored to our development team and provided valuable insights into best practices for writing robust and secure code. Chris guided us in an engaging and educational way through advanced techniques for early identification of vulnerabilities and how security must be integrated into the development process from the ground up.
Read MoreNorgesGruppen
We have come to know River Security quite well the last few years, as they have conducted several penetration tests for us. Through each and every contact we have had with them, we have experienced nothing but excellence at all stages. As a large company we take our responsibilities seriously when it comes to security. Having highly competent partners like River Security provides us with immense value. Their validations and recommendations are very comprehendible and contributes to our ability to stay one step ahead of the cyber criminals. River Security has been consistent, flexible and proved their competence in every single delivery. We want to give River Security our best recommendations!
Read MoreWikborg Rein
“River Security’s Active Focus service provides valuable real-time insights into our digital attack surface. Their expert team and continuous, agile penetration testing allow us to identify and fix vulnerabilities as soon as they arise and before they get exploited by threat actors. Our partnership with River Security helps us stay one step ahead of evolving…
Read MoreCOOP
“We engaged River Security to conduct a penetration test on our IDP solution. Their team was highly professional and easy to work with. They took the time to understand our needs, ensuring that their testing aligned with our expectations. The results were delivered in a comprehensive, well-organized report clearly outlining their findings and providing actionable recommendations.”…
Read More