The Google Partner Security Program is a collaborative effort to protect partner, customer, and Google data by increasing the security of Google partners’ applications and networks that integrate with the Google ecosystems.
Google has engaged Bishop Fox to conduct appropriate security testing with the goal of validating the security of Google partners’ applications and ensuring Google user data is being handled securely.
Bishop Fox’s main goal is to help you complete the Security Assessment requirements listed on:
OAuth Application Verification FAQ.
Learn more about how Bishop Fox helps you validate the security of your application:
Bishox Fox collaborated with Google to design the Partner Security Program. We know what's needed for you to pass the testing requirements.
Bishop Fox was founded on the principle that all we do is advise our clients so they can make the best possible security decision.
Our Team's technical depth and expertise means we can tailor every solution or project to your unique requirements.
Partners and senior consultants drive service delivery, and we are committed to every project’s success. You won’t be handed off to a junior team.
We have negotiated discounted pricing with Google for this program, and the cost is between $15,000 and $75,000 depending on the size of the application, size of the environment, and how Google user data is utilized .
We will work with you to get the project started as quickly as possible, and we can provide you with a few start dates to choose from. Scheduling is typically 2 to 4 weeks out.
Once all the paperwork is in place, fieldwork can typically take 1 to 4 weeks. After that, reporting and QA can take up to 1 week for report delivery.
The focus of the penetration testing will be on the external perimeter internet facing assets and applications that store Google user data on non Google servers, a policy and procedure
review, and a cloud deployment review.
Information shared with us for scoping will be used to determine overall effort required and also shorten the ramp up time needed for testing. If we can understand the environment before testing, we can spend less time on discovery/footprinting and more time and on active penetration testing. The more accurate the scoping details are, the more accurate and cost sensitive we can be with the scope and quote.
We’ll leave that up to you. If you want to provide source code, it can help us be more efficient with our time and get to a deeper level of testing. That said, source code is not required for this assessment.
All sensitive data including source code will be stored, processed, and transmitted securely. Your Bishop Fox engagement manager can help setup a secure file share to use throughout the project.