Case study

Leading culinary marketplace boosts security with comprehensive assessments

  • Hospitality
  • Application security testing
Comprehensive security assessments for culinary leader case study
Location icon
Location:
USA
Industry icon
Industry:
Partnership period icon
Partnership period:
November 2016 - present

Client background Client background

Our client is a leading marketplace that provides a wide range of culinary services, experiences, and products.

Business challenge Business challenge

The client aimed to strengthen the security posture of their digital solutions, ensuring the protection of user data and transaction security, especially during peak load periods.

ImplementationImplementation

N-iX helped the client conduct annual security assessments of their digital solutions, focusing on external interfaces and business logic implementation while identifying security flaws, vulnerabilities, and misconfigurations.

Our security professionals conducted comprehensive penetration testing using the black-box technique. We followed the OWASP Web Security Testing Guide checklist to ensure that no critical areas were missed. The checklist covers various aspects of web security, including authentication, session management, input validation, etc.

Additionally, we set up an automated security audit for the AWS environment using Scout Suite and implemented Two-Factor Authentication (2FA) for fund withdrawals and changes to sensitive information. We ensured that all data-handling practices comply with GDPR requirements.

Finally, N-iX specialists developed a custom admin system with role-based permissions for content and event management, partner onboarding, and statistical monitoring.

  1. Apache Airflow serves as a job orchestration tool.
  2. Amazon EMR runs queries against the source table and stores the results in Amazon S3.
  3. Amazon SNS is automatically triggered when a file lands in S3, then invokes a Lambda function.
  4. The Lambda function triggers batch transform jobs, powered by Amazon SageMaker.
  5. Amazon SageMaker provides model hosting, deployment, and inference.
  6. The output data is stored in Amazon S3.
  7. The Tableau report is generated based on the output data.
  8. A Docker image is created for the Sagemaker transform job processing and hosted on Amazon ECR.
  9. All Sagemaker logs are stored in AWS CloudWatch.
Boosting security for culinary leader
Value delivered by N-iXValue delivered
  • Conducted regular security assessments with detailed reports containing collected data, identified security vulnerabilities, and recommended mitigation measures;
  • Enhanced security with timely remediation and risk mitigation;
  • Streamlined and improved the accuracy of the security testing process by following OWASP best practices.
Expertise delivered:
Technologies:
Common Vulnerability Scoring System (CVSS), OWASP WSTG checklist, Scout Suite, AWS
10+

years on the market

400+

cities served

Two-Factor Authentication

implementation

Automated security audit

for the AWS environment

OWASP

best practices

Related content

Embracing cloud computing for travel industry: A comprehensive guide

  • Cloud
  • October 15, 2025
Expert blog
Success stories

How hospitality companies embrace Digital Transformation

  • Digital Transformation
  • April 21, 2017
Expert blog
Success stories

Developing hospitality software offshore: vendor’s perspective

  • Software engineering
  • IT outsourcing
  • January 31, 2017
Expert blog
Success stories

Contact us

Drop a message to our team to see how we can help

Required fields*

Up to 3 attachments. The total size of attachments should not exceed 5Mb.

Your privacy is protected

Trusted by

N-iX client Bosch
N-iX client Siemens
N-iX client ebay
N-iX client Inditex
N-iX client CircleCI
N-iX client Credit Agricole
N-iX client TotalEnergies
N-iX client AVL
N-iX client Innovation Group
N-iX client Questrade
N-iX client First Student
N-iX client ZIM

Industry recognition

Awards item
Awards item
Awards item
Awards item
Awards item
Awards item