Technical

Vulnerability Assessment

Defined in §8(4), DPDPA 2023; Rule 6(1), Rules 2025

Systematic identification and evaluation of security weaknesses in systems that process personal data.

What does “Vulnerability Assessment” mean?

A vulnerability assessment is a systematic process of identifying, quantifying, and prioritising security vulnerabilities in systems, applications, and infrastructure that process personal data. Under DPDPA's reasonable security safeguards requirement, regular vulnerability assessments demonstrate proactive risk management. This includes automated scanning (SAST, DAST, infrastructure scanning), manual penetration testing, dependency audits, and configuration reviews. Findings must be remediated based on severity within defined timelines.

Why does this matter for your business?

Regular vulnerability assessments are evidence of "reasonable security safeguards" under DPDPA. If a breach occurs due to a known, unpatched vulnerability, the Board is far more likely to impose maximum penalties than for a zero-day exploit.

Real example

A Gurugram fintech runs monthly automated scans (Snyk for dependencies, OWASP ZAP for APIs), quarterly manual penetration tests, and annual third-party security audits. Critical vulnerabilities are patched within 24 hours, high within 7 days. All findings and remediation timelines are logged.

Common misconception

A one-time penetration test at launch is not a vulnerability assessment programme. DPDPA's "reasonable safeguards" implies ongoing, regular assessment as threats evolve and systems change.

Related terms

DPDPA Shield automates Compliance Dashboard. See how →