Table of Contents
- What is ABDM M1 WASA Testing and Why It Is Mandatory
- Who Needs ABDM M1 WASA Testing
- Understanding the ABDM Milestone Framework
- Functional Testing vs Security Testing in WASA - What NHA Expects
- Complete ABDM M1 WASA Testing Scope and Checklist
- Deep Dive: ABHA Security and Identity Flow Testing
- Deep Dive: Consent Flow Security Testing
- ABDM API Security Testing - Common Vulnerabilities and Test Cases
- OWASP Top 10 for Digital Health Applications
- Common ABDM M1 WASA Failures and How to Avoid Them
- ABDM M1 WASA Audit Process - Step by Step
- How to Choose a CERT-In Empanelled ABDM WASA Auditor
- Frequently Asked Questions
1. What Is ABDM M1 WASA Testing and Why It Is Mandatory
India's healthcare system is undergoing the most significant digital transformation in its history. The Ayushman Bharat Digital Mission (ABDM), spearheaded by the National Health Authority (NHA), is building a nationwide integrated digital health infrastructure that allows patients to create a unique Ayushman Bharat Health Account (ABHA), link health records from multiple providers, and share those records securely with doctors, insurers, and other healthcare entities - all through a consent-based, interoperable digital ecosystem.
At the heart of this ecosystem is a rich API framework connecting Health Information Providers (HIPs), Health Information Users (HIUs), Health Lockers, and the ABDM gateway. Every digital health application seeking to participate in this ecosystem must integrate with these APIs - and that integration must be both functionally correct and security-hardened before it can access real patient data in the production environment.
This is where ABDM M1 WASA testing becomes critical.
WASA - Web Application Security Assessment - is the mandatory security and functional audit that NHA requires from all digital health applications before granting Milestone 1 (M1) certification. It must be conducted by a CERT-In empanelled auditor, and the resulting report must be submitted to NHA. Without a passing WASA report, no digital health application - regardless of how well-built or well-funded it is - can go live on the ABDM production environment.
The WASA requirement exists for a fundamentally important reason: health records contain the most sensitive personal data imaginable - diagnoses, prescriptions, mental health history, HIV status, genetic information. A security vulnerability in an ABDM-integrated application does not just expose business data; it exposes a patient's most private medical history. NHA's mandatory WASA audit is a critical safeguard ensuring that only applications meeting a defined security standard are permitted to handle this data at scale.
What makes ABDM WASA unique compared to a standard web application security assessment?
Unlike a generic web application security test, ABDM M1 WASA has a significant functional testing dimension. It is not sufficient for an application to simply be free of security vulnerabilities - it must also correctly implement every ABDM API flow. An application that implements ABHA linking incorrectly, or that handles consent artefacts improperly, will fail WASA even if it passes every security check. NHA requires both dimensions because a functionally incorrect implementation creates as much risk to patient data as a vulnerable one.
This dual nature - functional correctness plus security assurance - makes ABDM M1 WASA a specialized assessment that requires auditors with deep knowledge of both cybersecurity testing and the ABDM API specification. Generic penetration testers without ABDM domain expertise will produce incomplete reports that fail NHA review.
2. Who Needs ABDM M1 WASA Testing
Any organization building a digital health application that integrates with the ABDM ecosystem must complete M1 WASA testing before accessing NHA's production environment. There are no exemptions based on organization size, funding stage, or application complexity.
Health Information Providers (HIPs)
Hospitals, clinics, diagnostic labs, and pharmacies that generate and push patient health records to the ABDM network. HIP WASA scope includes record linking, care context management, and health document push APIs.
Health Information Users (HIUs)
Insurance companies, hospitals in consumer mode, and healthcare analytics platforms that request and consume patient health records through the ABDM consent architecture.
Health Locker Providers
Personal Health Record (PHR) applications that store patient health records linked to ABHA IDs. Health lockers sit at the centre of the consent ecosystem and face the widest WASA scope.
EHR / EMR Vendors
Electronic Health Record and Electronic Medical Record software vendors whose systems are being integrated with ABDM - either as standalone HIP integrations or as platforms serving multiple hospitals.
Telemedicine Platforms
Online consultation platforms that generate prescriptions, lab orders, and health records through consultations, and need to push these to ABDM as HIPs.
Pharmacy & Insurance Platforms
Digital pharmacy apps contributing prescription records, and health insurance platforms acting as HIUs to access policy-holder health records with consent.
An important nuance: if your organization plays multiple roles in the ABDM ecosystem (for example, a platform that acts as both HIP and HIU), the WASA scope must cover both role implementations. A hospital EHR that links records as a HIP and fetches records as an HIU for referrals needs both HIP and HIU test cases validated. Be explicit with your auditor about all roles your application plays in the ABDM ecosystem during the scoping phase.
3. Understanding the ABDM Milestone Framework
ABDM certification follows a milestone-based structure. Understanding where WASA fits within this framework helps organizations plan their compliance journey and allocation of resources effectively.
Milestone 1 (M1) - WASA and Production Access
M1 is the foundational gate. It requires successful completion of the WASA assessment covering functional correctness of ABDM API implementations and security hardening of the application. A CERT-In empanelled auditor conducts the assessment on the ABDM sandbox environment, produces an NHA-formatted report, and upon satisfactory remediation of critical findings, NHA grants M1 certification and production environment access. Without M1, no patient data can flow through the application on production.
Milestone 2 (M2) - Transaction Volume and Quality
Once live on production with M1 certification, NHA evaluates M2 based on the volume and quality of ABDM transactions processed - health records linked, consent flows completed, health data exchanges performed. Security foundations established at M1 directly enable smooth M2 progress because a well-secured implementation is less prone to API failures and data integrity issues.
Milestone 3 (M3) - Scale and Impact
M3 measures the broader impact of the organization's ABDM participation at scale - the number of patients served, the depth of health record interoperability achieved, and the contribution to the national health data ecosystem. Organizations that rush through M1 with minimum compliance often encounter compounding technical debt at M3 scale.
The ABDM Sandbox Environment and WASA
A critical operational requirement: ABDM M1 WASA testing is conducted on the ABDM sandbox environment - not on production. The sandbox replicates the production ABDM gateway, allowing realistic API testing without exposing real patient data. Your organization must have sandbox credentials, test ABHA IDs, and a functioning sandbox integration before WASA testing can commence. Engage your auditor early to confirm sandbox readiness - assessment timelines cannot begin until the sandbox environment is stable and testable.
4. Functional Testing vs Security Testing in WASA - What NHA Expects
One of the most important things to understand about ABDM M1 WASA testing is that it has two distinct and equally important dimensions: functional testing and security testing. Many organizations focus exclusively on security and are surprised when WASA findings include functional failures. NHA requires both because both types of failure create real-world risk to the patient data ecosystem.
Functional Testing - Correctness of ABDM Implementation
Verifies that every ABDM API flow works as NHA specifies:
- ABHA creation and verification flows complete correctly
- Care context discovery returns accurate patient records
- Consent request, grant, and revoke flows follow the ABDM consent protocol
- Health record fetch delivers correctly structured FHIR bundles
- Health record push validates document type, format, and timestamps
- Subscription and notification flows deliver events reliably
- Error handling returns appropriate responses and codes
- Edge cases (expired consent, partial data, network failures) handled gracefully
Security Testing - Protection of Patient Data
Verifies that the application and its ABDM integrations are secure against attack:
- OWASP Top 10 vulnerability assessment of the application
- ABHA OTP bypass and enumeration attempts
- Consent artefact forgery and replay attack testing
- API authentication and authorization bypass testing
- IDOR (Insecure Direct Object Reference) on patient record APIs
- FHIR injection and XML entity attack testing
- TLS configuration and data encryption validation
- Session management and token security review
- Business logic abuse scenarios for consent and record access
The key insight for development teams is that fixing security vulnerabilities and fixing functional gaps require different skills and different timelines. Security vulnerabilities are often quicker to fix once identified - a missing rate limit, an unparameterized query, or an insecure header can be patched in days. Functional gaps - incorrect FHIR resource structures, missing consent artefact validation, or broken demographic matching - may require architectural changes that take weeks. Plan your pre-WASA remediation timeline accordingly, and share an early audit gap report with your development team as soon as possible.
5. Complete ABDM M1 WASA Testing Scope and Checklist
Use this checklist as a pre-WASA readiness assessment. Every item below is evaluated during a formal ABDM M1 WASA engagement.
1. ABHA ID Management Flows
- ABHA creation via Aadhaar OTP and mobile OTP - functional validation and OTP security testing
- ABHA address (username) creation, uniqueness validation, and format correctness
- ABHA verification - PHR address resolution against ABDM gateway
- ABHA profile retrieval - demographic data accuracy and completeness
- ABHA linking at HIP - demographic matching correctness and anti-spoofing controls
- ABHA deactivation / KYC flows where applicable
Security focus: OTP brute force, enumeration, ABHA number prediction, rate limiting absence
2. Consent Flow Implementation
- HIU initiates consent request with correct purpose, date range, and Hi-types specified
- Consent request delivered to patient's PHR application correctly
- Patient grants consent - consent artefact generated, signed, and delivered to HIU
- Patient revokes consent - consent artefact invalidated and health data access terminated
- Consent expiry enforcement - data access denied after consent expiry
- Purpose-based access control - Hi-types not covered by consent cannot be fetched
- Multiple consent request handling - correct prioritization and artefact management
Security focus: Consent bypass, artefact replay, purpose scope violation, expired consent abuse
3. Health Record Fetch and Push APIs
- HIU initiates health data request with valid consent artefact
- HIP receives data request, validates consent artefact authenticity and scope
- FHIR bundle construction - correct resource types, coding systems, and references
- Data transfer encryption - health data encrypted in transit using ABDM-specified keys
- Health record push - HIP pushes records correctly on patient data access events
- Document type validation - DiagnosticReport, Prescription, OPConsultation, DischargeSummary, etc.
- Data availability callback - HIP acknowledges data push with correct response codes
Security focus: Access without valid consent, FHIR injection, data integrity tampering, malformed payload handling
4. ABDM Gateway Authentication and Token Security
- Client credential flow (OAuth 2.0) - correct implementation and token refresh
- Access token scope validation - tokens cannot be used beyond granted permissions
- Token expiry enforcement - expired tokens rejected by all API endpoints
- Client secret storage - not hardcoded, not in logs, not in version control
- ABDM gateway session management - session termination on logout
- API key rotation procedures - documented and tested
Security focus: Token leakage in logs/responses, token replay, insecure secret storage, privilege escalation via scope manipulation
5. Data Encryption and Transmission Security
- TLS 1.2 minimum enforced for all API endpoints - TLS 1.0/1.1 disabled
- ABDM-specified end-to-end encryption for health data payloads
- Certificate validity and trust chain correctness
- Health data at rest - encrypted with appropriate key management
- No sensitive data in URL parameters or query strings
- Appropriate cache-control headers preventing sensitive data caching
- Secure headers - HSTS, X-Frame-Options, CSP, X-Content-Type-Options
6. OWASP Top 10 Security Assessment
- Injection (SQL, NoSQL, FHIR, XML) - parameterized queries and input validation
- Broken authentication - MFA for administrative access, secure login controls
- Sensitive data exposure - no PII/PHI in logs, error messages, or API responses
- XML External Entity (XXE) attacks - FHIR XML parser hardening
- Broken access control - IDOR on patient records, unauthorized API access
- Security misconfiguration - directory listing, default credentials, debug mode
- Cross-Site Scripting (XSS) - reflected and stored XSS in patient-facing interfaces
- Insecure deserialization - object injection in API payloads
- Using components with known vulnerabilities - dependency scanning
- Insufficient logging and monitoring - audit trails for health data access
7. Mobile Application Security (Where Applicable)
- ABHA SDK integration review - correct API usage and token handling
- Local data storage - no sensitive health data in plaintext local storage
- Certificate pinning - prevents MITM interception of ABDM API traffic
- Deep link handling - ABHA deep links cannot be intercepted by malicious apps
- Intent and IPC security - patient health data not leaked via Android intents
- Reverse engineering resistance - appropriate code obfuscation applied
- Keystore usage - sensitive keys stored in Android Keystore / iOS Secure Enclave