Following the completion of each step in the vulnerability assessment process,
the security team will analyse the data and compile the final report by
reviewing the findings. During this stage, the security team will make an
effort to reveal any vulnerabilities that they have found, record any changes
and discoveries, and incorporate all of this information, along with remedial
measures to reduce any risks that have been found, into the final report.
The vulnerability report must cover the following elements:
- Scan information: Provides information such as the name of the scanning tool, its version, and the network ports to be scanned.
- Target Information: Contains information about the target system's name and address.
- Results: Complete scanning reports containing subtopics such as target, services, vulnerability, classification, and assessment.
- Target: Includes each host's detailed information and contains the following information:
- <Node>: Contains the name and address of the host
- <OS>: Shows the operating system type
- <Date>: Gives the date of the test
- Services: Defines the network services by their names and ports
- Classification: Allows the system administrator to obtain additional information about the scan, such as its origin.
- Assessment: Provides information regarding the scanner's assessment of discovered vulnerabilities.
The vulnerability assessment report must include, but is not limited to,
the following points:
- The vulnerability's name and its mapped CVE ID
- The date of discovery
- The score is based on Common Vulnerabilities and Exposures (CVE) databases
- A detailed description of the vulnerability
- The impact of the vulnerability
- Details regarding the affected systems
- Details regarding the process needed to correct the vulnerability, including information patches, configuration fixes, and ports to be blocked.
- A proof of concept (PoC) of the vulnerability of the system (if possible)
The vulnerability assessment reports are classified into two types:
Security Vulnerability Report
This is a combined report for all the scanned devices and servers in the
organization's network. The security vulnerability report includes the
following details:
- Newly found vulnerabilities
- Open ports are detected services
- Suggestion for remediation
- Links to patches
Security Vulnerability Summary
This report is produced for every device or server after scanning. It gives a
summary of the scan result that includes the following elements:
- Current security flaws
- Categories of vulnerabilities
- Newly detected security vulnerabilities
- The severity of vulnerabilities
- Resolved vulnerabilities
You might be interested in,
- Phases of Hacking
- Introduction to Vulnerability Assessment
- Vulnerability Management and Assessment Phases
- Vulnerability Classification
- Vulnerability Assessment Types
- Vulnerability Assessment Solutions and Tools
We hope this helps. If you have any suggestions or doubts you can add a
comment and we will reply as soon as possible.
No comments:
Post a Comment