Sunteți pe pagina 1din 3

PENETRATION

TESTING REPORT
TEMPLATE
REVIEWED BY:

APPROVED BY:

VERSION: DATE:
[Usage Details]

Change history
Date Version Owner Change Description

Table of contents
1. PURPOSE............................................................................................................................................... 3

2. SUMMARY............................................................................................................................................ 3

3. PROJECT DETAILS / SCOPE...................................................................................................................... 3

4. COMPANY INFORMATION...................................................................................................................... 3

5. REFERENCE DOCUMENTS....................................................................................................................... 3

6. FINDINGS.............................................................................................................................................. 3

7. DISCLAIMER.......................................................................................................................................... 3

Penetration Testing Report Powered by Responsible Cyber Pte. Ltd. & Peerlyst version Page 2 of 3
[Usage Details]

1. Purpose
The purpose of this document is to establish a security review.

2. Summary
The Summary describes the details of the project and engagement terms, as well the findings. A good
summary should include a subject matter, methods of analysis, findings, conclusions,
recommendations, and limitations of the report.

3. Project Details / Scope


The project details describe the project approach and the process used according to the defined
scope. The scope defines the penetration testing scope, for example, WiFi Network Security
Penetration Testing on the Corporate Wireless Network in the Office Region 1.

4. Company Information
Company information includes the company details, with the team as well and their qualifications.

5. Reference documents
OWASP Best Practices (Example)

6. Findings

Findings Descriptio Details Severity Recommendations


n

7. DISCLAIMER
This document is confidential and only for use by the company receiving this information from
[Company].

Penetration Testing Report Powered by Responsible Cyber Pte. Ltd. & Peerlyst version Page 3 of 3

S-ar putea să vă placă și