Learn by Directing AI
All materials

report-template.md

Security Assessment Report -- Gintaro Kelias

Prepared for: Ruta Kazlauskiene, Owner and Creative Director Date: [Assessment date] Assessor: [Your name/identifier]


Executive Summary

[2-3 paragraphs addressing Ruta's core question: did someone actually get into the system, or was the phishing email just a copy of the branding? Summarize the overall security posture of the online store. Use language Ruta would understand -- no technical jargon. State the most critical findings and what has been done to fix them.]


Findings Summary

ID Title Severity Status Impact
F-01 [Finding title] [Critical/High/Medium/Low/Info] [Fixed/Mitigated/Reported] [One-line business impact]
F-02 [Finding title] [Critical/High/Medium/Low/Info] [Fixed/Mitigated/Reported] [One-line business impact]
F-03 [Finding title] [Critical/High/Medium/Low/Info] [Fixed/Mitigated/Reported] [One-line business impact]

Findings are ordered by severity -- the most urgent issues appear first.


Finding Details

F-01: [Finding title]

Severity: [Critical/High/Medium/Low/Info] Status: [Fixed/Mitigated/Reported]

What was found: [Describe the vulnerability in terms Ruta would understand. What could an attacker do?]

Why it matters for your customers: [Explain the business impact -- how does this affect Ruta's customers, her business reputation, or her legal obligations?]

Evidence: [Describe the specific evidence that confirms this vulnerability. What tool was used, what was the result?]

What was done to fix it: [Describe the remediation action taken.]

Verification: [Describe how the fix was verified -- what test was re-run, and what was the result?]


F-02: [Finding title]

[Same structure as F-01]


F-03: [Finding title]

[Same structure as F-01]


Hardening Actions

Action What it prevents Verification
[Action taken] [What attack class this protects against, in plain language] [How it was verified]

Recommendations

These are actions Ruta should take after the assessment, ordered by priority.

  1. [Highest priority recommendation] -- [Why this matters and what to do]
  2. [Next priority] -- [Why this matters and what to do]
  3. [Additional recommendation] -- [Why this matters and what to do]

Scope and Methodology

Scope: [Reference the scope document -- what was tested and what was excluded]

Tools used: [List the tools used during the assessment]

Testing period: [Dates of the assessment]

Limitations: [Any constraints that affected the assessment -- e.g., production availability requirements]