Learn by Directing AI
All materials

assessment-report-template.md

Security Assessment Report

Executive Summary

Write for Andres -- he needs to understand this and relay it to the Portland buyer. Business language only. No unexplained technical terms.

What was assessed:

What was found:

What was done:

What needs to happen next:

Priority recommendations (top 3): 1. 2. 3.

Compliance Evidence

This section is what the Portland buyer's supply chain compliance team reviews.

Assessment Methodology

Assessment dates: Scope: Tools used: Approach: Standards referenced:

Findings Summary

Finding ID Severity Description Status Remediation

Status definitions:

  • Remediated -- vulnerability fixed and verified
  • Compensating Control -- alternative control in place, full fix planned
  • Recommended -- fix identified, not yet implemented

Detection Capabilities

Summary of detection rules deployed during the assessment. Demonstrates ongoing monitoring capability.

Rule Covers Status

Technical Findings

One subsection per finding. Each includes enough detail for the Caracas developer to implement remaining fixes.

Finding [ID]: [Title]

Severity: System: Description:

Evidence:

Impact:

Remediation:

Rollback Procedure:

Compensating Control (if applicable):

Appendices

A. Tool Output

Relevant tool output excerpts supporting the findings.

B. Detection Rules Deployed

Full Sigma rule definitions for rules deployed during the assessment.

C. Remediation Risk Assessments

Risk assessment for each complex remediation, including dependency analysis and rollback procedures.