<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Vulnerability Assessment/Reports in Member Support</title>
    <link>https://community.isc2.org/t5/Member-Support/Vulnerability-Assessment-Reports/m-p/2130#M221</link>
    <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for your help!&lt;/P&gt;</description>
    <pubDate>Sun, 29 Oct 2017 18:46:56 GMT</pubDate>
    <dc:creator>JJordan</dc:creator>
    <dc:date>2017-10-29T18:46:56Z</dc:date>
    <item>
      <title>Vulnerability Assessment/Reports</title>
      <link>https://community.isc2.org/t5/Member-Support/Vulnerability-Assessment-Reports/m-p/1903#M203</link>
      <description>Would anyone out there have a vulnerability assessment/report they could provide to me so I can get a better understanding of what information, format and the length one should contain?&lt;BR /&gt;&lt;BR /&gt;Thank you,&lt;BR /&gt;Justin Jordan</description>
      <pubDate>Sun, 29 Oct 2017 14:40:09 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Member-Support/Vulnerability-Assessment-Reports/m-p/1903#M203</guid>
      <dc:creator>JJordan</dc:creator>
      <dc:date>2017-10-29T14:40:09Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Assessment/Reports</title>
      <link>https://community.isc2.org/t5/Member-Support/Vulnerability-Assessment-Reports/m-p/1909#M205</link>
      <description>&lt;P&gt;i think maybe you can find a good information in google about it and can find good samples&lt;/P&gt;&lt;P&gt;take a look at this one and you can find many others:&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.giac.org/paper/gcux/241/public-servers-vulnerability-assessment-report/101868" target="_blank"&gt;https://www.giac.org/paper/gcux/241/public-servers-vulnerability-assessment-report/101868&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 29 Oct 2017 14:46:24 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Member-Support/Vulnerability-Assessment-Reports/m-p/1909#M205</guid>
      <dc:creator>Anonymous</dc:creator>
      <dc:date>2017-10-29T14:46:24Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Assessment/Reports</title>
      <link>https://community.isc2.org/t5/Member-Support/Vulnerability-Assessment-Reports/m-p/1927#M207</link>
      <description>Honestly there are many formats, but one things to keep in mind is what scoring type you use or want. My advice is to use one that matches what you use in your risk management program. Using government NIST for example then use CVSS model. Many of the main line vulnerability scanning softwares out there allow you to set preferences on reporting and provide different types of report formats, PDF, CSV, and excel as examples . Hope that helps?</description>
      <pubDate>Sun, 29 Oct 2017 15:03:16 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Member-Support/Vulnerability-Assessment-Reports/m-p/1927#M207</guid>
      <dc:creator>Wvipersg</dc:creator>
      <dc:date>2017-10-29T15:03:16Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Assessment/Reports</title>
      <link>https://community.isc2.org/t5/Member-Support/Vulnerability-Assessment-Reports/m-p/1930#M208</link>
      <description>&lt;P&gt;I've found it useful to have a go with one of the scanners as this will give you an actual live report.&amp;nbsp; Openvas is a free one that you can download and will just require a virtual machine to get started.&amp;nbsp; GFI Languard and Nessus offer 30 day + evaluations to have a go with a paid product.&amp;nbsp; The report results differ with the type of device and scan you perform.&amp;nbsp; What are you wanting to do a report on?&lt;/P&gt;</description>
      <pubDate>Sun, 29 Oct 2017 15:04:17 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Member-Support/Vulnerability-Assessment-Reports/m-p/1930#M208</guid>
      <dc:creator>robinfoprotech</dc:creator>
      <dc:date>2017-10-29T15:04:17Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Assessment/Reports</title>
      <link>https://community.isc2.org/t5/Member-Support/Vulnerability-Assessment-Reports/m-p/1933#M209</link>
      <description>&lt;P&gt;Appendix K of the&amp;nbsp;&lt;A title="NIST SP 800-30 Rev-1" href="http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-30r1.pdf" target="_self"&gt;NIST Guide for Conducting Risk Assessments&lt;/A&gt;&amp;nbsp;provides with a list of potentially all the information that your report should include. The length of the report is dependent on&amp;nbsp;your writing style but should be long enough to cover the requirements that you are seeking to fulfill and with enough detail to show that you know what you are talking about.&lt;/P&gt;</description>
      <pubDate>Sun, 29 Oct 2017 15:05:54 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Member-Support/Vulnerability-Assessment-Reports/m-p/1933#M209</guid>
      <dc:creator>chuckers</dc:creator>
      <dc:date>2017-10-29T15:05:54Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Assessment/Reports</title>
      <link>https://community.isc2.org/t5/Member-Support/Vulnerability-Assessment-Reports/m-p/1954#M212</link>
      <description>&lt;P&gt;If you are looking for a scan report then these are some the items the report should have.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Executive Summary (This should list the findings based off risk rating usually 1-5 - 5 being most severe)&lt;/LI&gt;&lt;LI&gt;Discovered Assets/Hosts&lt;/LI&gt;&lt;LI&gt;Open Ports&lt;/LI&gt;&lt;LI&gt;Threat Summary and Mitigation per host&lt;/LI&gt;&lt;LI&gt;Differential Report (If you want to compare the report to a previous report)&lt;/LI&gt;&lt;/OL&gt;</description>
      <pubDate>Sun, 29 Oct 2017 15:17:09 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Member-Support/Vulnerability-Assessment-Reports/m-p/1954#M212</guid>
      <dc:creator>ciphercodes</dc:creator>
      <dc:date>2017-10-29T15:17:09Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Assessment/Reports</title>
      <link>https://community.isc2.org/t5/Member-Support/Vulnerability-Assessment-Reports/m-p/2004#M217</link>
      <description>You can run one using Qualys on an IP that you own and see the type of information provided. Not sure if you were referring to a completed report with risk assessment. That would depend on risk profile and business as others have eluded.</description>
      <pubDate>Sun, 29 Oct 2017 15:59:29 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Member-Support/Vulnerability-Assessment-Reports/m-p/2004#M217</guid>
      <dc:creator>BloomingOnion</dc:creator>
      <dc:date>2017-10-29T15:59:29Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Assessment/Reports</title>
      <link>https://community.isc2.org/t5/Member-Support/Vulnerability-Assessment-Reports/m-p/2006#M218</link>
      <description>&lt;P&gt;I am assuming its a VA/PT report , not VA alone . I suggest to refer to some sample reports from EC-Council , OWASP &amp;amp; SANS.org .&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please refer to link below .&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.offensive-security.com/reports/sample-penetration-testing-report.pdf" target="_blank"&gt;https://www.offensive-security.com/reports/sample-penetration-testing-report.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With Regards ,&lt;/P&gt;&lt;P&gt;Mdevaraj&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 29 Oct 2017 16:01:20 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Member-Support/Vulnerability-Assessment-Reports/m-p/2006#M218</guid>
      <dc:creator>Mdevaraj</dc:creator>
      <dc:date>2017-10-29T16:01:20Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Assessment/Reports</title>
      <link>https://community.isc2.org/t5/Member-Support/Vulnerability-Assessment-Reports/m-p/2010#M219</link>
      <description>&lt;P&gt;PT is a next&amp;nbsp;or further step to VA , other way to explain is , VA is the first step to PT .&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 29 Oct 2017 16:02:55 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Member-Support/Vulnerability-Assessment-Reports/m-p/2010#M219</guid>
      <dc:creator>Mdevaraj</dc:creator>
      <dc:date>2017-10-29T16:02:55Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Assessment/Reports</title>
      <link>https://community.isc2.org/t5/Member-Support/Vulnerability-Assessment-Reports/m-p/2129#M220</link>
      <description>&lt;P&gt;Thank you for your help!&lt;/P&gt;</description>
      <pubDate>Sun, 29 Oct 2017 18:46:34 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Member-Support/Vulnerability-Assessment-Reports/m-p/2129#M220</guid>
      <dc:creator>JJordan</dc:creator>
      <dc:date>2017-10-29T18:46:34Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Assessment/Reports</title>
      <link>https://community.isc2.org/t5/Member-Support/Vulnerability-Assessment-Reports/m-p/2130#M221</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for your help!&lt;/P&gt;</description>
      <pubDate>Sun, 29 Oct 2017 18:46:56 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Member-Support/Vulnerability-Assessment-Reports/m-p/2130#M221</guid>
      <dc:creator>JJordan</dc:creator>
      <dc:date>2017-10-29T18:46:56Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Assessment/Reports</title>
      <link>https://community.isc2.org/t5/Member-Support/Vulnerability-Assessment-Reports/m-p/2239#M224</link>
      <description>&lt;P&gt;The Defense Security Service has an actual template that you can use located at URL:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.dss.mil/documents/rmf/Risk_Assessment_Report-Template_Sept_2016.docx" target="_blank"&gt;www.dss.mil/documents/rmf/Risk_Assessment_Report-Template_Sept_2016.docx&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This template is consistent with &lt;FONT face="Times New Roman, serif"&gt;&lt;FONT size="3"&gt;guidelines outlined in the &lt;/FONT&gt;&lt;/FONT&gt;&lt;FONT face="Times New Roman, serif"&gt;&lt;FONT size="3"&gt;&lt;I&gt;NIST SP 800-30, Guide for Conducting Risk Assessments&lt;/I&gt;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 29 Oct 2017 21:44:30 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Member-Support/Vulnerability-Assessment-Reports/m-p/2239#M224</guid>
      <dc:creator>Frank_Mayer</dc:creator>
      <dc:date>2017-10-29T21:44:30Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Assessment/Reports</title>
      <link>https://community.isc2.org/t5/Member-Support/Vulnerability-Assessment-Reports/m-p/2271#M227</link>
      <description>&lt;P&gt;JJordan,&amp;nbsp;&lt;/P&gt;&lt;P&gt;I know you are looking for a sample report and I think some of the responses have pointed you in the right direction.&amp;nbsp; However, when creating your report keep the following things in mind:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. Know your audience.&amp;nbsp; This will guide you in your writing style and whether you should be super detailed or give the executive message.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. Identify the message you are trying to convey and shape your report accordingly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;3. Align your report to the business.&amp;nbsp; (I believe you should highlight risks associated with systems with the most value (check the BIA) and those with the most exposure (DMZ hosts).&amp;nbsp; Protect your crown jewels.)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;4. Keep the report as short as possible.&amp;nbsp; If a lot of details are required, then add it to a secondary report.&amp;nbsp; Most people will not read a long report.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;5. Ensure you have established metrics for your program so management and administrators know who well they are executing.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 29 Oct 2017 23:20:01 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Member-Support/Vulnerability-Assessment-Reports/m-p/2271#M227</guid>
      <dc:creator>DGreen</dc:creator>
      <dc:date>2017-10-29T23:20:01Z</dc:date>
    </item>
  </channel>
</rss>

