Methodology used

This subsection of the report should contain the methodology the penetration tester followed during the security assessment. It's better to show this process using a diagram and explain each process to the client so that the technical team on the client side will know how their organizational assets are being tested. 

Whether the penetration tester follows the NIST-800 standard, the PTES standard, or their own company's standard, they have to explain the process in this subsection. 

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.138.175.180