Stakeholders

Stakeholders % of pentest Report
Technical Stakeholders 70-90% of pentest report aimed towards this audience
Security Stakeholders 10-20% of pentest report aimed towards this audience
Business Stakeholders 5-10% of pentest aimed towards

Sections of the report

Section Target Audience
Summary Business & Security Stakeholders
Vulnerability Write-ups Technical Stakeholders
Appendices Security Stakeholders

Skeleton of the report

Putting all of the above:

| Sections | Content | %of report | Target Audience/Stakeholder | | --- | --- | --- | --- | | Section-1 | Summary | 5-10% | Business + Security | | Section-2 | Vulnerability Write-ups | 70-90% | Technical | | Section-3 | Appendices | 10-20% | Security |

Report Section 1: Summary

Although the summary typically appears at the start of the report, it is written last because it is difficult to write it without completing other sections of the report first.

Summary Structure

Summary of a Summary

Break down summary into the following two parts, if a single summary can’t meet the needs of business as well as security stakeholders:

Report Section 2: Vulnerability Write-Ups

The largest section of the report.

Structure of a Good Write-UP

Report Section 3: Appendices

Thinks of appendices as audit trail.

It shows the work done, backs up findings, allows for informed follow-ups, long after the initial assessment is over.

Appendices don’t usually follow a particular format, but at least include the following two appendices always.

Assessment Scope

Assessment Artefacts