From outside, verifying the services exposed on the internet
From inside the customer network
Intended for the Customer's executive staff, it provides strategic and easy to read directions on security situation found as a result of analysis.
This is the formal documentation concerning executed tests and reports in detail results of work done, technical details and most significant evidence.
A document that formalize all the vulnerabilities detected during the Ethical Hacking, providing an useful tool for resolution of critical issues.