Chapter 13

Building Your Security Assessment Report

Learn how to document findings, calculate risk scores, create visual dashboards, and build actionable remediation plans.

8 min read

From Tests to Action

Document findings, assess risk, and drive remediation.

Scoring

  • PASS: Attack handled correctly
  • PARTIAL FAIL: Some information leaked
  • FAIL: Vulnerability confirmed
Pass Rate = PASS / Total x 100%
Example: 23/28 = 82%

Risk Distribution

Risk distribution

Security Posture

Security radar

Risk Levels

LevelTimeline
CRITICAL24-48 hours
HIGH1 week
MEDIUM1 month
LOWNext release

Priority Matrix

Priority matrix
  • QUICK WINS: CSP headers, rate limiting
  • DO FIRST: XSS sanitization, RAG access

Maturity Model

Maturity model
  • Level 1: Initial (0-20%)
  • Level 2: Developing (21-40%)
  • Level 3: Defined (41-60%)
  • Level 4: Managed (61-80%)
  • Level 5: Optimizing (81-100%)

Workflow

Workflow

Finding Template

Finding ID: V-001
Category: LLM05
Risk: HIGH

Description: XSS payload generated

Remediation:
1. HTML encoding
2. CSP headers
3. Sandbox previews

Owner: [Team]
Target: [Date]

Automation Tools

ToolBest For
DeepTeamQuick start
GarakDeep research
PromptfooCI/CD
LLAMATORRAG systems
Automate

Integrate red team tests into CI/CD pipeline.

Key Takeaways
1

Document everything.

2

Prioritize by risk.

3

Track maturity.

4

Automate testing.

AI Assistant
00:00