Cybersecurity recipe
Vuln Assessment
3 critical, 7 high. Scan signed.
What it does
Signs the scan scope, tool version, findings list, severity counts, and assessment date. When a finding is disputed or remediation is claimed, the original signed assessment is the baseline everyone works from.
Who this is for
Penetration testers and vulnerability management teams delivering assessment results to clients or compliance officers.
Lives in
This recipe belongs to the Cybersecurity domain — Every threat, every response — signed and proven.