Cybersecurity recipe

Vuln Assessment

3 critical, 7 high. Scan signed.

What it does

Signs the scan scope, tool version, findings list, severity counts, and assessment date. When a finding is disputed or remediation is claimed, the original signed assessment is the baseline everyone works from.

Who this is for

Penetration testers and vulnerability management teams delivering assessment results to clients or compliance officers.

Lives in

This recipe belongs to the Cybersecurity domain — Every threat, every response — signed and proven.

Related recipes in Cybersecurity