Professional Documents
Culture Documents
Summary report
Prepared by
Information Security – Risk Department
This document is classified as "Confidential” and remains the propriety of (Organization Name) only. If
you are not the intended recipient of this document then you should not copy/use for any purpose, nor
disclose its contents to any person. You should contact (Organization Name) to take the appropriate
action.
Introduction
As a part of Cyber security program for ( Organization Name), and to fulfill (regulatory
body name) requirements, (Organization Name) has conducted cyber security scanning
for all (Organization Name) network . Even though (Organization Name) has conducted a lot
of security scans before, this type of scanning considered the most aggressive and
deepest one.
This scan has been conducted (date/year), results have been verified by IT
department administrators, efforts already done during gaps closure and still in
progress to mitigate the reported vulnerabilities, however some vulnerabilities
mitigation plans are either relevant to upgrade/replacement projects or applying
needed patches/updates.
As the vulnerability scanning should be carried out regularly, next scanning run, as
scheduled will be (date), a comparison progress report will be provided accordingly.
2. Overall Dashboard
Low, 936, 3%
High
Medium
Low
Low, 186, 6%
Critical, 289,
10%
AIX/Redhat
Medium, 1356,
46% High, 1115, 38%
Medium, 2300,
Window 26%
s
Servers High, 5527, 63%
Critical, 22, 3%
Low, 240, 31%
Medium, 263,
34%
Networ
k High, 249, 32%
Devices
Medium, 1543,
10%
Critical, 2223,
Workstations 15%
(samples)
High, 10924,
74%
Low, 6, 1%
Critical, 21, 4%
Medium, 91,
17%
ATMs
(samples)