D1 |
Manual Report |
The tool permits the user to generate a report after the simulation ends
|
D2 |
Automatic Report |
The tool automatically generates one or more reports after the simulation |
D3 |
Automatic Report Sending |
The tool can be configured to automatically generate reports and send them to specific
users thanks to mail, ticketing systems or other integrations |
D4 |
Role based Reports |
The tool generates reports with different styles based on the receivers' role |
D5 |
Analytics |
The tool returns the analytics of the simulation with a parsable format or offers an
API to do use them |
D6 |
Results Filtering |
The tool's GUI permits filtering the results |
D7 |
Framework-Based Results |
The tool maps the results to a specific framework or convention |
D8 |
System Response |
The report categorises in different levels how the system responded to the various
activities of the simulation |
D9 |
System Vulnerability Levels |
The tool offers a quantitative evaluation of how much the system is vulnerable to each
activity performed during the simulation |
D10 |
Targets Vulnerability Levels |
The tool offers a quantitative evaluation of how much each target is vulnerable to each
activity performed during the simulation |
D11 |
System Overall Vulnerability Level |
The tool offers a quantitative evaluation of how much the system is vulnerable based
on the simulation result |
D12 |
Targets Overall Vulnerability Level |
The tool offers a quantitative evaluation of how much the system is vulnerable based
on the simulation result |
D13 |
System Risk Levels |
The tool delivers a quantitative evaluation of the risk level to the system resulting from
the activities simulated |
D14 |
Targets Risk Levels |
The tool offers a quantitative evaluation of how high the risk for each target resulting
from the activities simulated |
D15 |
System Overall Risk Level |
The tool offers a quantitative evaluation of how high the risk is for the system based
on the simulation result |
D16 |
Targets Overall Risk Level |
The tool offers a quantitative evaluation of how high the risk is for each target based
on the simulation result |
D17 |
Vulnerabilities Visualization |
The tool permits to graphically visualize the system's vulnerabilities in a meaningful
way |
D18 |
Threat Grouping |
The tool groups the threats discovered during the simulation in a specific way |
D19 |
Attack Path Visualization |
The tool enables graphical visualization of the attack path of the simulation, displaying
the sequence of steps performed |
D20 |
Discovered Targets |
If the simulation involved lateral movement, the tool provides the list of discovered
targets from the initial breach point in which the attack has started |
D21 |
Compromised Targets |
If the simulation involved lateral movement, the tool provides the list of discovered
targets that permitted the simulation to run activities on their systems |
D22 |
Lateral Movement Visualization |
If the simulation involved lateral movement, the tool visually represents how the at-
tacker performed it |
D23 |
Benchmark |
The report provides a benchmark of customer readiness in comparison with the other
competitors within the same industry |
D24 |
Mitigation insights |
The result contains suggestions on how to fix the discovered vulnerabilities and security
problems |
D25 |
Comparison |
The tool permits to perform a comparison of the simulation's result with previous ones. |
D26 |
Integration Comparison |
The tool permits performing a comparison of the various system's security integrations
effectiveness |
D27 |
Live Results |
The tool can generate results and reports during the simulation execution |
D28 |
Outputs |
The tool is capable of collecting the outputs of the activities' commands and adding
them as part of the resultss |
D29 |
Logs |
The tool can collect the system logs related to the simulation's activities. |