Results

Ref Feature Name Description
D1 Manual Report The tool permits the user to generate a report after the simulation ends
D2 Automatic Report The tool automatically generates one or more reports after the simulation
D3 Automatic Report Sending The tool can be configured to automatically generate reports and send them to specific users thanks to mail, ticketing systems or other integrations
D4 Role based Reports The tool generates reports with different styles based on the receivers' role
D5 Analytics The tool returns the analytics of the simulation with a parsable format or offers an API to do use them
D6 Results Filtering The tool's GUI permits filtering the results
D7 Framework-Based Results The tool maps the results to a specific framework or convention
D8 System Response The report categorises in different levels how the system responded to the various activities of the simulation
D9 System Vulnerability Levels The tool offers a quantitative evaluation of how much the system is vulnerable to each activity performed during the simulation
D10 Targets Vulnerability Levels The tool offers a quantitative evaluation of how much each target is vulnerable to each activity performed during the simulation
D11 System Overall Vulnerability Level The tool offers a quantitative evaluation of how much the system is vulnerable based on the simulation result
D12 Targets Overall Vulnerability Level The tool offers a quantitative evaluation of how much the system is vulnerable based on the simulation result
D13 System Risk Levels The tool delivers a quantitative evaluation of the risk level to the system resulting from the activities simulated
D14 Targets Risk Levels The tool offers a quantitative evaluation of how high the risk for each target resulting from the activities simulated
D15 System Overall Risk Level The tool offers a quantitative evaluation of how high the risk is for the system based on the simulation result
D16 Targets Overall Risk Level The tool offers a quantitative evaluation of how high the risk is for each target based on the simulation result
D17 Vulnerabilities Visualization The tool permits to graphically visualize the system's vulnerabilities in a meaningful way
D18 Threat Grouping The tool groups the threats discovered during the simulation in a specific way
D19 Attack Path Visualization The tool enables graphical visualization of the attack path of the simulation, displaying the sequence of steps performed
D20 Discovered Targets If the simulation involved lateral movement, the tool provides the list of discovered targets from the initial breach point in which the attack has started
D21 Compromised Targets If the simulation involved lateral movement, the tool provides the list of discovered targets that permitted the simulation to run activities on their systems
D22 Lateral Movement Visualization If the simulation involved lateral movement, the tool visually represents how the at- tacker performed it
D23 Benchmark The report provides a benchmark of customer readiness in comparison with the other competitors within the same industry
D24 Mitigation insights The result contains suggestions on how to fix the discovered vulnerabilities and security problems
D25 Comparison The tool permits to perform a comparison of the simulation's result with previous ones.
D26 Integration Comparison The tool permits performing a comparison of the various system's security integrations effectiveness
D27 Live Results The tool can generate results and reports during the simulation execution
D28 Outputs The tool is capable of collecting the outputs of the activities' commands and adding them as part of the resultss
D29 Logs The tool can collect the system logs related to the simulation's activities.

This section outlines the features that describe the type of simulation results presented and how they are displayed. An effective tool offers a clear understanding of how the system responds to the simulation, which targets are more vulnerable and which activities represent the highest risk for the system. It is important to provide as much information as possible and permit the user to filter and visualize only the ones that he considers useful. Another key aspect of BAS analyzed in this section is whether the tool offers users suggestions on how to fix vulnerabilities
Information > < Attack