Overview of Reports
After a scan is complete, you can generate a report on Acunetix 360 to provide you with information on the scan results in summary or detailed form, as well as vulnerability details. There are many types of reports, such as built-in reports, report templates, lists and custom reports. Acunetix 360 also enables you to generate statistical reports, troubleshoot inconsistent scan results and create a custom report policy.
For further information, see Built-In Reports, Reports Templates and Lists.
Why Do We Need Reports?
Web security scanning is of no value unless scan reports are generated. Acunetix 360 sends the right reports to the right audience. Reports provide evidence that a web application security scan has taken place and is completed. Reports are able to give different types and levels of users all the information they need about the related scan:
- Support departments need reports to enable them to focus on discovered vulnerabilities and anticipate client needs
- Directors need reports to enable them to provide evidence of compliance for councils and other legislative bodies
- Managers need management reports to enable them to understand the potential business implications, so that they can prioritize the fixing of issues
- Developers need technical reports to enable them to start fixing each issue and vulnerability
For further information, see Executive Summary Report, Technical Report, and Trend Matrix Report.
Reports Help You Meet Compliance Regulations
Whether your organization needs to meet ISO 27001, PCI DSS, HIPAA or the standards of other compliance and regulation bodies, reports help you to identify the areas in which your web application falls short.
But it is also important for organizations to develop their own data security standards and information security policies. For some regulations – such as PCI DSS – it is essential to do quarterly scans. By creating reports, you can observe and record the changes in security improvements that your organization makes in each quarter. That way, you can continue working toward meeting the requirements.
For further information, see HIPAA Compliance Report, ISO 27001 Compliance Report, OWASP Top Ten 2013 Report, OWASP Top Ten 2017 Report and PCI DSS Compliance Report.
Reports Help You Fix Issues
Once the scan has finished, Acunetix 360 will send you an email with a summary of the results. This provides you with a basic overview of the issues and vulnerabilities that Acunetix 360 has discovered. If you want detailed information for each issue, you need to generate the relevant report.
Reports are important for learning about the actions that need to be taken for each issue. In this way, you can begin to solve each issue in order to make your web applications more secure. Reports can also help you keep track of your developers’ productivity and capabilities, ensuring that no vulnerability reaches your Live environments.
Acunetix 360 has a huge vulnerability database that gives information on the Impact, Actions to Take, Remedy, References, Classification, CVSS Score and Proof of Concept or Proof of Exploit for each issue.
For further information, see Detailed Scan Report, Knowledge Base Report and Troubleshooting Inconsistent Web Security Scan Results.