Menu Icon
< back to main
 • 3 min read

Cobalt Platform Deep Dive: Customize Your Pentest Reports per Your Needs

Cobalt introduces more options to configure pentest reports and adjust their layout on a granular level.

Cobalt Platform Deep Dive: Customize Your Pentest Reports per Your Needs
Yogi Petkar
Yogi Petkar

Yogi has more than 15 years of experience working in tech through positions in both Fortune 500 companies and startups. He heads our CX Product Management team and shares regular deep dives of new major features in our PtaaS platform.

Want to see the platform in action?
get a demoArrow Right
Want to see the platform in action?
get a demoArrow Right

All organizations that have undergone a pentest understand the importance of a pentest report. Pentest (PT) reports are an important artifact that are usually shared with various stakeholders. Depending on the type of stakeholders, the information on the report should change. E.g. If pentest reports are shared with engineering stakeholders to collaborate on fixing the vulnerabilities, then the PT report needs to be in-depth with detailed vulnerability information.

If PT reports are shared with compliance or internal audit teams, vulnerability information needs to be summarized to understand the overall risk to the organization and whether it falls within the security policy of the organization. If PT reports are shared with prospects or customers, they are high-level, summarizing the risks of the asset and any corrective actions that have been already taken to alleviate concerns of prospects/customers.

Cobalt’s PtaaS platform already offers 4 different types of PT reports to cater to the needs of various stakeholders. However, there is additional need in the market to be able to further fine-tune those PT reports when presenting it to stakeholders, especially external ones.

Introducing Cobalt’s new configurable PT report that enables users to adjust layout to a very granular level while still preserving the integrity of the original information. Thereby, it preserves the element of trust in the report while offering to cater to different stakeholders inside and outside the organization.

How does it work?

Once a pentest is complete and the report is final, it becomes visible and accessible to customers through Cobalt’s platform. There are four types of pentest reports:

  1. Customer Letter
  2. Attestation Letter
  3. Full Report
  4. Full Report + Finding Details

In addition, users can customize any of the above four and save a copy of it. By default, “Full Report” is visible to users when they go to the report section of the platform. On the left side in the “Report Sections” users can see various components of enclosed content. Some options are grayed out depending on whether they are available. If users decide to customize the selected report, they can simply click on the “Customize” button.

Customize your pentest reports per your needs

After clicking the “Customize” button, the same report will appear in a modal with the ability to include or exclude sections. Inclusion is shown by the “open eye” icon.

Screen Shot 2021-08-16 at 10.45.21 AM

Users can exclude any identified sections of the report from the final version by simply clicking the “open eye” control. Once clicked, it will fade those sections of the report to visually indicate that they are not included in the report.

After going through the report and including/excluding appropriate sections, users can “Apply” those changes. They can then download the customized PT report in PDF format.

pentest reports

With this level of customization, customers will be able to control pentest report information shared with their stakeholders at a granular level and be able to accomplish the objectives with various stakeholders.

As we continue to lead PtaaS, we are always looking for ways to ensure Cobalt is the most innovative solution for DevOps-driven software companies that want to implement security across the development lifecycle and optimize application security processes.

Curious to learn more? Schedule some time with one of our security experts to see the Cobalt PtaaS platform in action.

Product Updates

Related Stories

How to Build Resilience in Cybersecurity: 4 Lessons Learned From Military Experience
How to Build Resilience in Cybersecurity: 4 Lessons Learned From Military Experience
What better group to turn to for advice than security leaders who have worked on the front lines of risk and uncertainty?
Read moreArrow Right
Cybersecurity Statistics for 2021
Cybersecurity Statistics for 2021
What's new in ransomware, social engineering, and many other security threats
Read moreArrow Right
New Ebook: Beginner’s Guide to Compliance-Driven Pentesting
New Ebook: Beginner’s Guide to Compliance-Driven Pentesting
Find out more about the role of pentesting in your company’s compliance effort.
Read moreArrow Right
The State of Pentesting 2021: Common Vulnerabilities, Findings, and Why Teams Struggle With Remediation
The State of Pentesting 2021: Common Vulnerabilities, Findings, and Why Teams Struggle With Remediation
Each year, we publish The State of Pentesting report to provide a detailed overview of vulnerabilities and identify the trends and hazards that impact the cybersecurity community.
Read moreArrow Right

Never miss a story

Stay updated about Cobalt news as it happens