Assessment Testing
Last updated
Last updated
The testing phase holds significant importance in the assessment process. During this phase, pentesters play a crucial role by submitting pentest reports and accessing assessment details through Trustline platform. It is within this phase that vulnerabilities are identified and assessed to ensure the security of the system under examination.
Efficient communication is vital for successful pentests. Trustline utilizes Slack as the primary platform for real-time, synchronous interactions. Slack offers features such as video and audio calling for immediate collaboration. The testing phase involves 2 distinct Slack channels:
Pentester Channel: Exclusive to pentesters for internal discussions.
Stakeholder Channel: Visible to all stakeholders for a comprehensive assessment overview.
During the testing phase, pentesters focus on identifying and mitigating vulnerabilities based on the asset checklist. Check here for details on Manage Reports Guide
Pentesters are responsible for updating the assessment checklist to track the progress of their work. Here's how the process works:
Access the checklist from the Scope section page in the specific pentest page on Trustline platform.
As you cover each item in the checklist, mark it as completed to indicate that it has been addressed.
If you realize that you made a mistake or incorrectly marked an item as completed, you can unmark it to indicate that it is not done yet.
Pentesters can easily access all assessment details on Trustline platform which provides the following:
4.1 Accessing Assessment List
Gain insights into program names, launch dates, and the current phase of the assessment.
Take necessary actions aligned with the assessment’s current phase requirements.
4.2 Accessing Assessment Details
Overview: Provides an overview of assessment progress, severity of findings, Slack communication channels, vulnerability reports, pentest team details, and scope of assets.
Scope: Details the assets involved in the assessment, including type, identifier, and overall status.
Reports: Displays submitted vulnerability reports, including details such as severity and current status.
Pentesters: Lists the members of the pentest team assigned to the assessment.
Details: Provides specific information about the assessment timeline, duration, reward details, in-scope assets, and rules of engagement.
Attachments: Shows any files attached to the assessment.