NIST SP 800-115
Technical Guide to Information Security Testing and Assessment.
Not Started
Key Stages & Components
Review Techniques
Examining documentation, logs, and configurations.
Target Identification and Analysis
Identifying network and system targets.
Target Vulnerability Validation
Confirming vulnerabilities through testing.
Security Assessment Planning
Defining scope and methodology.
Security Assessment Execution
Performing the assessment.
Post-Assessment Activities
Analyzing results and reporting.