NIST SP 800-115

Technical Guide to Information Security Testing and Assessment.

Not Started
Key Stages & Components

Review Techniques

Examining documentation, logs, and configurations.

Target Identification and Analysis

Identifying network and system targets.

Target Vulnerability Validation

Confirming vulnerabilities through testing.

Security Assessment Planning

Defining scope and methodology.

Security Assessment Execution

Performing the assessment.

Post-Assessment Activities

Analyzing results and reporting.