Assessment Report
After completing the red team assessment, hot wash, and end mission procedures, it’s time to create the red team assessment report—also known as the security assessment report (SAR).
3/14/20253 min read


The final report represents the culmination of a red team assessment, serving as the definitive document that transforms technical findings into actionable security improvements. This critical deliverable requires careful attention to detail and clear communication to provide maximum value to stakeholders. We develop the SAR using operator logs, system logs, and information collected throughout the engagement, including the Hot Wash out-brief.
For an example SAR, refer to the template in the Resource section, which uses the fictional Global Finance Corporation as a demonstration.
Purpose and Value
A well-crafted assessment report serves as a critical cornerstone of the engagement, performing several essential functions that transform technical findings into meaningful business value. These comprehensive documents serve as the definitive record of the assessment, delivering multiple layers of vital information that stakeholders rely on for security decision-making and operational improvements:
Documents and validates the entire assessment process
Translates technical findings into business-relevant insights
Provides a roadmap for security improvements
Creates a historical record for tracking security maturity
Information Sources
The comprehensive security assessment report integrates and analyzes information gathered from diverse sources across the entire engagement period, synthesizing critical data points to present a complete picture of the assessment findings. This thorough compilation draws from various channels of intelligence gathered throughout the operation:
Detailed operator logs and observations
System and network monitoring data
Hot Wash debrief findings
Technical evidence and artifacts
Core Components
1. Executive Summary
The executive summary serves as a crucial entry point to the assessment report, providing senior stakeholders and decision-makers with a concise yet comprehensive overview of the engagement. This section distills the most important elements of the assessment into a digestible format, including:
Objectives and goals of the assessment
Strengths, positive security measures observed
Critical vulnerabilities discovered
Strategic recommendations
2. Technical Assessment Details
This section provides a detailed technical analysis of the assessment method and includes thorough documentation about:
Method and approach used
Tools and techniques employed
Detailed attack chains and paths
Evidence of successful compromises with Action Map or Event Map
3. Timeline & Attack Narrative
In-depth chronological breakdown detailing the progression of the red team assessment, including detailed documentation of methodologies employed, techniques executed, and the sequential flow of operations throughout the engagement period. This timeline captures both the tactical and strategic elements of the assessment, providing stakeholders with a clear understanding of how the engagement unfolded.
Details the methods used from initial access through end-of-assessment
Documents, specific techniques and tools employed
Analyzes both successful and failed approaches
4. Risk & Technical Findings
A three-tier risk rating system (high, medium, and low) helps prioritize issues based on their impact and severity, enabling organizations to address vulnerabilities. The technical findings section outlines security flaws and observations found during the assessment.
Severity level (High, Medium, Low) with potential impact
Findings and Observations
Description of the vulnerability and the technique exploited by the red team
Potential impact on operations
Affected systems and assets observed and/or exploited
Recommendations for implementing security controls and remediation measures
5. Conclusion
Acts as the last connection between the assessment’s technical findings and real-world operational results.
6. Supporting Evidence
Provides documentation and validation of findings through evidence collection, detailed technical artifacts, and recorded proof-of-concept demonstrations that support each identified vulnerability and security observation.
Detailed documentation of attack paths and techniques
Specific commands and tools used during testing
Steps for security teams to recreate scenarios for training and defense
Strategic insights enabling leadership to prioritize remediation and allocate security resources
Best Practices for Report Writing
1. Maintain Professional Tone
Professional tone is essential in red team assessment reports, as it establishes credibility and ensures findings are taken seriously by all stakeholders. The way information is presented can impact how the organization receives and implements recommendations.
Use clear, objective language
Avoid technical jargon when possible
Present findings without emotion
Keep recommendations constructive and actionable
2. Include Supporting Documentation
Proper documentation is crucial for capturing and communicating assessment findings. Supporting evidence helps validate discoveries, demonstrate impact, and provides context for stakeholders reviewing the report. To strengthen the report’s credibility, include the following types of documentation:
Screenshots of critical findings
Log excerpts showing exploitation
Network diagrams and attack paths
Technical evidence files
3. Consider Your Audience
When crafting security assessment reports, it’s crucial to ensure that the documentation communicates findings and recommendations across various organizational levels and roles. The report content should be structured and presented in a way that makes it accessible and valuable to multiple stakeholders:
Executive leadership requiring high-level insights
Technical teams needing detailed remediation guidance
Security managers planning implementation strategies
Compliance teams verifying security controls
Quality Assurance Checklist
Before finalizing the assessment report, it is essential to perform a quality review to verify completeness and accuracy. The following checklist should validate that the report meets all the necessary standards and requirements.
All findings are documented and evidence-backed
Technical accuracy has been peer-reviewed
Recommendations are clear and implementable
Writing is professional and free of errors
Supporting materials are referenced
Conclusion
A well-crafted red team assessment report is more than just a document—it’s a roadmap for security improvement. By following these guidelines and best practices, you can create reports that deliver real value and drive meaningful security enhancements for your clients. The effectiveness of communication of findings and recommendations in the final report determines the success of a red team assessment. Take the time to create comprehensive, clear, and actionable documentation that serves as a valuable resource for all stakeholders involved in improving the organization’s security posture.