Report Delivery Guide
The delivery phase is critical to the success of a penetration test. A well-delivered report drives action, while poor delivery can undermine even the most thorough assessment. This guide covers delivery best practices, presentation tips, and handling client feedback.
✅ Pre-Delivery Quality Checklist
✅Report Quality Checklist
Ensure your report meets professional standards before delivery
Document Structure(0/5)
Scope & Methodology(0/6)
Findings Quality(0/8)
Evidence Quality(0/6)
Remediation(0/5)
Writing Quality(0/6)
Final Checks(0/8)
📋 Pre-Delivery Preparation
Internal Review Process
- 1. Self-review: Re-read entire report after 24 hours
- 2. Technical review: Senior tester validates findings
- 3. QA review: Editor checks grammar and formatting
- 4. Final review: Project lead sign-off
Pre-Delivery Checklist
- Client name correct throughout
- No references to other clients
- Sensitive data properly redacted
- All findings verified reproducible
- PDF renders correctly
- File encrypted if required
Critical: Client Name Check
📤 Delivery Methods
Secure Portal
Preferred method for most engagements
- ✅ Access logging and auditing
- ✅ Time-limited access
- ✅ Download tracking
- ✅ Version control
- ✅ Professional appearance
Encrypted Email
Acceptable with proper encryption
- ✅ PGP/GPG encryption
- ✅ S/MIME if available
- ⚠️ Password-protected ZIP
- ⚠️ Send password separately
- ❌ Never send unencrypted
Client System
Upload to client's preferred platform
- ✅ Client controls access
- ✅ Integrates with their workflow
- ⚠️ Verify security of platform
- ⚠️ Confirm upload successful
- ⚠️ Keep your own backup
Encryption Commands
# PGP/GPG Encryption (Preferred)
gpg --encrypt --recipient client@example.com report.pdf
# Password-protected ZIP (7-Zip - AES-256)
7z a -tzip -p"StrongPassword123!" -mem=AES256 report.zip report.pdf
# Password-protected PDF (using qpdf)
qpdf --encrypt "userpass" "ownerpass" 256 -- input.pdf encrypted.pdf
# Verifying encryption
gpg --verify report.pdf.sig report.pdf
file encrypted.pdf # Should show "encrypted"
# Share password via separate channel (Signal, phone call)Delivery Timing
Best Times
- • Tuesday-Thursday: Maximum attention
- • Mid-morning: After email triage
- • Beginning of week: For critical findings
- • 48 hours before presentation: If scheduled
Avoid
- • Friday afternoon: Gets buried over weekend
- • Holiday weeks: Key people unavailable
- • End of business day: Less immediate attention
- • Same day as presentation: No review time
Delivery Email Template
Subject: [CONFIDENTIAL] Penetration Test Report - [Client Name] - [Date] Dear [Client Contact], Please find attached the penetration test report for the [Project Name] engagement conducted [Date Range]. **Report Summary:** - Total Findings: [X] - Critical: [X] - High: [X] - Medium: [X] - Low: [X] **Key Observations:** [2-3 sentence high-level summary of most significant findings] **Access Information:** [Include portal link, password instructions, or encryption details] **Next Steps:** 1. Review the executive summary (pages X-Y) for high-level findings 2. Share technical findings (section X) with relevant IT teams 3. Schedule a debrief call to discuss findings and remediation priorities 4. [If retest included] Submit remediation completion notification when ready Please confirm receipt of this report at your earliest convenience. We are available to discuss findings and answer questions. Please don't hesitate to reach out. Best regards, [Your Name] [Title] [Company] [Contact Information] --- CONFIDENTIALITY NOTICE: This report contains sensitive security information intended only for the named recipient. Do not forward or share without authorization.
🎤 Presentation Best Practices
Know Your Audience
Recommended Structure (60 min)
- 5 min Introduction: Scope, methodology, timeline
- 10 min Executive Summary: Key risks, business impact
- 25 min Key Findings: Top 5-7 findings with demos
- 10 min Recommendations: Prioritized action items
- 10 min Q&A: Discussion and clarification
Presentation Tips
- ✓ Start with the "so what" - business impact first
- ✓ Use visuals: attack path diagrams, charts
- ✓ Demonstrate 2-3 key findings live (if possible)
- ✓ Have remediation details ready for tech questions
- ✓ End with clear next steps and timeline
- ✗ Don't read the report verbatim
- ✗ Don't be condescending about findings
Handling Difficult Questions
💬 Handling Client Feedback
Severity Disputes
Clients may push back on severity ratings. Handle professionally:
- Listen to their perspective fully
- Explain your rating methodology (CVSS, etc.)
- Discuss specific environmental factors
- Consider documented mitigating controls
- If appropriate, adjust and document reasoning
- If disagreement persists, note it in the report
Pushback Responses
Post-Delivery Process
Confirm receipt, schedule debrief
Present findings, answer questions
Support remediation questions
Retest if included in scope
What to Document
Keep Records Of
- • Delivery date and method
- • Receipt confirmation
- • Presentation attendees
- • Questions raised and answers given
- • Disputed findings and resolutions
- • Client feedback
- • Version history
- • Retest requests and results
Data Retention
- • Report: Per contract (typically 1-3 years)
- • Evidence: Same as report
- • Raw data: Delete after report delivery unless required
- • Credentials found: Delete immediately after report
- • Client data: Per data handling agreement
- • Verify destruction: Document disposal
Evidence Disposal
Follow-up Email Template
Subject: Re: Penetration Test Report - [Client Name] - Follow-up Dear [Client Contact], Thank you for meeting with us to discuss the penetration test findings on [date]. **Action Items from the Meeting:** 1. [Item 1 - Owner - Due Date] 2. [Item 2 - Owner - Due Date] 3. [Item 3 - Owner - Due Date] **Report Updates:** [If any changes were agreed upon] **Retest Information:** [If applicable: process for requesting retest, timeline, etc.] **Questions/Clarifications:** [If any questions came up that need follow-up answers] Please don't hesitate to reach out if additional questions arise during your remediation efforts. Best regards, [Your Name]