🌱 Beginner
Template

Executive Summary Template

A concise, business-focused summary for C-level executives and management. Focus on business impact, not technical details.

Writing Tips

Keep it under 2 pages. Use business language, not technical jargon. Focus on risk to the business, potential financial impact, and remediation priorities.
# PENETRATION TEST EXECUTIVE SUMMARY

**Client:** [Company Name]
**Assessment Date:** [Start Date] - [End Date]
**Report Date:** [Date]
**Prepared By:** [Consultant Name / Company]

---

## ENGAGEMENT OVERVIEW

**Assessment Type:** [Web Application / Internal Network / External Network / Social Engineering / Red Team]
**Methodology:** [OWASP / PTES / OSSTMM]

### Scope
- [Primary target - e.g., "Customer-facing web application at app.company.com"]
- [Secondary targets if applicable]
- [IP ranges or additional systems]

### Out of Scope
- [Explicitly excluded systems or techniques]

---

## KEY FINDINGS AT A GLANCE

| Severity | Count | Business Impact |
|----------|-------|-----------------|
| 🔴 Critical | X | Immediate action required - potential data breach |
| 🟠 High | X | Significant risk - address within 30 days |
| 🟡 Medium | X | Moderate risk - address within 90 days |
| 🟢 Low | X | Minor risk - address in next development cycle |
| ⚪ Info | X | Best practice recommendations |

**Total Findings:** XX

---

## OVERALL SECURITY POSTURE

**Risk Rating:** [CRITICAL / HIGH / MODERATE / LOW]

[2-3 paragraph summary written for non-technical leadership. Focus on:
- What an attacker could realistically achieve
- Potential business impact (financial, reputational, regulatory)
- Comparison to industry standards if available]

### What This Means for [Company Name]

**Worst Case Scenario:**
[Describe the most severe potential impact in business terms. Example:
"An external attacker could gain access to the customer database containing 
500,000 records, potentially resulting in regulatory fines under GDPR (up to 4% 
of annual revenue), customer notification costs, and significant reputational damage."]

**Most Likely Scenario:**
[Describe the realistic attack path based on findings. Example:
"An attacker exploiting the identified SQL injection vulnerability could extract 
customer credentials and use them to access user accounts, leading to account 
takeover and potential financial fraud."]

---

## TOP 3 PRIORITIES

### 1. [Critical Finding Title]
**Risk:** [One sentence on business impact]
**Recommendation:** [One sentence on fix]
**Effort:** [Low / Medium / High]

### 2. [High Finding Title]
**Risk:** [One sentence on business impact]
**Recommendation:** [One sentence on fix]
**Effort:** [Low / Medium / High]

### 3. [High/Medium Finding Title]
**Risk:** [One sentence on business impact]
**Recommendation:** [One sentence on fix]
**Effort:** [Low / Medium / High]

---

## POSITIVE OBSERVATIONS

[List 2-3 security controls that were effective. This provides balance and 
acknowledges the security team's efforts.]

- [Positive finding 1 - e.g., "Strong password policy enforcement"]
- [Positive finding 2 - e.g., "Effective network segmentation"]
- [Positive finding 3 - e.g., "Timely patching of critical systems"]

---

## RECOMMENDED NEXT STEPS

1. **Immediate (0-7 days):** Address critical findings
2. **Short-term (30 days):** Remediate high-severity issues
3. **Medium-term (90 days):** Address medium findings and implement security improvements
4. **Ongoing:** Establish regular security testing cadence

---

## APPENDIX: FINDING SUMMARY TABLE

| ID | Finding | Severity | Status | Remediation Effort |
|----|---------|----------|--------|-------------------|
| 1 | [Finding name] | Critical | Open | Medium |
| 2 | [Finding name] | High | Open | Low |
| ... | ... | ... | ... | ... |

---

*Full technical details and remediation guidance are provided in the Technical Report.*
      

Best Practices

✅ Do

  • • Use business language executives understand
  • • Quantify risk in financial/regulatory terms
  • • Provide clear, actionable recommendations
  • • Include positive findings for balance
  • • Keep it under 2 pages

❌ Don't

  • • Use technical jargon without explanation
  • • Include exploit code or detailed steps
  • • Overwhelm with too many findings
  • • Forget to mention remediation effort
  • • Skip the positive observations