Report Types

Ethiack offers three vital reports for every event: a Technical Report with detailed technical findings and mitigation steps, an Executive Report, which distills findings into business impact insights for executives and administrators, and a Customer-Facing Report, which provides a high-level overview of the company's security posture to demonstrate transparency and build trust with customers and stakeholders.

The comprehensive reporting is available for both machine hacking and human hacking events, each serving distinct purposes. These reports are vital in conveying the assessment's findings and implications. Let's explore the types of reports provided and their specific purposes:


1. Technical Report:

  • The technical report is a detailed and comprehensive document that focuses on the technical aspects of the assessment.
  • It contains a wealth of information, including all identified findings, in-depth technical details, brief descriptions for each finding, and comprehensive steps for reproducing and mitigating these findings.
  • The technical report serves as an invaluable resource for technical teams, system administrators, and cybersecurity experts who need to understand the specific vulnerabilities and how to address them effectively.
  • It is particularly useful for those responsible for implementing security fixes, ensuring they have a clear and detailed guide for remediation.
  • This report delves into the technical details and provides insights into the potential impact of these findings on the organization's systems and data.

2. Executive Report:

  • In contrast, the executive report is tailored for internal executive-level communication and decision-making.
  • This report acts as a concise and summarized version of the technical report but deliberately omits technical details.
  • It focuses primarily on the business impact of the findings, providing a clear understanding of how these vulnerabilities may affect the organization's operations, reputation, and overall security posture.
  • With a strong emphasis on executive-level language, this report is designed for administrative profiles, senior management, and decision-makers within the organization.
  • Its purpose is to facilitate informed, high-level decisions about cybersecurity measures and risk management strategies, allowing executives to grasp the assessment's significance without delving into the technical intricacies.

3. Customer-Facing Report:

  • This report aims to provide customers and potential clients with assurance about the company's commitment to security.
  • It is designed to be shared externally, offering transparency about the company's security posture and risk assessment outcomes.
  • This report is concise and high-level, focusing on key security measures, best practices, and overall risk management strategies.
  • Unlike the technical and executive reports, it does not include sensitive or highly detailed technical findings but rather a summarized overview of security efforts.
  • It is tailored for external audiences, such as clients, partners, and stakeholders, to reinforce trust and confidence in the company's security practices.

In summary, Ethiack's reporting system offers a three-tiered approach to accommodate the diverse needs of an organization. The technical report provides a deep dive into the technical aspects of findings and their mitigation, the executive report distills this information into business-focused insights for executive and administrative audiences, and the customer-facing report offers a concise overview of the company's security posture to reinforce trust with customers and stakeholders. 

To access and manage your reports, follow these steps:

  1. Log in to the Ethiack Portal.
  2. Navigate to the Reports section in the main menu.
  3. If you don’t have any reports yet, you can generate one by:
    1. Selecting the report type under the Export Type option;
    2. Choosing the event;
    3. Clicking the Export button.
  4. All newly generated and previously created reports will be available in the section below.

Together, these reports not only gather important data but also empower organizations to address security vulnerabilities effectively and make informed decisions to safeguard their digital assets and reputation.