Understanding Your Results
Learn how to interpret your security scan results, prioritize fixes, and improve your overall security posture effectively.
Understanding Your Security Score
Your security score is calculated based on vulnerability severity, code quality, and compliance factors
Outstanding security posture with minimal or no issues
Solid security with minor issues that should be addressed
Moderate security issues that need attention
Significant security issues requiring immediate action
Score Calculation Factors
- Number and severity of vulnerabilities (70%)
- Code quality and best practices (20%)
- Compliance adherence (10%)
Vulnerability Severity Levels
How we categorize security issues and recommend response times
Immediate fix required
Common Examples:
Fix within days
Common Examples:
Fix within weeks
Common Examples:
Fix when convenient
Common Examples:
Scan Result Sections
Understanding each part of your security report
Executive Summary
High-level overview of your security posture
- Overall security score and grade
- Total number of vulnerabilities by severity
- Risk level assessment
- Compliance status overview
Vulnerability Details
Detailed breakdown of each security issue found
- Specific vulnerability descriptions
- Affected files and line numbers
- Code snippets showing the issue
- Recommended fixes and remediation steps
Compliance Report
Standards and regulatory compliance assessment
- SOC 2, PCI DSS, HIPAA compliance status
- Industry-specific security requirements
- Regulatory gaps and recommendations
- Certification readiness assessment
Code Quality Metrics
Code quality and best practices analysis
- Code complexity and maintainability
- Security best practices adherence
- Framework-specific recommendations
- Performance and security trade-offs
Taking Action on Results
How to prioritize and address security findings effectively
Prioritization Strategy
- 1Address all Critical vulnerabilities immediately
- 2Fix High severity issues within a week
- 3Plan Medium issues for next sprint
- 4Schedule Low issues for future releases
Filtering Results
- Filter by severity level
- Group by file or component
- Sort by fix complexity
- Mark false positives
Exporting and Sharing Results
PDF Report
Executive summary for stakeholders
JSON/CSV Data
Raw data for analysis tools
Dashboard Link
Share live results with team
Next Steps
Continue improving your security posture