Other Articles

Pentest Flow – Adding and Managing Penetration Test Findings

Support > Pentest Management

11 February, 2026

The Pentests section in Kawach is designed to help security and compliance teams go beyond simply storing penetration test reports. It provides a structured workflow to log vulnerabilities, assign severity, monitor remediation, and maintain a clear audit trail of security improvements.


This ensures that findings from penetration tests are not just documented — but actively managed and resolved.

Step 1: Create a Pentest Record

Create Pentest Record

The first step in the pentest lifecycle is creating a formal record of the penetration testing assessment.

How to Create a Pentest

  1. Navigate to the Pentests section.
  2. Click Create Pentest (or equivalent action).
  3. Enter the required pentest details.
    • Pentest Name
      Provide a clear and identifiable name.
      Example: "External Network Pentest – Q1 2026"
    • Pentest Report File
      Upload the official penetration testing report (PDF, DOC, or other supported formats). This document serves as primary evidence for compliance and audits.
    • Issue Date
      Select the date when the report was issued by the testing team.
  4. Click Submit.
    Once submitted, the pentest record appears in the Pentests list and becomes available for vulnerability tracking.

Step 2: View Pentest Details

Pentest Details Page

Clicking on a pentest record opens its detailed view. This page acts as the central workspace for managing all vulnerabilities associated with the penetration test.

Information Displayed

  • Pentest Name – Identifies the assessment
  • File Name –The uploaded report
  • Issue Date – When the report was issued
  • List of Vulnerabilities – All logged findings
  • Status Overview – Open vs Fixed findings

This page ensures that all remediation efforts are tied directly to the original assessment.

Step 3: Add Vulnerabilities to the Pentest

A penetration test report typically contains multiple findings. Instead of treating the report as a static document, Kawach allows you to break it into actionable items.

How to Add a Vulnerability

Within the pentest details page:

  1. Click Add Vulnerability.
  2. Enter required information:
    • Severity

      Select one of the following levels:

      • Critical – Immediate risk, active exploitation possible
      • High – Significant risk requiring urgent remediation
      • Medium – Moderate risk, fix within standard SLA
      • Low – Minor issue, low impact

      Severity helps prioritize remediation efforts.

    • Summary

      Provide a clear, concise description of the issue.

      A good vulnerability summary includes:

      • What the issue is
      • Where it was found
      • Why it is risky
      • Potential impact

      Example: "SQL Injection vulnerability identified in login endpoint allowing unauthorized database access."

  3. Click Submit.
  4. Each vulnerability is now:

    • Linked to the pentest
    • Individually trackable
    • Included in reporting and dashboards

Step 4: Track and Fix Vulnerabilities

Managing vulnerabilities effectively is critical for maintaining a strong security posture.

Vulnerability Status

By default, newly added vulnerabilities are marked as:

  • Open

They remain open until remediation is completed and validated.

Remediation Workflow

  1. Assign remediation to the relevant technical team.
  2. Implement the fix.
  3. Validate that the issue is resolved.
  4. Mark the vulnerability as Fixed.

This provides a clear lifecycle:

Open → Remediated → Verified → Fixed

Why Tracking Matters

Tracking ensures:

  • No finding is overlooked
  • Critical issues are prioritized
  • Remediation timelines are monitored
  • Compliance evidence is maintained
  • Security improvements are measurable

Pentest Management Flow (Detailed Summary)

  1. Create a Pentest Record.
  2. Upload report and record the issue date.

  3. Open Pentest Details
  4. Use it as the central management workspace.

  5. Add Individual Vulnerabilities
  6. Assign severity and write clear summaries.

  7. Track remediation progress.
  8. Monitor open findings and ensure accountability.

  9. Mark vulnerabilities as fixed
  10. Once resolved and validated, update status.

Best Practices for Managing Pentest Findings

  • Break Down Reports into Actionable Items

    Avoid leaving findings only in uploaded reports—log each issue individually.

  • Use Clear Severity Criteria

    Align severity ratings with industry standards (e.g., CVSS where applicable).

  • Prioritize Critical & High Findings

    Set internal SLAs for remediation:

    • Critical: Immediate
    • High: Within defined short-term window
    • Medium / Low: Scheduled remediation
  • Document Fix Validation

    Ensure that fixes are tested before marking as resolved.

  • Maintain Audit Readiness

    Pentest tracking supports evidence requirements for:

    • ISO 27001 (Vulnerability Management controls)
    • SOC 2 (Security & Change Management)
    • PCI-DSS (Regular security testing requirements)
    • Internal cybersecurity governance

How Pentest Tracking Strengthens Security

By integrating pentest findings into a structured workflow, Kawach enables organizations to:

  • Move from reactive to proactive security
  • Reduce vulnerability exposure windows
  • Improve accountability across teams
  • Maintain a transparent remediation history
  • Demonstrate continuous improvement to auditors

Conclusion

The Pentests module in Kawach transforms penetration testing from a static compliance exercise into a dynamic vulnerability management process.

By:

  • Creating structured pentest records
  • Logging individual vulnerabilities
  • Assigning severity levels
  • Tracking remediation
  • Marking issues as fixed

Organizations can ensure that every identified weakness is documented, addressed, and closed—leading to stronger security posture, improved governance, and sustained audit readiness.