Documenting Findings and Recommendations for SANS GIAC Security Expert (GSE)
The SANS GIAC Security Expert (GSE) certification is a rigorous assessment of your ability to perform advanced security assessments and provide actionable recommendations. A critical component of this process is the clear, concise, and compelling documentation of your findings and recommendations. This module will guide you through best practices for creating documentation that meets the high standards of the GSE.
The Importance of Effective Documentation
Your documentation serves as the primary evidence of your work and the basis for remediation efforts. It needs to be:
- Clear and Unambiguous: Easily understood by technical and non-technical stakeholders.
- Actionable: Providing specific steps for mitigation.
- Comprehensive: Covering all critical findings and their implications.
- Professional: Reflecting the expertise and rigor expected of a GSE.
Structuring Your Findings
A well-structured report makes it easier for readers to digest complex information. Consider the following structure for each finding:
Crafting Effective Recommendations
Recommendations are the bridge between identifying a problem and solving it. They must be precise and practical.
Recommendations should be SMART: Specific, Measurable, Achievable, Relevant, and Time-bound (where applicable).
When formulating recommendations, consider the following:
- Specificity: Instead of 'patch the server,' state 'Apply vendor patch KB12345 to all Windows Server 2019 instances running IIS.'
- Feasibility: Ensure the recommended actions are technically possible and align with the organization's resources and policies.
- Prioritization: Clearly indicate which recommendations are most critical based on the risk assessment.
- Context: Explain why a recommendation is important and what the benefits of implementing it are.
Visualizing Your Findings
Visual aids can significantly enhance understanding and impact. For the GSE, this often involves presenting evidence clearly and potentially illustrating complex relationships.
Screenshots are invaluable for demonstrating vulnerabilities. Ensure they are clear, annotated if necessary, and show the context of the finding. For network-related findings, diagrams illustrating traffic flow or system architecture can be highly effective. When presenting complex attack chains or data flows, consider using flowcharts or sequence diagrams to visually represent the process.
Text-based content
Library pages focus on text content
Executive Summary and Overall Recommendations
Beyond individual findings, a GSE report requires an executive summary and overarching recommendations. The executive summary should provide a high-level overview of the assessment's scope, key findings, and overall risk posture. Overall recommendations should address systemic issues or strategic improvements that can enhance the organization's security posture.
Clear, unambiguous, actionable, comprehensive, and professional.
Review and Refinement
Before submission, thoroughly review your documentation. Check for clarity, accuracy, consistency, and completeness. Ensure all evidence is properly presented and that recommendations are well-supported. A peer review can also be beneficial to catch any overlooked issues.
Learning Resources
The official SANS GIAC page detailing the GSE certification requirements, exam structure, and objectives. Essential for understanding the overall expectations.
A SANS whitepaper offering practical advice on how to craft clear, actionable, and impactful security recommendations for various audiences.
A blog post that outlines the typical structure and content of a security audit report, providing a good framework for GSE documentation.
A video discussing best practices for technical writing in the cybersecurity domain, focusing on clarity and audience awareness.
Wikipedia article providing a foundational understanding of risk assessment methodologies, crucial for justifying the severity of findings.
A vast collection of SANS whitepapers and articles on various security topics, many of which demonstrate excellent documentation practices.
A blog post from Rapid7 offering tips on how to use screenshots effectively to support findings in security assessment reports.
Documentation for Mermaid, a JavaScript-based diagramming tool that allows you to create flowcharts and diagrams from text, useful for visualizing processes.
Information about the GSE Advisory Board, which can offer insights into the expectations and standards for the certification.
An overview of general best practices for cybersecurity documentation, covering aspects like clarity, organization, and audience consideration.