AUTHOR: MATT WILSON
It's time for your first (or first in some time) security assessment…so what exactly happens?
First, we need to establish some ground rules and define a few variables because the term "security assessment" can mean oh so many things depending upon who you are, who's asking you to do the assessment, what you need, etc. For the purposes of this article, a "security assessment" will be a point-in-time evaluation of your organization’s cybersecurity posture (still broad, I know). This intentionally includes a variety of common assessment types:
- Penetration Test
- Red/Purple Team Engagements
- Compliance Assessment
- Leading Practice / General Controls Assessment
- Vulnerability Assessment
- Risk Assessment
- Security Governance Assessments
- Security Architecture Assessments
There's certainly plenty of other "assessments" that would also fit, but we're not looking to build a comprehensive list here; instead, we simply provide some examples with terminology most people would be familiar with (or run into when talking to vendors).
Said slightly differently, an assessment seeks to proactively find issues so you (or your organization) can take action against them.
Second, assuming you've been asked, charged with, ordered, or otherwise subjected to a Security Assessment, you may feel a bit… anxious. Will the results cost us money? Will the report make my team "look bad?" Do I need to update my resume?
Only a few clients have said those words, but certainly some have had that inner monologue. Really, truly, we assessors aren't all that bad. Whether you’re doing it for compliance, client demands, insurance, or just because it’s time, the goal isn’t to catch anyone unprepared or grade you on some secret InfoSec curve.
The goal is clarity: where are we strong, where are we weak, and what can we do about it? The risks exist whether an organization acts on them or not, so it's best to identify them, build an action plan, and then execute said plan. The alternative is to play ostrich and pretend the risks don't exist: The news is littered with breach stories involving organizations that did exactly that.
1.
It Starts with a Conversation, Not a Scan
Before anything technical happens, you’ll talk to your assessment provider. A good partner will ask about your environment, your goals, your concerns, and any requirements driving the assessment (like HIPAA, PCI-DSS, SOC 2, etc.).
This is your chance to:
- Ask questions (seriously—ask everything).
- Clarify scope: What systems/environments are included? What’s off-limits?
- Share timelines, internal deadlines, and preferred windows for testing.
The output of this phase is usually a Proposal or Statement of Work (SOW), which outlines the what, how, and when of the engagement.
2.
Scoping and Information Gathering
For a risk assessment, leading practice / general controls assessment, or compliance-focused activity, you’ll likely be asked to provide documents: security policies, network diagrams, and/or asset lists. And any comprehensive assessor would look to coordinate time with your personnel that have subject-matter expertise over in-scope areas (e.g., patching, hardening, backup & recovery, security monitoring).
If you don’t have everything perfectly documented yet—don’t worry. An experienced assessor can talk your organization through the process, confirming what information is in the critical path, and what content is "nice to have."
3.
The Actual Testing or Review Phase
Depending on the type of assessment, this might include:
- Vulnerability Scanning: Identifies known weaknesses in your systems, often as a result of missing patches and/or misconfigurations.
- Penetration Testing: An experienced tester actively tries to exploit weaknesses like a real attacker would.
- Policy and Procedure Review: Looks at how well your documentation aligns with best practices and what you actually do in practice.
- Interviews/Walkthroughs: The assessor may talk to InfoSec, IT, Finance, Accounting, Audit, HR, or leadership to validate how processes work in reality. Often an organization-specific business unit may have insight into a key control process - it's probably worthwhile to involve them, even for a 15-minute interview.
Important note: The goal is not perfection. The goal is visibility. We’re trying to find the gaps before the bad guys do.
4.
The Report (Embrace It)
At the end, you’ll receive a report that includes:
- Findings: What was discovered (vulnerabilities, gaps, risky processes).
- Risk Ratings: Usually something like Low/Medium/High or Informational/Critical.
- Recommendations: What and how to fix, improve, or investigate further.
- Executive Summary: Written in plain language so leadership and non-technical stakeholders can understand the big picture.
This report is not a judgment. It’s a roadmap.
You’ll likely be offered a readout or walkthrough session. Take it. It’s your chance to ask questions, challenge assumptions, and make sure you understand what’s important.
5.
Life After the Assessment
Here’s where the real value kicks in. You now have prioritized, actionable insight into your security posture. A "honey-do list", a "laundry list", call it whatever you need to, but USE it to:
- Improve technical controls
- Mature process supporting your cybersecurity program
- Draft/Update policies
- Train your staff
- Justify budget requests
- Prepare for compliance audits
- Show your customers you take security seriously
Most importantly: Don’t treat it as a one-time event. Security assessments are snapshots in time, not one-and-done exercises. Cybersecurity is an ongoing process, regardless of what any vendor tries to sell you. Use the insights to build a security roadmap, then revisit it regularly (at least annually).
Final Thoughts
Getting your first security assessment doesn’t mean you’re failing at security—it means you’re getting intentional about it. You’re moving from "hope" to "plan." From "we think we’re good" to "we know what to improve."
No one expects perfection. What matters is that you’re looking, learning, and taking steps forward. That’s maturity. That’s progress. And in today’s threat landscape, that mindset alone puts you ahead of a lot of organizations.
Thinking about your first assessment and not sure where to start? Let’s talk.