NIST / CISA Aligned

Ethical Hacking Audit Builder

A complete, integrated audit skill set covering the full lifecycle from network scanning through risk reporting. Six skills. One unified pipeline. Full NIST framework alignment.

6 Integrated Skills NIST SP 800-115 NIST CSF 2.0 CIS Benchmarks
11
Total Risks Found
2
Critical Findings
7
High Findings
30
Config Checks Run
80.6%
IR Maturity
55%
Policy Coverage
Skill Set

Six Integrated Audit Skills

Each skill covers a distinct phase of the audit lifecycle, aligned with specific NIST frameworks and producing structured, importable outputs.

Integration Pipeline

Unified Data Flow

All skills integrate through structured JSON output. Findings from every audit phase flow into the central Risk Assessment engine for consolidated scoring and reporting.

Network Vuln ScannerRisk Assessmentimport-findings
Penetration TestingRisk Assessmentimport-findings
Config AuditorRisk Assessmentadd-risk
Policy AuditorRisk Assessmentadd-risk
IR AuditorRisk Assessmentadd-risk
Data flow pipeline visualization
Live Demo Results

Audit Findings Dashboard

Real results from running all six skills against a simulated environment. Each tab shows the output from a different audit phase.

Port Scan Results — 127.0.0.1
NIST 800-115
PortProtoStateServiceVersion
22tcpopensshOpenSSH 8.9p1
5900tcpopenvncVNC
5901tcpopenhttpGolang net/http
8333tcpopenbitcoin

HIGH: VNC Port 5900 Exposed

Risky port open and externally accessible. Use VPN and strong authentication. NIST SC-7.

Network scan visualization
Scan Summary
Hosts Discovered1
Open Ports4
Vulnerabilities1
OS DetectionLinux 2.6.32 (96%)
Consolidated Risk Register

11 Risks Identified

All findings from the six audit skills consolidated into a single, prioritized risk register scored using the NIST 5x5 risk matrix.

RISK-002SQL Injection in Login FormCRITICAL25
RISK-005Default Admin CredentialsCRITICAL25
RISK-001VNC Port Exposed (5900)HIGH16
RISK-003XSS in SearchHIGH16
RISK-004Outdated TLS 1.0HIGH16
RISK-007Weak Password PolicyHIGH16
RISK-008SSH Root Login EnabledHIGH15
RISK-009Missing 9 NIST Control FamiliesHIGH15
RISK-010IR Plan Missing Supply Chain ProceduresHIGH12
RISK-006Missing HTTP Security HeadersMEDIUM9
RISK-011ICMP Redirects AcceptedMEDIUM6
Risk dashboard
Risk Scoring Guide
20-25CRITICALImmediate mitigation
12-19HIGH30-day mitigation plan
6-11MEDIUM90-day plan
1-5LOWAccept or next cycle
8-Phase Playbook

Audit Execution Workflow

Follow the structured 8-phase playbook for a complete, repeatable ethical hacking audit.

1

Scope & Authorization

Define scope, obtain written authorization, set ROE

Manual
2

Network Scanning

Run network-vuln-scanner against target subnets

network-vuln-scanner
3

Config Auditing

Run security-config-auditor on all in-scope systems

security-config-auditor
4

Penetration Testing

Execute penetration-testing workflow per NIST 800-115

penetration-testing
5

Policy Review

Audit governance docs with policy-governance-auditor

policy-governance-auditor
6

IR Readiness

Assess IR plan with incident-response-auditor

incident-response-auditor
7

Risk Assessment

Import all findings, score and prioritize

risk-assessment-reporting
8

Deliverables

Compile reports, risk register, and POA&M

All Skills
Framework Alignment

NIST & CISA Compliance Mapping

Every skill maps directly to established cybersecurity frameworks, ensuring audit results are defensible and compliance-ready.

SkillPrimary FrameworkSecondaryKey ControlsCSF Functions
Net ScanNIST SP 800-115NIST 800-53 (RA, CA)RA-5, CA-8, SI-2
IdentifyDetect
Config AuditCIS BenchmarksNIST 800-53 (CM, SC, AC)CM-6, CM-7, SC-7, AC-3
Protect
Pen TestNIST SP 800-115OWASP Top 10, CISA KEVCA-8, RA-5, SI-10
IdentifyRespond
Policy AuditNIST CSF 2.0NIST 800-53 (All families)PM-1, PL-1, PL-2, AT-1
GovernProtect
IR AuditNIST SP 800-61 Rev 3CISA IR GuidelinesIR-1 through IR-8
DetectRespondRecover
Risk ReportNIST SP 800-37 (RMF)NIST 800-30, FIPS 199RA-3, PM-9, CA-5
IdentifyGovern