1. National Institute of Standards and Technology (NIST) Special Publication 800-115
"Technical Guide to Information Security Testing and Assessment." This guide outlines the security assessment methodology. The post-execution phase consists of Analysis and then Reporting. Section 5.2
"Analysis
" states
"The analysis phase examines the data gathered during the execution phase [e.g.
vulnerability scan]... to identify vulnerabilities." Section 5.3
"Reporting
" follows
stating
"The reporting phase documents the results of the assessment." This clearly places analysis/assessment after the scan and before reporting.
2. Kim
D.
& Solomon
M. G. (2016). Fundamentals of information systems security (3rd ed.). Jones & Bartlett Learning. Chapter 10
"Vulnerability Assessment and Penetration Testing
" describes the vulnerability assessment process. The steps are outlined as: 1. Asset Identification
2. Vulnerability Scanning
3. Vulnerability Analysis and Prioritization
4. Reporting
5. Remediation. This academic source confirms that analysis is the direct next step after scanning.
3. OWASP. (2014). OWASP Testing Guide v4. Section 4.1
"Introduction and Objectives
" details the testing framework phases. After information gathering and discovery (which includes scanning)
the next phase is "Exploitation/Analysis
" where findings are validated and their impact is assessed before the final "Reporting" phase. This industry-standard guide for web application security follows the same logical progression.