Links

Assignments and Roles

Roles and assignments within PlexTrac serve a vital function in organizing and optimizing the usage of the platform. By assigning specific roles to team members, organizations can effectively distribute responsibilities, maintain accountability, and streamline collaboration. Below is an expanded list of roles within PlexTrac, along with their assignments and suggestions on how to best incorporate them when using the platform.

🛠️Finding Assignee

The Finding Assignee is assigned to an individual responsible for remediating a specific finding identified in a report. Their primary responsibility is to address the identified vulnerability, implement necessary fixes or mitigation measures, and ensure that the system or application is secure.
The Finding Assignee's expertise, prompt response, effective collaboration, and thorough remediation efforts contribute to maintaining a secure environment and reducing the organization's overall risk exposure.
Best Practices:
  • If leveraging an issue-tracking platform solution (i.e., Jira or ServiceNow), integrate those tools with PlexTrac so the remediation efforts can be tracked across applications seamlessly.
  • A closed finding should retain its assignment for auditing and analytics purposes.

👍Report Operator/Owner

The Report Operator/Owner is assigned to a resource responsible for owning and managing a report throughout its lifecycle. As the primary point of contact for the report, their responsibilities span from its creation to its final delivery.
By designating a dedicated Report Operator/Owner, organizations can ensure accountability, consistency, and efficient management of reports. The Report Operator/Owner is responsible for creating, owning, managing, assuring quality, delivering, and overseeing the lifecycle of reports. This contributes to the production of precise, valuable, and well-organized reports.
Best Practices:
  • In a consultancy or MSSP environment, assign the success manager who works with the client as the report owner.
  • In an enterprise environment, the report owner may be the project manager or a team member.

✍️Report Reviewer

The Report Reviewer is assigned to a resource responsible for reviewing, editing, and collaborating on the report readout, which includes narratives and findings. Their primary responsibility is to ensure the quality, accuracy, and clarity of the report before its finalization.
The Report Reviewer's responsibilities encompass reviewing content, editing and proofreading, collaboration and feedback, ensuring consistency, compliance and quality assurance, and timely completion.
Best Practices:
  • Assign technical and copywriting-focused reviewers to ensure the quality of the final report.

👌Assessment Reviewer

The Assessment Reviewer is assigned to a resource responsible for ensuring the quality and accuracy of an assessment. As a reviewer, their primary responsibility is to thoroughly evaluate the assessment process, methodologies, findings, and associated documentation to ensure they meet the desired standards.
Best Practices:
  • Require approval of all reviewers before the assessment can be submitted.

🔴Runbook Red Team Operator

This role is assigned to an individual or a team who serves as a red team operator during a penetration test. As a red team operator, their primary responsibility is to simulate the role of an attacker or competitor, employing advanced techniques to identify vulnerabilities within a system.
They should be well-versed in various attack vectors, exploitation techniques, and reconnaissance methodologies. This expertise enables them to effectively simulate real-world threat scenarios and identify potential weaknesses in the system.

🔵Runbook Blue Team Operator

This role is assigned to an individual or a team responsible for acting as a blue team operator during a penetration test. As a blue team operator, their primary responsibility is to defend a company's information systems and maintain its security posture.
The Blue Team Operator is responsible for actively monitoring the company's information systems for potential security incidents. They leverage security monitoring tools, such as intrusion detection systems (IDS) and security information and event management (SIEM) systems, to detect and respond to threats in real time. Their expertise allows them to identify anomalous activities, investigate potential incidents, and respond effectively to mitigate risks.
© 2023 PlexTrac, Inc. All rights reserved.