Recommendations should be clearly stated. This section is the most important part of the document. Your recommendations should be derived logically from the analysis of the data and be verifiable. Just remember that no organization will ever be 100% risk free. There is always the need to balance the cost of protection against the level of risk. If it is too costly or impractical to remove a vulnerability, you should say so, but include other recommendations or courses of action.
Introduction to Assessing Network Vulnerabilities
Foundations and Principles of Security
Why Risk Assessment
Risk-Assessment Methodologies
Scoping the Project
Understanding the Attacker
Performing the Assessment
Tools Used for Assessments and Evaluations
Preparing the Final Report
Post-Assessment Activities
Appendix A. Security Assessment Resources
Appendix B. Security Assessment Forms
Appendix C. Security Assessment Sample Report
Appendix D. Dealing with Consultants and Outside Vendors
Appendix E. SIRT Team Report Format Template