Getting Started

How to get started with Cobalt software.

Use this document to visualize your journey through Cobalt to secure your systems.

You want to enhance the security of your software. You’re ready to set up penetration tests (pentests) to elevate your security posture. With pentest-driven solutions, you can comply with regulations and enhance the confidence of your customers. You want results as soon as possible.

You’ve come to the right place.

Learn more.

Overview

Our journey takes you through the steps required to create a pentest.

Workflow for creating a pentest

  1. Define your assets. Our pentesters analyze all kinds of assets, from web apps to internal networks.
  2. Select the pentest type. We offer Agile and Comprehensive Pentests.
  3. Review your asset.
  4. Set requirements for your pentest.
  5. Define details of your environment. Is your asset in production or in development? Is part of your system on a Cloud platform?
  6. Plan and scope the test. Define your desired pentest start date, and specify the pentest scope. We need time to find the best available pentesters for your assets.
  7. Review your pentest request to make sure you’ve included all information that our pentesters need.

Once you’ve set up a pentest, we start analyzing your asset. When possible, we share results even before we create your report. Here’s what you can expect.

Assuming you’ve received an email invitation, take the next step. Sign in to Cobalt.

Get in Touch

If you need help, contact us in one of the following ways:

If you find a security issue on the Cobalt platform, please report it to security@cobalt.io. Learn more about our security practices.


Sign In to Cobalt

Start the pentest process. Sign in to the Cobalt app.

Define Your Assets

Security professionals perform pentests on your assets. Collect the info they need.

Select the Pentest Type

Start setting up your pentest.

Review Your Asset

Verify asset details.

Set Pentest Requirements

Set requirements for the pentest.

Specify Pentest Details

Describe key details of your pentest.

Plan and Scope the Pentest

Set up a schedule. Scope the pentest.

Review and Submit the Pentest

Review your pentest request.

Pentest Expectations

What happens after you’ve set up your pentest.

Glossary

Learn more about the language of software security.




Was this page helpful?

Yes No Create an Issue

Last modified January.01.2023