Security Assessment generates four reports. The Comprehensive Assessment report contains all assessment findings, while the Security Controls, User Security, and Security Configurations reports filter the findings based on their respective topics. Each finding is assigned a risk level (High Risk, Medium Risk, Low Risk, Advisory, Evaluate, and Pass). The top of the report shows you the number of findings for each risk level, which helps you to see at a glance how secure your databases are. Some findings indicate that they are recommended by the Center for Internet Security (CIS), European Union's General Data Protection Regulation (GDPR), or Security Technical Implementation Guide (STIG).
The following table describes the Security Assessment reports:
|Comprehensive Assessments||Includes all findings for user accounts, privileges and roles, authorization control, data encryption, fine-grained access control, auditing, and database configuration|
|Security Controls||Filters findings based on various security controls|
|User Security||Filters findings based on users, privileges, and roles in the database|
|Security Configurations||Filters findings based on security-related configuration details|