The Open Source Security Testing Methodology Manual (OSSTMM) provides standardized guidelines for security testing and reporting that helps create consistent, measurable results across different penetration testing engagements.
OSSTMM reporting follows a structured methodology that measures operational security across five key channels: human, physical, wireless, telecommunications, and data networks.
Key Components of OSSTMM Reports
- Scope and objectives of the security test
- Testing methodology used
- Raw test results and metrics
- Risk assessment calculations
- Security controls analysis
- Compliance verification
RAV Calculations
The Risk Assessment Value (RAV) is a core metric in OSSTMM that quantifies security levels based on operational security, controls, limitations, and vulnerabilities.
| RAV Component | Description |
|---|---|
| OpSec | Operational Security measurement |
| Loss Controls | Mechanisms that reduce loss potential |
| True Controls | Actually verified security measures |
Practical Implementation Tips
- Use automated tools like STAR to calculate RAV scores
- Document all test cases with exact timestamps
- Include screenshots and logs as evidence
- Map findings to specific control categories
- Maintain proper segregation between test environments
Report Sections
- Executive Summary: High-level overview of findings
- Methodology: Detailed testing approach
- Technical Findings: Discovered vulnerabilities
- Risk Analysis: RAV calculations and interpretations
- Recommendations: Actionable remediation steps
Common Pitfalls to Avoid
- Skipping verification steps for assumed controls
- Mixing test results from different scope items
- Incorrect RAV calculations due to control misclassification
- Missing documentation of test limitations
Contact ISECOM at [email protected] for official OSSTMM training and certification programs.
Find the latest OSSTMM documentation at www.osstmm.org.
Testing Process
The OSSTMM testing process follows a systematic approach that ensures comprehensive coverage and repeatable results across different security assessments.
Four Phases
- Induction Phase: Scope definition and resource planning
- Interaction Phase: Active testing and data collection
- Inquiry Phase: Deep analysis and verification
- Intervention Phase: Control testing and validation
Quality Metrics
OSSTMM emphasizes measuring the quality and completeness of security tests through specific metrics:
- Test Coverage Index (TCI)
- Control Validation Percentage
- False Positive Ratio
- Test Depth Indicators
Integration with Other Frameworks
OSSTMM can be integrated with other security frameworks and standards:
- ISO 27001 compliance mapping
- NIST framework alignment
- PCI DSS requirements correlation
- GDPR controls validation
Conclusion
OSSTMM provides a structured approach to security testing that enables organizations to:
- Generate consistent and measurable security metrics
- Maintain testing quality across different engagements
- Produce standardized reports for stakeholder communication
- Make data-driven security investment decisions
Regular updates to testing methodologies and proper documentation ensure the continued effectiveness of OSSTMM-based security assessments.
FAQs
- What is OSSTMM and what makes it different from other security testing methodologies?
OSSTMM (Open Source Security Testing Methodology Manual) is a peer-reviewed methodology for performing security tests and metrics. It differs by providing a scientific approach to testing operational security, with precise measurements and quantifiable results rather than just vulnerability identification. - What are the key sections covered in an OSSTMM report?
An OSSTMM report covers five key channels: Human Security (physical and psychological), Physical Security (tangible), Wireless Communications, Telecommunications, and Data Networks. Each channel includes tests for security controls, processes, and regulatory compliance. - What is RAV (Risk Assessment Value) in OSSTMM reporting?
RAV is a mathematical measurement used in OSSTMM to calculate the actual security level of a target. It considers security controls, limitations, and vulnerabilities to provide a quantifiable security metric that can be compared across different environments. - How does OSSTMM categorize security controls?
OSSTMM categorizes security controls into Class A (Interactive), Class B (Process), and Class C (Physical) controls. Each class is further divided into CLAMP categories: Classification, Location, Access, Management, and Process controls. - What is OpSec measurement in OSSTMM reporting?
OpSec measurement in OSSTMM is the calculation of operational security by measuring actual security controls against required security controls, considering factors like visibility, access, and trust to determine the overall security posture. - How does OSSTMM handle compliance reporting?
OSSTMM reporting includes compliance mapping sections that correlate test results with various regulatory requirements and standards such as ISO27001, HIPAA, and PCI DSS, making it easier to demonstrate compliance through security testing. - What is the Trust Verification section in OSSTMM reports?
Trust Verification in OSSTMM reports examines and documents the validation of trust relationships between systems, processes, and personnel. It measures both direct and indirect trust relationships that could impact security. - How are OSSTMM test results scored and measured?
OSSTMM uses a consistent scoring system based on actual security measurements (ravs), porosity (attack surface), and controls. The scoring is mathematical and reproducible, allowing for objective comparison between different tests and environments. - What is the difference between Full OSSTMM testing and Partial OSSTMM testing?
Full OSSTMM testing covers all five channels and their subcomponents comprehensively, while Partial OSSTMM testing focuses on specific channels or areas based on the scope requirements and can be used for targeted assessments. - How does OSSTMM handle vulnerability reporting?
OSSTMM reports vulnerabilities within the context of operational security, considering not just the technical aspects but also the impact on operations, existing controls, and their interaction with other security elements.







