Getting Started

How to get started with Cobalt software.

Use this document to visualize your journey through Cobalt to secure your systems.

You want to enhance the security of your software. You’re ready to set up penetration tests (pentests) to elevate your security posture. With pentest-driven solutions, you can comply with regulations and enhance the confidence of your customers. You want results yesterday.

You’ve come to the right place.

If you’re considering Cobalt, use this document to help you visualize the process. If you’ve already purchased Cobalt credits, use this document to start your journey.

While it’s helpful if you have a background in security, it’s not required to understand the pentest process. If the language of software security confuses you, refer to our Glossary .

In this Getting Started Guide, we take you through the process to create a pentest, and set expectations .

UI Flow for Pentests

When you’ve finished this Getting Started Guide, you’ll have a plan and scope that our pentesters can use to test your asset(s). When you purchase credits from Cobalt, we send you an email invitation, which you can use to Sign in to Cobalt .

Our journey then takes you through the following steps to create a pentest:

  1. Define Your Assets . Our pentesters analyze all kinds of assets, from web apps to internal networks.
  2. Create objectives for your pentest.
  3. Define details of your environment. Is your asset in production or in development? Does part of your system reside on a Cloud platform? You’ll answer these questions in this step.
  4. Start planning the test. Define your desired test intensity, which drives the number of credits to use.

Relax! Once you’ve set up a pentest, we start analyzing your asset. When possible, we share results even before we create your report. Here’s what you can expect .

Assuming you’ve received an email invitation, take the next step. Sign in to Cobalt .


Sign In to Cobalt

Start the pentest process. Sign in to the Cobalt app.

Define Your Assets

Security professionals perform pentests on your assets. Collect the info they need.

Create Pentest Objectives

Now that you’ve defined an asset, it’s time to define objectives for the pentest.

Specify Pentest Details

Describe key details of your Pentest.

Plan the Pentest

Set up a schedule. Confirm the scope.

Pentest Expectations

What happens after you’ve set up your pentest.

Glossary

Learn more about the language of software security.


Last modified October.10.2021