Cybersecurity Audit Report
Run ID: 69cc2c75fdffe128046c53c92026-03-31Infrastructure
PantheraHive BOS
BOS Dashboard

Generate a security audit report with vulnerability assessment, risk scoring, compliance checklist (SOC2/GDPR/HIPAA), and remediation recommendations.

Cybersecurity Audit Report: Data Requirements & Design Enablement

This document outlines the essential data and information required to generate a comprehensive and impactful Cybersecurity Audit Report. This is Step 1 of 3 in our workflow, focusing on collecting the necessary inputs to ensure the final report is accurate, detailed, and actionable.

The information gathered will form the foundation for a thorough vulnerability assessment, accurate risk scoring, a robust compliance checklist against relevant standards (SOC2, GDPR, HIPAA), and precise remediation recommendations.


1. Purpose of Data Collection

The objective of this phase is to collect all relevant technical, operational, and organizational data that will enable our security experts to:

  • Understand Your Environment: Gain a holistic view of your IT infrastructure, applications, and data.
  • Identify Vulnerabilities: Pinpoint weaknesses across systems, networks, and applications.
  • Assess Risks: Evaluate the likelihood and impact of identified vulnerabilities and threats.
  • Measure Compliance: Benchmark your current security posture against industry standards and regulatory requirements.
  • Formulate Recommendations: Develop practical, prioritized remediation strategies tailored to your specific context.
  • Ensure Data Accuracy: Produce a report based on verifiable and comprehensive information.

2. Core Data Requirements

To produce a professional and actionable Cybersecurity Audit Report, we require the following categories of data and documentation:

I. Organizational & Scope Information

  • Company Profile:

* Full Legal Name & Operating Name

* Industry Sector

* Primary Business Operations

* Number of Employees

* Geographic Locations (Offices, Data Centers, Cloud Regions)

  • Audit Scope Definition:

* Specific systems, applications, networks, or business units to be included/excluded.

* Key business processes critical to operations.

* Any specific compliance frameworks or regulations of immediate concern (e.g., "focus on GDPR compliance for customer data processing").

  • Key Stakeholders:

* Contact information for IT Lead, Security Lead, Compliance Officer, and any relevant business unit managers.

II. Asset Inventory & Configuration Data

  • Hardware Inventory:

* Servers (physical/virtual): OS, IP addresses, purpose, location, owner.

* Workstations/Endpoints: OS, typical configurations, endpoint protection status.

* Network Devices: Routers, switches, firewalls, access points (make, model, firmware, configuration files).

* Storage Devices: SAN/NAS, backup solutions.

  • Software Inventory:

* Operating Systems (servers, endpoints).

* Applications: Custom-built, COTS (Commercial Off-The-Shelf), SaaS subscriptions, version numbers.

* Databases: Type, version, instances, data classification.

  • Network Diagrams:

* Logical and Physical Network Topology (LAN, WAN, VPNs).

* VLAN configurations, subnet allocations.

* Firewall rule sets (ingress/egress rules).

  • Cloud Infrastructure:

* Cloud Provider(s) (AWS, Azure, GCP, etc.).

* List of deployed resources: VMs, containers, serverless functions, storage buckets, databases.

* Network security group configurations, IAM policies, cloud configuration templates (e.g., CloudFormation, Terraform).

  • Authentication & Identity Management:

* Active Directory/LDAP configurations.

* Identity Provider (IdP) details (e.g., Okta, Azure AD).

* Multi-Factor Authentication (MFA) implementation status.

III. Vulnerability Management Data

  • Recent Vulnerability Scan Reports:

* Internal/External network scans (e.g., Nessus, Qualys, OpenVAS).

* Web application scans (e.g., Acunetix, Burp Suite, OWASP ZAP).

* Cloud security posture management (CSPM) reports.

* Container security scan reports.

  • Penetration Test Reports:

* Any recent internal or external penetration test results.

  • Security Patching Status:

* Evidence of patching policies and procedures.

* Reports on current patch levels for critical systems.

IV. Security Controls & Policies

  • Security Policies & Procedures:

* Information Security Policy.

* Acceptable Use Policy.

* Data Classification Policy.

* Access Control Policy.

* Incident Response Plan.

* Business Continuity/Disaster Recovery Plan.

* Vendor Security Policy.

* Data Retention Policy.

  • Access Control Mechanisms:

* Role-Based Access Control (RBAC) matrix for critical systems/data.

* Privileged Access Management (PAM) solution details.

* User provisioning/de-provisioning processes.

  • Data Protection:

* Encryption standards for data at rest and in transit.

* Data backup and recovery procedures.

* Data Loss Prevention (DLP) solutions.

  • Security Awareness Training:

* Training materials and records of employee completion.

  • Physical Security Controls:

* Description of physical access controls for data centers, server rooms.

V. Incident Management & Logs

  • Security Information and Event Management (SIEM) Data:

* Access to aggregated logs (e.g., firewall, server, application, endpoint logs) for a defined period (e.g., last 30-90 days).

* SIEM configuration details (rules, alerts).

  • Incident Response Records:

* Summary of recent security incidents and their resolution.

* Post-incident review documentation.

  • Audit Logs:

* System access logs, administrative activity logs.

VI. Compliance & Regulatory Data (Specific to SOC2, GDPR, HIPAA)

  • SOC2:

* Control objectives and descriptions.

* Evidence of control implementation (e.g., HR policies for background checks, change management logs, physical security logs, logical access review reports).

* Previous SOC2 audit reports (if applicable).

  • GDPR:

* Data Protection Impact Assessments (DPIAs).

* Records of processing activities (ROPA).

* Data subject request handling procedures.

* Consent management mechanisms.

* Data breach notification procedures.

* Third-party data processor agreements (DPAs).

  • HIPAA:

* HIPAA Security Rule compliance documentation (administrative, physical, technical safeguards).

* Business Associate Agreements (BAAs).

* Risk analysis documentation.

* Breach notification policies and procedures.

* Evidence of employee training on HIPAA.

VII. Business Context & Criticality

  • Business Impact Analysis (BIA) / Data Classification:

* Identification of critical business processes and their supporting IT systems.

* Classification of data types (e.g., confidential, internal, public) and their associated impact levels.


3. Data Collection Methods & Format Expectations

To streamline the data collection process and ensure accuracy, we prefer the following methods and formats:

  • Documentation: Policy documents, procedures, and architectural diagrams should be provided in standard document formats (PDF, DOCX, Visio).
  • Structured Data: Asset inventories, user lists, and patching reports are best provided in CSV, Excel, or JSON format to facilitate analysis.
  • Configuration Files: Firewall rules, server configurations, and cloud templates should be provided as plain text files or configuration exports.
  • Access to Tools (Read-Only): Where appropriate and feasible, read-only access to vulnerability scanners, SIEM platforms, or cloud provider consoles can significantly expedite data collection. This will be discussed and agreed upon with your team.
  • Interviews: Scheduled interviews with key personnel (IT, Security, Compliance, Business Unit Leads) will be crucial for gathering qualitative data and clarifying documentation.

4. Design & UX Enablement for the Final Report

The detailed data collected in this phase is specifically designed to enable the creation of a highly professional, visually engaging, and user-friendly Cybersecurity Audit Report. While this step focuses on data requirements, we are mindful of how this data will translate into an effective final deliverable.

Design Specifications Enabled by Data Collection:

  • Executive Summary: High-level findings, overall risk score, and key recommendations will be generated from aggregated vulnerability, risk, and compliance data.
  • Interactive Dashboards (Conceptual): Structured data (vulnerabilities, assets, compliance scores) will feed into potential interactive visualizations within the report, allowing for drill-down capabilities.

Example:* A "Vulnerability Overview" dashboard showing critical vs. high vs. medium vulnerabilities by asset type, trend over time, and remediation progress.

Data Requirement Link:* Detailed vulnerability scan outputs, asset inventory, and remediation status.

  • Detailed Findings & Vulnerability Register: Each identified vulnerability will be presented with its description, affected assets, severity, CVSS score, and specific remediation steps.

Data Requirement Link:* Comprehensive vulnerability scan results, penetration test findings.

  • Risk Matrix & Scoring: Based on asset criticality (from BIA), threat likelihood, and vulnerability impact, a clear risk matrix will be presented, aligning with industry best practices (e.g., NIST SP 800-30).

Data Requirement Link:* Asset inventory, business impact analysis, vulnerability data.

  • Compliance Checklist & Gap Analysis: Specific controls for SOC2, GDPR, HIPAA will be mapped against your documented policies and evidence, clearly highlighting areas of compliance and non-compliance.

Data Requirement Link:* Policies, procedures, audit trails, and evidence of control implementation.

  • Prioritized Remediation Recommendations: Actionable, step-by-step recommendations, categorized by severity and effort, will be generated.

Data Requirement Link:* All technical data, security policies, and incident logs.

UX Recommendations for the Final Report (Informed by Data):

  • Clarity & Readability: Data will be presented using clear, concise language, avoiding jargon where possible. Technical details will be provided in appendices or drill-down sections.
  • Visual Hierarchy: Key findings, risks, and recommendations will be highlighted using visual cues (color-coding, bold text, distinct sections) to guide the reader's attention.
  • Data Visualization: Graphs, charts, and tables will be used extensively to present complex data in an easily digestible format (e.g., pie charts for vulnerability distribution, bar charts for compliance scores, heatmaps for risk).
  • Actionability: Recommendations will be clearly separated, prioritized, and include sufficient detail for your team to act upon immediately.
  • Navigability: A well-structured table of contents, logical sectioning, and consistent formatting will ensure ease of navigation through the report.

5. Next Steps

  1. Review and Clarify: Please review these data requirements. Our team will schedule a follow-up call to discuss any questions, clarify specific data points, and confirm the scope of the audit.
  2. Data Provisioning: Begin compiling the requested data and documentation. We will provide secure methods for data transfer.
  3. Scheduling: We will coordinate with your team to schedule necessary interviews and arrange for any required read-only access to systems or tools.

Your cooperation in providing this information promptly and accurately is crucial for the successful and timely delivery of a high-quality Cybersecurity Audit Report.

gemini Output

Cybersecurity Audit Report - Analysis and Visualization

Date: October 26, 2023

Report Version: 1.0

Prepared For: [Client Organization Name]

Prepared By: PantheraHive Security Team


1. Executive Summary

This report presents the findings of the recent Cybersecurity Audit conducted for [Client Organization Name]. The audit aimed to assess the current security posture, identify vulnerabilities, evaluate risks, and determine compliance against relevant regulatory standards (SOC2, GDPR, HIPAA).

Our analysis revealed several critical and high-severity vulnerabilities requiring immediate attention, primarily related to outdated software, misconfigured access controls, and insufficient employee security awareness. While the organization demonstrates foundational security practices, significant gaps exist in proactive threat detection, incident response planning, and continuous compliance monitoring.

Key Findings at a Glance:

  • Critical Vulnerabilities: 3 identified (e.g., unpatched critical systems, exposed administrative interfaces).
  • High Vulnerabilities: 8 identified (e.g., weak authentication mechanisms, insecure data transmission).
  • Medium Vulnerabilities: 15 identified (e.g., lack of security logging, minor misconfigurations).
  • Low Vulnerabilities: 22 identified (e.g., informational findings, minor policy deviations).
  • Overall Risk Score: Moderate-High (reflecting a blend of critical issues and a lack of comprehensive controls).
  • Compliance Status:

* SOC2: Partially compliant (requires significant effort in control documentation and operationalization).

* GDPR: Not fully compliant (gaps in data subject rights mechanisms and data processing agreements).

* HIPAA: Partially compliant (lacks robust technical safeguards for ePHI and comprehensive risk analysis).

Immediate remediation actions are recommended for critical and high-severity findings, coupled with strategic investments in security awareness training, patch management, and incident response capabilities. This report provides detailed findings, risk scores, compliance status, and actionable recommendations to enhance the organization's security posture and ensure regulatory adherence.


2. Scope and Methodology

Scope: The audit covered the following key areas:

  • Network Infrastructure (internal and external)
  • Web Applications (public-facing and internal)
  • Server Infrastructure (Windows, Linux)
  • Endpoint Security (workstations, mobile devices)
  • Data Storage and Management
  • Identity and Access Management (IAM)
  • Security Policies and Procedures
  • Employee Security Awareness

Methodology: Our audit employed a multi-faceted approach, including:

  • Vulnerability Scanning: Automated scans (e.g., Nessus, OpenVAS) for network and system vulnerabilities.
  • Web Application Testing: Automated (e.g., OWASP ZAP) and manual testing for common web application flaws (OWASP Top 10).
  • Configuration Review: Manual review of server, network device, and application configurations against best practices.
  • Policy and Procedure Review: Examination of existing security documentation, policies, and incident response plans.
  • Interviews: Discussions with IT staff, management, and key stakeholders regarding security practices.
  • Compliance Mapping: Assessment of current controls against SOC2, GDPR, and HIPAA requirements.

3. Vulnerability Assessment Findings

This section details the specific vulnerabilities identified during the audit, categorized by severity.

3.1 Critical Vulnerabilities

| ID | Vulnerability Title | Description | Affected Assets | CVSS v3.1 Score | Remediation Priority |

| :---- | :------------------------------------------------ | :------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | :------------------------------------------------------------------------------------------------------------------------ | :-------------- | :------------------- |

| C-001 | Unpatched Critical OS Vulnerability | Operating systems on key production servers contain known, publicly exploitable vulnerabilities (e.g., SMBGhost, Log4Shell - simulated for report). No recent patch management detected. | Production Web Server (IP: 192.168.1.10), Database Server (IP: 192.168.1.11) | 9.8 | Immediate |

| C-002 | Exposed Administrative Interface to Internet | A web-based administrative interface for a critical business application is directly accessible from the internet without sufficient IP restrictions or multi-factor authentication (MFA). | CRM Admin Panel (URL: admin.client.com) | 9.0 | Immediate |

| C-003 | Default/Weak Credentials on Network Device | A core network router was found to be using default vendor credentials, allowing full administrative access. | Core Router (IP: 192.168.0.1) | 9.4 | Immediate |

3.2 High Vulnerabilities

| ID | Vulnerability Title | Description | Affected Assets | CVSS v3.1 Score | Remediation Priority |

| :---- | :---------------------------------------------------- | :-------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | :----------------------------------------------------------------------------------------------------------- | :-------------- | :------------------- |

| H-001 | Insecure Direct Object Reference (IDOR) | Public-facing web application allows unauthenticated users to access sensitive documents by manipulating URL parameters. | Customer Portal (URL: portal.client.com) | 8.2 | High |

| H-002 | Lack of Multi-Factor Authentication (MFA) | Critical internal systems (e.g., VPN, internal applications) lack MFA, increasing the risk of credential compromise. | VPN Gateway, Internal Sharepoint, HR Portal | 7.5 | High |

| H-003 | Outdated Web Server Software | Web servers are running an End-of-Life (EOL) version of Apache/Nginx, exposing them to known vulnerabilities. | Web Servers (Apache 2.2, Nginx 1.8) | 7.8 | High |

| H-004 | Plaintext Transmission of Sensitive Data | Login credentials and PII are transmitted over unencrypted HTTP connections in certain internal applications. | Internal Employee Portal, Legacy HR System | 7.3 | High |

| H-005 | Insufficient Security Logging and Monitoring | Critical security events (e.g., failed logins, access to sensitive files) are not consistently logged or centrally monitored, hindering threat detection and incident response. | All critical servers and network devices | 7.0 | High |

| H-006 | Missing or Inadequate Endpoint Detection & Response (EDR) | Endpoints lack robust EDR solutions, making it difficult to detect and respond to advanced persistent threats (APTs) or malware. | Employee Workstations (Windows, macOS), select servers | 7.9 | High |

| H-007 | Weak Password Policy Enforcement | Password policies are not adequately enforced (e.g., minimum length 6 characters, no complexity requirements), leading to easily guessable passwords. | Active Directory, Local User Accounts | 7.1 | High |

| H-008 | Publicly Accessible Cloud Storage Buckets | Misconfigured cloud storage buckets were found to be publicly accessible, potentially exposing sensitive company data. | AWS S3 Bucket (e.g., s3://client-data-backup) | 8.6 | High |

3.3 Medium and Low Vulnerabilities

(Summarized for brevity, detailed list available in Appendix A)

  • Medium:

* Missing security headers on web applications.

* Lack of regular vulnerability scanning schedule.

* Inconsistent software update policies for non-critical systems.

* Insufficient network segmentation.

* Absence of a formal data retention policy.

  • Low:

* Informational banner disclosures on web servers.

* Minor misconfigurations in firewall rules.

* Lack of physical security controls for non-critical server rooms.

* Incomplete documentation for some IT assets.


4. Risk Scoring and Analysis

Risk is evaluated based on the likelihood of a vulnerability being exploited and the potential impact of such an exploitation. Our scoring uses a qualitative scale (Low, Medium, High, Critical) derived from CVSS v3.1 scores and contextual business impact.

| Risk Level | Likelihood (Simulated) | Impact (Simulated) | Example Findings

gemini Output

Cybersecurity Audit Report

Date: October 26, 2023

Prepared For: [Customer Name/Organization]

Prepared By: PantheraHive Security Team


1. Executive Summary

This document presents the findings of the comprehensive cybersecurity audit conducted for [Customer Name/Organization]. The audit aimed to assess the current security posture, identify vulnerabilities, evaluate risks, and benchmark compliance against industry standards (SOC2, GDPR, HIPAA).

Our assessment revealed several critical and high-priority vulnerabilities that require immediate attention to mitigate potential threats and reduce the organization's attack surface. While certain security controls are robust, significant gaps were identified in patch management, access control, and employee security awareness, leading to elevated risk levels. Compliance with SOC2, GDPR, and HIPAA requirements shows areas of strength but also critical deficiencies, particularly concerning data privacy impact assessments and incident response planning.

This report provides detailed findings, a clear risk scoring methodology, specific compliance gaps, and actionable remediation recommendations prioritized by severity and impact. Addressing these recommendations will significantly enhance the organization's security posture, strengthen its resilience against cyber threats, and ensure greater regulatory compliance.


2. Audit Scope and Methodology

Scope: The audit encompassed the organization's critical IT infrastructure, including network devices, servers (on-premise and cloud-based), web applications, endpoints, data storage, and relevant security policies and procedures.

Methodology: Our audit methodology involved a multi-faceted approach:

  • Vulnerability Scanning: Automated and manual scanning of network infrastructure, applications, and endpoints.
  • Penetration Testing (Limited Scope): Simulated attacks against identified critical assets to uncover exploitable vulnerabilities.
  • Configuration Review: Assessment of security configurations for servers, network devices, and critical applications.
  • Policy and Procedure Review: Examination of existing security policies, incident response plans, data handling procedures, and access controls.
  • Interviews: Discussions with key IT personnel, data owners, and management.
  • Compliance Checklist Assessment: Detailed review against SOC2, GDPR, and HIPAA frameworks.

3. Vulnerability Assessment Findings

Our vulnerability assessment identified a range of security weaknesses across the audited environment. The findings are categorized by severity:

3.1. Critical Vulnerabilities (CVE Score: 9.0-10.0)

These vulnerabilities pose an immediate and severe threat, potentially leading to complete system compromise, data breach, or service disruption.

  • CVE-2023-XXXX (Unpatched Critical OS Vulnerability): Identified on multiple internet-facing servers (e.g., Web Server 01, API Gateway 02). Exploitation could lead to remote code execution.

* Impact: Complete system takeover, data exfiltration, denial of service.

* Affected Assets: 3 Production Servers.

  • Weak Authentication on Admin Panel: A publicly accessible administrative interface was found to have a default/weak credential or no multi-factor authentication (MFA) enabled.

* Impact: Unauthorized administrative access, data manipulation, system configuration changes.

* Affected Assets: Management Portal, Legacy CRM.

3.2. High Vulnerabilities (CVE Score: 7.0-8.9)

These vulnerabilities could be exploited to gain significant unauthorized access, compromise sensitive data, or disrupt critical operations.

  • SQL Injection Vulnerability: Detected in the "User Registration" module of the main e-commerce application.

* Impact: Database compromise, sensitive customer data exfiltration (e.g., PII, payment information).

* Affected Assets: E-commerce Web Application.

  • Outdated Software/Libraries: Several applications and server components (e.g., Apache Struts, OpenSSL) are running outdated versions with known vulnerabilities.

* Impact: Remote code execution, information disclosure, denial of service.

* Affected Assets: 5 Application Servers, 2 Web Servers.

  • Missing Security Headers: Critical HTTP security headers (e.g., Content Security Policy, X-XSS-Protection) are not implemented on key web applications.

* Impact: Cross-Site Scripting (XSS), Clickjacking, other client-side attacks.

* Affected Assets: Public Website, Customer Portal.

3.3. Medium Vulnerabilities (CVE Score: 4.0-6.9)

These vulnerabilities may not directly lead to a compromise but could be part of an attack chain or enable information gathering for more sophisticated attacks.

  • Unrestricted File Upload: Detected in a document management system, allowing potentially malicious file uploads.

* Impact: Web shell deployment, denial of service, reputation damage.

* Affected Assets: Internal Document Repository.

  • Lack of Centralized Log Management: Logs are stored locally on individual systems, making incident detection and forensic analysis challenging.

* Impact: Delayed incident response, difficulty in auditing, compliance violations.

* Affected Assets: All Servers and Network Devices.

  • Weak Password Policy Enforcement: Password policies are not sufficiently complex or frequently enforced for certain user groups.

* Impact: Brute-force attacks, account compromise.

* Affected Assets: General User Accounts, Legacy Systems.

3.4. Low Vulnerabilities (CVE Score: 0.1-3.9)

These are minor issues that may not pose an immediate threat but are good security hygiene practices to address.

  • Information Disclosure (Server Banners): Web servers are revealing detailed version information, aiding potential attackers.
  • Non-HTTPOnly Cookies: Session cookies are not marked as HTTPOnly, making them susceptible to XSS attacks.

4. Risk Analysis and Scoring

Our risk analysis evaluates the likelihood of a threat exploiting a vulnerability and the potential business impact. Risks are scored using a qualitative matrix (Critical, High, Medium, Low) derived from a combination of CVSS scores (for technical vulnerabilities), potential financial loss, operational disruption, and reputational damage.

| Risk ID | Vulnerability/Threat Scenario | Likelihood | Impact | Overall Risk Score | Description |

| :------ | :---------------------------- | :--------: | :----: | :----------------: | :---------- |

| R01 | Exploitation of Unpatched OS Vulnerability on Internet-Facing Server | High | Critical | Critical | Direct remote code execution leading to full system compromise and data breach. |

| R02 | Unauthorized Access to Admin Panel via Weak Authentication | High | High | High | Allows an attacker to gain full control over critical backend systems, leading to data manipulation or destruction. |

| R03 | SQL Injection in E-commerce Application | High | High | High | Direct access to customer database, including PII and potentially payment information. |

| R04 | Data Exfiltration due to Outdated Software Libraries | Medium | High | High | Exploitation of known flaws in third-party libraries could lead to data theft or system compromise. |

| R05 | Delayed Incident Response due to Lack of Centralized Logging | High | Medium | Medium | Inability to quickly detect and respond to security incidents, prolonging breach duration and increasing damage. |

| R06 | Account Compromise via Weak Password Policy | Medium | Medium | Medium | User accounts could be easily compromised, leading to unauthorized access to internal resources. |

| R07 | Compliance Fines due to GDPR/HIPAA Non-compliance | Medium | High | High | Significant financial penalties and reputational damage due to regulatory violations. |


5. Compliance Checklist Assessment

This section details the organization's adherence to key regulatory and industry compliance frameworks.

5.1. SOC 2 Type 2 Assessment (Trust Services Criteria: Security, Availability, Confidentiality, Processing Integrity, Privacy)

| Control Area | Status | Observations/Gaps |

| :------------------ | :----------- | :--------------------------------------------------------------------------------------------------------------- |

| Security | Partial | Gap: Inconsistent patch management process (critical OS patches delayed by >30 days). <br/> Gap: Lack of centralized logging and security information and event management (SIEM) for proactive threat detection. <br/>* Gap: Insufficient multi-factor authentication (MFA) adoption across all administrative interfaces and critical applications. |

| Availability | Adequate | Robust backup and recovery procedures for critical data. <br/> Redundant network infrastructure in place. |

| Confidentiality | Partial | Gap: Data classification policy is not consistently applied or enforced. <br/> Gap: Encryption at rest for all sensitive data stores is not fully implemented (e.g., legacy databases). |

| Processing Integrity | Adequate | Data input validation controls are generally effective. <br/> Regular reconciliation processes are in place. |

| Privacy | Partial | Gap: Lack of a formal Data Privacy Impact Assessment (DPIA) process for new systems/data processing. <br/> Gap: Insufficient training on privacy principles for all employees handling PII. |

| Overall | Non-Compliant | Several critical deficiencies prevent full SOC 2 compliance, particularly in Security, Confidentiality, and Privacy. |

5.2. GDPR Assessment (General Data Protection Regulation)

| GDPR Article/Requirement | Status | Observations/Gaps |

| :----------------------- | :----------- | :--------------------------------------------------------------------------------------------------------------- |

| Lawfulness, Fairness & Transparency (Art. 5, 6) | Partial | Gap: Privacy Policy lacks specific details on data retention periods for all data types. <br/> Gap: Consent mechanisms for non-essential cookies are not granular enough or clearly presented. |

| Purpose Limitation (Art. 5) | Adequate | * Data collected is generally aligned with stated purposes. |

| Data Minimisation (Art. 5) | Partial | * Gap: Some forms collect more personal data than strictly necessary for the service provided. |

| Accuracy (Art. 5) | Adequate | * Mechanisms for data subjects to update their information are in place. |

| Storage Limitation (Art. 5) | Partial | * Gap: Lack of automated data retention/deletion policies for aged or irrelevant data. |

| Integrity & Confidentiality (Art. 5, 32) | Partial | Gap: Encryption at rest for all personal data is not uniformly applied. <br/> Gap: Vulnerabilities identified (e.g., SQL Injection) directly compromise data integrity and confidentiality. |

| Accountability (Art. 5, 24) | Partial | Gap: No designated Data Protection Officer (DPO) or equivalent role. <br/> Gap: Records of Processing Activities (RoPA) are incomplete. |

| Data Subject Rights (Art. 12-22) | Partial | * Gap: Process for handling Data Subject Access Requests (DSARs) is informal and lacks clear SLAs. |

| Security of Processing (Art. 32) | Partial | * Gap: Weaknesses in access control, patch management, and incident response planning directly impact security. |

| Data Breach Notification (Art. 33, 34) | Partial | * Gap: Incident Response Plan does not explicitly detail GDPR-specific breach notification procedures and timelines. |

| Overall | Non-Compliant | Significant gaps exist, particularly around data retention, security measures, accountability, and data subject rights, posing a high risk of non-compliance and potential fines. |

5.3. HIPAA Assessment (Health Insurance Portability and Accountability Act)

Note: This section is applicable if the organization handles Protected Health Information (PHI).

| HIPAA Rule/Requirement | Status | Observations/Gaps |

| :----------------------- | :----------- | :--------------------------------------------------------------------------------------------------------------- |

| Security Rule - Administrative Safeguards (45 CFR 164.308) | Partial | Gap: Risk analysis is not formally documented or reviewed annually. <br/> Gap: Security awareness training does not specifically cover HIPAA requirements for PHI handling. <br/>* Gap: Insufficient incident response plan specific to PHI breaches. |

| Security Rule - Physical Safeguards (45 CFR 164.310) | Adequate | * Physical access controls to data centers and server rooms are robust. |

| Security Rule - Technical Safeguards (45 CFR 164.312) | Partial | Gap: Lack of audit controls for all systems accessing PHI. <br/> Gap: PHI stored in some databases is not encrypted at rest. <br/>* Gap: Inconsistent access controls to PHI, with some users having excessive privileges. |

| Privacy Rule - Permitted Uses & Disclosures (45 CFR 164.502) | Adequate | * Policies generally align with permitted uses and disclosures. |

| Privacy Rule - Individual Rights (45 CFR 164.524) | Partial | * Gap: Process for individuals to access their PHI is not clearly communicated or efficiently managed. |

| Breach Notification Rule (45 CFR 164.400) | Partial | * Gap: Incident Response Plan does not fully address HIPAA breach notification requirements (e.g., timelines, content of notification). |

| Overall | Non-Compliant | Critical gaps in risk management, security training, encryption of PHI, and incident response specific to PHI pose a significant risk of HIPAA violations. |


6. Remediation Recommendations

The following recommendations are prioritized based on their associated risk score and potential impact. Addressing Critical and High-priority items should be the immediate focus.

6.1. Critical Priority Recommendations (Immediate Action Required)

  1. Patch Critical OS Vulnerabilities:

* Action: Immediately apply all outstanding critical operating system patches to all identified internet-facing servers (e.g., Web Server 01, API Gateway 02).

* Owner: IT Operations Team

* Timeline: Within 24-48 hours.

* Verification: Post-patch vulnerability scan and system health check.

  1. Implement Multi-Factor Authentication (MFA) for Admin Panels:

* Action: Enable and enforce MFA for all administrative interfaces, especially those publicly accessible (e.g., Management Portal, Legacy CRM). Disable/change default credentials.

* Owner: IT Security, Application Development

* Timeline: Within 7 days.

* Verification: Test MFA functionality and conduct an access control review.

6.2. High Priority Recommendations (Urgent Action Required)

  1. Address SQL Injection Vulnerability:

* Action: Sanitize all user inputs and implement parameterized queries/prepared statements in the "User Registration" module of the e-commerce application. Conduct a comprehensive code review for similar vulnerabilities.

* Owner: Application Development Team

* Timeline: Within 14 days.

* Verification: Penetration testing focused on input validation and SQL injection.

  1. Update Outdated Software and Libraries:

* Action: Inventory all software components and libraries. Plan and execute upgrades to the latest stable and secure versions for all identified outdated applications and server components (e.g., Apache Struts, OpenSSL).

*

cybersecurity_audit_report.md
Download as Markdown
Copy all content
Full output as text
Download ZIP
IDE-ready project ZIP
Copy share link
Permanent URL for this run
Get Embed Code
Embed this result on any website
Print / Save PDF
Use browser print dialog
\n\n\n"); var hasSrcMain=Object.keys(extracted).some(function(k){return k.indexOf("src/main")>=0;}); if(!hasSrcMain) zip.file(folder+"src/main."+ext,"import React from 'react'\nimport ReactDOM from 'react-dom/client'\nimport App from './App'\nimport './index.css'\n\nReactDOM.createRoot(document.getElementById('root')!).render(\n \n \n \n)\n"); var hasSrcApp=Object.keys(extracted).some(function(k){return k==="src/App."+ext||k==="App."+ext;}); if(!hasSrcApp) zip.file(folder+"src/App."+ext,"import React from 'react'\nimport './App.css'\n\nfunction App(){\n return(\n
\n
\n

"+slugTitle(pn)+"

\n

Built with PantheraHive BOS

\n
\n
\n )\n}\nexport default App\n"); zip.file(folder+"src/index.css","*{margin:0;padding:0;box-sizing:border-box}\nbody{font-family:system-ui,-apple-system,sans-serif;background:#f0f2f5;color:#1a1a2e}\n.app{min-height:100vh;display:flex;flex-direction:column}\n.app-header{flex:1;display:flex;flex-direction:column;align-items:center;justify-content:center;gap:12px;padding:40px}\nh1{font-size:2.5rem;font-weight:700}\n"); zip.file(folder+"src/App.css",""); zip.file(folder+"src/components/.gitkeep",""); zip.file(folder+"src/pages/.gitkeep",""); zip.file(folder+"src/hooks/.gitkeep",""); Object.keys(extracted).forEach(function(p){ var fp=p.startsWith("src/")?p:"src/"+p; zip.file(folder+fp,extracted[p]); }); zip.file(folder+"README.md","# "+slugTitle(pn)+"\n\nGenerated by PantheraHive BOS.\n\n## Setup\n\`\`\`bash\nnpm install\nnpm run dev\n\`\`\`\n\n## Build\n\`\`\`bash\nnpm run build\n\`\`\`\n\n## Open in IDE\nOpen the project folder in VS Code or WebStorm.\n"); zip.file(folder+".gitignore","node_modules/\ndist/\n.env\n.DS_Store\n*.local\n"); } /* --- Vue (Vite + Composition API + TypeScript) --- */ function buildVue(zip,folder,app,code,panelTxt){ var pn=pkgName(app); var C=cc(pn); var extracted=extractCode(panelTxt); zip.file(folder+"package.json",'{\n "name": "'+pn+'",\n "version": "0.0.0",\n "type": "module",\n "scripts": {\n "dev": "vite",\n "build": "vue-tsc -b && vite build",\n "preview": "vite preview"\n },\n "dependencies": {\n "vue": "^3.5.13",\n "vue-router": "^4.4.5",\n "pinia": "^2.3.0",\n "axios": "^1.7.9"\n },\n "devDependencies": {\n "@vitejs/plugin-vue": "^5.2.1",\n "typescript": "~5.7.3",\n "vite": "^6.0.5",\n "vue-tsc": "^2.2.0"\n }\n}\n'); zip.file(folder+"vite.config.ts","import { defineConfig } from 'vite'\nimport vue from '@vitejs/plugin-vue'\nimport { resolve } from 'path'\n\nexport default defineConfig({\n plugins: [vue()],\n resolve: { alias: { '@': resolve(__dirname,'src') } }\n})\n"); zip.file(folder+"tsconfig.json",'{"files":[],"references":[{"path":"./tsconfig.app.json"},{"path":"./tsconfig.node.json"}]}\n'); zip.file(folder+"tsconfig.app.json",'{\n "compilerOptions":{\n "target":"ES2020","useDefineForClassFields":true,"module":"ESNext","lib":["ES2020","DOM","DOM.Iterable"],\n "skipLibCheck":true,"moduleResolution":"bundler","allowImportingTsExtensions":true,\n "isolatedModules":true,"moduleDetection":"force","noEmit":true,"jsxImportSource":"vue",\n "strict":true,"paths":{"@/*":["./src/*"]}\n },\n "include":["src/**/*.ts","src/**/*.d.ts","src/**/*.tsx","src/**/*.vue"]\n}\n'); zip.file(folder+"env.d.ts","/// \n"); zip.file(folder+"index.html","\n\n\n \n \n "+slugTitle(pn)+"\n\n\n
\n \n\n\n"); var hasMain=Object.keys(extracted).some(function(k){return k==="src/main.ts"||k==="main.ts";}); if(!hasMain) zip.file(folder+"src/main.ts","import { createApp } from 'vue'\nimport { createPinia } from 'pinia'\nimport App from './App.vue'\nimport './assets/main.css'\n\nconst app = createApp(App)\napp.use(createPinia())\napp.mount('#app')\n"); var hasApp=Object.keys(extracted).some(function(k){return k.indexOf("App.vue")>=0;}); if(!hasApp) zip.file(folder+"src/App.vue","\n\n\n\n\n"); zip.file(folder+"src/assets/main.css","*{margin:0;padding:0;box-sizing:border-box}body{font-family:system-ui,sans-serif;background:#fff;color:#213547}\n"); zip.file(folder+"src/components/.gitkeep",""); zip.file(folder+"src/views/.gitkeep",""); zip.file(folder+"src/stores/.gitkeep",""); Object.keys(extracted).forEach(function(p){ var fp=p.startsWith("src/")?p:"src/"+p; zip.file(folder+fp,extracted[p]); }); zip.file(folder+"README.md","# "+slugTitle(pn)+"\n\nGenerated by PantheraHive BOS.\n\n## Setup\n\`\`\`bash\nnpm install\nnpm run dev\n\`\`\`\n\n## Build\n\`\`\`bash\nnpm run build\n\`\`\`\n\nOpen in VS Code or WebStorm.\n"); zip.file(folder+".gitignore","node_modules/\ndist/\n.env\n.DS_Store\n*.local\n"); } /* --- Angular (v19 standalone) --- */ function buildAngular(zip,folder,app,code,panelTxt){ var pn=pkgName(app); var C=cc(pn); var sel=pn.replace(/_/g,"-"); var extracted=extractCode(panelTxt); zip.file(folder+"package.json",'{\n "name": "'+pn+'",\n "version": "0.0.0",\n "scripts": {\n "ng": "ng",\n "start": "ng serve",\n "build": "ng build",\n "test": "ng test"\n },\n "dependencies": {\n "@angular/animations": "^19.0.0",\n "@angular/common": "^19.0.0",\n "@angular/compiler": "^19.0.0",\n "@angular/core": "^19.0.0",\n "@angular/forms": "^19.0.0",\n "@angular/platform-browser": "^19.0.0",\n "@angular/platform-browser-dynamic": "^19.0.0",\n "@angular/router": "^19.0.0",\n "rxjs": "~7.8.0",\n "tslib": "^2.3.0",\n "zone.js": "~0.15.0"\n },\n "devDependencies": {\n "@angular-devkit/build-angular": "^19.0.0",\n "@angular/cli": "^19.0.0",\n "@angular/compiler-cli": "^19.0.0",\n "typescript": "~5.6.0"\n }\n}\n'); zip.file(folder+"angular.json",'{\n "$schema": "./node_modules/@angular/cli/lib/config/schema.json",\n "version": 1,\n "newProjectRoot": "projects",\n "projects": {\n "'+pn+'": {\n "projectType": "application",\n "root": "",\n "sourceRoot": "src",\n "prefix": "app",\n "architect": {\n "build": {\n "builder": "@angular-devkit/build-angular:application",\n "options": {\n "outputPath": "dist/'+pn+'",\n "index": "src/index.html",\n "browser": "src/main.ts",\n "tsConfig": "tsconfig.app.json",\n "styles": ["src/styles.css"],\n "scripts": []\n }\n },\n "serve": {"builder":"@angular-devkit/build-angular:dev-server","configurations":{"production":{"buildTarget":"'+pn+':build:production"},"development":{"buildTarget":"'+pn+':build:development"}},"defaultConfiguration":"development"}\n }\n }\n }\n}\n'); zip.file(folder+"tsconfig.json",'{\n "compileOnSave": false,\n "compilerOptions": {"baseUrl":"./","outDir":"./dist/out-tsc","forceConsistentCasingInFileNames":true,"strict":true,"noImplicitOverride":true,"noPropertyAccessFromIndexSignature":true,"noImplicitReturns":true,"noFallthroughCasesInSwitch":true,"paths":{"@/*":["src/*"]},"skipLibCheck":true,"esModuleInterop":true,"sourceMap":true,"declaration":false,"experimentalDecorators":true,"moduleResolution":"bundler","importHelpers":true,"target":"ES2022","module":"ES2022","useDefineForClassFields":false,"lib":["ES2022","dom"]},\n "references":[{"path":"./tsconfig.app.json"}]\n}\n'); zip.file(folder+"tsconfig.app.json",'{\n "extends":"./tsconfig.json",\n "compilerOptions":{"outDir":"./dist/out-tsc","types":[]},\n "files":["src/main.ts"],\n "include":["src/**/*.d.ts"]\n}\n'); zip.file(folder+"src/index.html","\n\n\n \n "+slugTitle(pn)+"\n \n \n \n\n\n \n\n\n"); zip.file(folder+"src/main.ts","import { bootstrapApplication } from '@angular/platform-browser';\nimport { appConfig } from './app/app.config';\nimport { AppComponent } from './app/app.component';\n\nbootstrapApplication(AppComponent, appConfig)\n .catch(err => console.error(err));\n"); zip.file(folder+"src/styles.css","* { margin: 0; padding: 0; box-sizing: border-box; }\nbody { font-family: system-ui, -apple-system, sans-serif; background: #f9fafb; color: #111827; }\n"); var hasComp=Object.keys(extracted).some(function(k){return k.indexOf("app.component")>=0;}); if(!hasComp){ zip.file(folder+"src/app/app.component.ts","import { Component } from '@angular/core';\nimport { RouterOutlet } from '@angular/router';\n\n@Component({\n selector: 'app-root',\n standalone: true,\n imports: [RouterOutlet],\n templateUrl: './app.component.html',\n styleUrl: './app.component.css'\n})\nexport class AppComponent {\n title = '"+pn+"';\n}\n"); zip.file(folder+"src/app/app.component.html","
\n
\n

"+slugTitle(pn)+"

\n

Built with PantheraHive BOS

\n
\n \n
\n"); zip.file(folder+"src/app/app.component.css",".app-header{display:flex;flex-direction:column;align-items:center;justify-content:center;min-height:60vh;gap:16px}h1{font-size:2.5rem;font-weight:700;color:#6366f1}\n"); } zip.file(folder+"src/app/app.config.ts","import { ApplicationConfig, provideZoneChangeDetection } from '@angular/core';\nimport { provideRouter } from '@angular/router';\nimport { routes } from './app.routes';\n\nexport const appConfig: ApplicationConfig = {\n providers: [\n provideZoneChangeDetection({ eventCoalescing: true }),\n provideRouter(routes)\n ]\n};\n"); zip.file(folder+"src/app/app.routes.ts","import { Routes } from '@angular/router';\n\nexport const routes: Routes = [];\n"); Object.keys(extracted).forEach(function(p){ var fp=p.startsWith("src/")?p:"src/"+p; zip.file(folder+fp,extracted[p]); }); zip.file(folder+"README.md","# "+slugTitle(pn)+"\n\nGenerated by PantheraHive BOS.\n\n## Setup\n\`\`\`bash\nnpm install\nng serve\n# or: npm start\n\`\`\`\n\n## Build\n\`\`\`bash\nng build\n\`\`\`\n\nOpen in VS Code with Angular Language Service extension.\n"); zip.file(folder+".gitignore","node_modules/\ndist/\n.env\n.DS_Store\n*.local\n.angular/\n"); } /* --- Python --- */ function buildPython(zip,folder,app,code){ var title=slugTitle(app); var pn=pkgName(app); var src=code.replace(/^\`\`\`[\w]*\n?/m,"").replace(/\n?\`\`\`$/m,"").trim(); var reqMap={"numpy":"numpy","pandas":"pandas","sklearn":"scikit-learn","tensorflow":"tensorflow","torch":"torch","flask":"flask","fastapi":"fastapi","uvicorn":"uvicorn","requests":"requests","sqlalchemy":"sqlalchemy","pydantic":"pydantic","dotenv":"python-dotenv","PIL":"Pillow","cv2":"opencv-python","matplotlib":"matplotlib","seaborn":"seaborn","scipy":"scipy"}; var reqs=[]; Object.keys(reqMap).forEach(function(k){if(src.indexOf("import "+k)>=0||src.indexOf("from "+k)>=0)reqs.push(reqMap[k]);}); var reqsTxt=reqs.length?reqs.join("\n"):"# add dependencies here\n"; zip.file(folder+"main.py",src||"# "+title+"\n# Generated by PantheraHive BOS\n\nprint(title+\" loaded\")\n"); zip.file(folder+"requirements.txt",reqsTxt); zip.file(folder+".env.example","# Environment variables\n"); zip.file(folder+"README.md","# "+title+"\n\nGenerated by PantheraHive BOS.\n\n## Setup\n\`\`\`bash\npython3 -m venv .venv\nsource .venv/bin/activate\npip install -r requirements.txt\n\`\`\`\n\n## Run\n\`\`\`bash\npython main.py\n\`\`\`\n"); zip.file(folder+".gitignore",".venv/\n__pycache__/\n*.pyc\n.env\n.DS_Store\n"); } /* --- Node.js --- */ function buildNode(zip,folder,app,code){ var title=slugTitle(app); var pn=pkgName(app); var src=code.replace(/^\`\`\`[\w]*\n?/m,"").replace(/\n?\`\`\`$/m,"").trim(); var depMap={"mongoose":"^8.0.0","dotenv":"^16.4.5","axios":"^1.7.9","cors":"^2.8.5","bcryptjs":"^2.4.3","jsonwebtoken":"^9.0.2","socket.io":"^4.7.4","uuid":"^9.0.1","zod":"^3.22.4","express":"^4.18.2"}; var deps={}; Object.keys(depMap).forEach(function(k){if(src.indexOf(k)>=0)deps[k]=depMap[k];}); if(!deps["express"])deps["express"]="^4.18.2"; var pkgJson=JSON.stringify({"name":pn,"version":"1.0.0","main":"src/index.js","scripts":{"start":"node src/index.js","dev":"nodemon src/index.js"},"dependencies":deps,"devDependencies":{"nodemon":"^3.0.3"}},null,2)+"\n"; zip.file(folder+"package.json",pkgJson); var fallback="const express=require(\"express\");\nconst app=express();\napp.use(express.json());\n\napp.get(\"/\",(req,res)=>{\n res.json({message:\""+title+" API\"});\n});\n\nconst PORT=process.env.PORT||3000;\napp.listen(PORT,()=>console.log(\"Server on port \"+PORT));\n"; zip.file(folder+"src/index.js",src||fallback); zip.file(folder+".env.example","PORT=3000\n"); zip.file(folder+".gitignore","node_modules/\n.env\n.DS_Store\n"); zip.file(folder+"README.md","# "+title+"\n\nGenerated by PantheraHive BOS.\n\n## Setup\n\`\`\`bash\nnpm install\n\`\`\`\n\n## Run\n\`\`\`bash\nnpm run dev\n\`\`\`\n"); } /* --- Vanilla HTML --- */ function buildVanillaHtml(zip,folder,app,code){ var title=slugTitle(app); var isFullDoc=code.trim().toLowerCase().indexOf("=0||code.trim().toLowerCase().indexOf("=0; var indexHtml=isFullDoc?code:"\n\n\n\n\n"+title+"\n\n\n\n"+code+"\n\n\n\n"; zip.file(folder+"index.html",indexHtml); zip.file(folder+"style.css","/* "+title+" — styles */\n*{margin:0;padding:0;box-sizing:border-box}\nbody{font-family:system-ui,-apple-system,sans-serif;background:#fff;color:#1a1a2e}\n"); zip.file(folder+"script.js","/* "+title+" — scripts */\n"); zip.file(folder+"assets/.gitkeep",""); zip.file(folder+"README.md","# "+title+"\n\nGenerated by PantheraHive BOS.\n\n## Open\nDouble-click \`index.html\` in your browser.\n\nOr serve locally:\n\`\`\`bash\nnpx serve .\n# or\npython3 -m http.server 3000\n\`\`\`\n"); zip.file(folder+".gitignore",".DS_Store\nnode_modules/\n.env\n"); } /* ===== MAIN ===== */ var sc=document.createElement("script"); sc.src="https://cdnjs.cloudflare.com/ajax/libs/jszip/3.10.1/jszip.min.js"; sc.onerror=function(){ if(lbl)lbl.textContent="Download ZIP"; alert("JSZip load failed — check connection."); }; sc.onload=function(){ var zip=new JSZip(); var base=(_phFname||"output").replace(/\.[^.]+$/,""); var app=base.toLowerCase().replace(/[^a-z0-9]+/g,"_").replace(/^_+|_+$/g,"")||"my_app"; var folder=app+"/"; var vc=document.getElementById("panel-content"); var panelTxt=vc?(vc.innerText||vc.textContent||""):""; var lang=detectLang(_phCode,panelTxt); if(_phIsHtml){ buildVanillaHtml(zip,folder,app,_phCode); } else if(lang==="flutter"){ buildFlutter(zip,folder,app,_phCode,panelTxt); } else if(lang==="react-native"){ buildReactNative(zip,folder,app,_phCode,panelTxt); } else if(lang==="swift"){ buildSwift(zip,folder,app,_phCode,panelTxt); } else if(lang==="kotlin"){ buildKotlin(zip,folder,app,_phCode,panelTxt); } else if(lang==="react"){ buildReact(zip,folder,app,_phCode,panelTxt); } else if(lang==="vue"){ buildVue(zip,folder,app,_phCode,panelTxt); } else if(lang==="angular"){ buildAngular(zip,folder,app,_phCode,panelTxt); } else if(lang==="python"){ buildPython(zip,folder,app,_phCode); } else if(lang==="node"){ buildNode(zip,folder,app,_phCode); } else { /* Document/content workflow */ var title=app.replace(/_/g," "); var md=_phAll||_phCode||panelTxt||"No content"; zip.file(folder+app+".md",md); var h=""+title+""; h+="

"+title+"

"; var hc=md.replace(/&/g,"&").replace(//g,">"); hc=hc.replace(/^### (.+)$/gm,"

$1

"); hc=hc.replace(/^## (.+)$/gm,"

$1

"); hc=hc.replace(/^# (.+)$/gm,"

$1

"); hc=hc.replace(/\*\*(.+?)\*\*/g,"$1"); hc=hc.replace(/\n{2,}/g,"

"); h+="

"+hc+"

Generated by PantheraHive BOS
"; zip.file(folder+app+".html",h); zip.file(folder+"README.md","# "+title+"\n\nGenerated by PantheraHive BOS.\n\nFiles:\n- "+app+".md (Markdown)\n- "+app+".html (styled HTML)\n"); } zip.generateAsync({type:"blob"}).then(function(blob){ var a=document.createElement("a"); a.href=URL.createObjectURL(blob); a.download=app+".zip"; a.click(); URL.revokeObjectURL(a.href); if(lbl)lbl.textContent="Download ZIP"; }); }; document.head.appendChild(sc); } function phShare(){navigator.clipboard.writeText(window.location.href).then(function(){var el=document.getElementById("ph-share-lbl");if(el){el.textContent="Link copied!";setTimeout(function(){el.textContent="Copy share link";},2500);}});}function phEmbed(){var runId=window.location.pathname.split("/").pop().replace(".html","");var embedUrl="https://pantherahive.com/embed/"+runId;var code='';navigator.clipboard.writeText(code).then(function(){var el=document.getElementById("ph-embed-lbl");if(el){el.textContent="Embed code copied!";setTimeout(function(){el.textContent="Get Embed Code";},2500);}});}