1.6 How the outcomes of cyber security testing can be reported