Targeted infrastructure scanning focused on exposed services, misconfiguration, and real-world exploitability.

OpSecPulse Infrastructure Security Scans assess the security posture of individual servers and network-reachable hosts by analysing exposed services, patch levels, and configuration weaknesses that attackers commonly exploit.

This service is designed for organisations that need clear, actionable insight per system, without noise, overreach, or cloud-specific complexity.

Pricing & Scope

£100 per IP address

Each purchase covers one routable IP / host.
Multiple hosts can be scanned by purchasing additional units.

Example: 5 servers = 5 IPs = £500

Additional Info

What’s Included (Per IP)

  • Infrastructure vulnerability scan of the target host

  • Service and port exposure analysis

  • Identification of outdated services, weak configurations, and insecure protocols

  • Patch posture review (OS & service-level)

  • Detection of legacy or high-risk services (e.g. weak TLS, SMB, RDP, SSH configs)

  • KEV-aware risk prioritisation (CISA Known Exploited Vulnerabilities)

  • False-positive validation and signal clean-up

  • Clear remediation guidance with priority ranking

  • Executive summary + technical findings

In Scope

  • Linux and Windows servers

  • Internet-facing infrastructure hosts

  • Network-reachable internal hosts (where access is provided)

  • Firewalls, gateways, VPN endpoints (IP-based)

  • Management interfaces exposed over the network

Methodology

Findings are prioritised based on:

  • Known exploitation in the wild (KEV & threat intelligence)

  • Service exposure and attack surface

  • Severity and ease of exploitation

  • Business impact of the affected system

This ensures remediation effort is spent on issues that actually reduce breach risk.

Framework Alignment (Informational)

  • Cyber Essentials / Cyber Essentials Plus (infrastructure controls)

  • CIS Critical Security Controls

  • MITRE ATT&CK (infrastructure-relevant techniques)

  • ISO 27001 control mapping (informational only)

Typical Outcomes

  • Reduced exposed infrastructure attack surface

  • Clear per-host remediation priorities

  • Improved baseline security hygiene

  • Evidence suitable for audits, insurers, and customer assurance

Delivery

Remote service.

Important Note

This is a defensive infrastructure security assessment, not a penetration test or certification audit.