Targeted infrastructure scanning focused on exposed services, misconfiguration, and real-world exploitability.
OpSecPulse Infrastructure Security Scans assess the security posture of individual servers and network-reachable hosts by analysing exposed services, patch levels, and configuration weaknesses that attackers commonly exploit.
This service is designed for organisations that need clear, actionable insight per system, without noise, overreach, or cloud-specific complexity.
Pricing & Scope
£100 per IP address
Each purchase covers one routable IP / host.
Multiple hosts can be scanned by purchasing additional units.
Example: 5 servers = 5 IPs = £500
Additional Info
What’s Included (Per IP)
Infrastructure vulnerability scan of the target host
Service and port exposure analysis
Identification of outdated services, weak configurations, and insecure protocols
Patch posture review (OS & service-level)
Detection of legacy or high-risk services (e.g. weak TLS, SMB, RDP, SSH configs)
KEV-aware risk prioritisation (CISA Known Exploited Vulnerabilities)
False-positive validation and signal clean-up
Clear remediation guidance with priority ranking
Executive summary + technical findings
In Scope
Linux and Windows servers
Internet-facing infrastructure hosts
Network-reachable internal hosts (where access is provided)
Firewalls, gateways, VPN endpoints (IP-based)
Management interfaces exposed over the network
Methodology
Findings are prioritised based on:
Known exploitation in the wild (KEV & threat intelligence)
Service exposure and attack surface
Severity and ease of exploitation
Business impact of the affected system
This ensures remediation effort is spent on issues that actually reduce breach risk.
Framework Alignment (Informational)
Cyber Essentials / Cyber Essentials Plus (infrastructure controls)
CIS Critical Security Controls
MITRE ATT&CK (infrastructure-relevant techniques)
ISO 27001 control mapping (informational only)
Typical Outcomes
Reduced exposed infrastructure attack surface
Clear per-host remediation priorities
Improved baseline security hygiene
Evidence suitable for audits, insurers, and customer assurance
Delivery
Remote service.
Important Note
This is a defensive infrastructure security assessment, not a penetration test or certification audit.

