Infrastructure Security
Introduction
The Infrastructure module provides attack surface management, penetration testing coordination, and typosquatting detection. Understand and reduce your external exposure.
Key Features
Attack Surface
Discover and monitor external-facing assets
Penetration Testing
Coordinate and track pentest campaigns
Typosquatting
Detect domain impersonation attempts
Attack Surface Management
What is Attack Surface?
Your attack surface includes everything visible to attackers:
- Domains and subdomains
- IP addresses
- Web servers and services
- APIs and endpoints
- Cloud assets
Why Monitor?
- Discover forgotten assets
- Identify misconfigurations
- Track exposure over time
- Prioritize remediation
Module Components
Assets
Manage your digital asset inventory:
- Domains and subdomains
- IP addresses
- Web servers
- Cloud resources
Issues
Track security findings:
- Vulnerability discoveries
- Configuration issues
- Exposure risks
- Remediation status
Penetration Testing
Manage pentest programs:
- Campaign scheduling
- Pentester portal
- Finding management
- Remediation tracking
Learn more about Penetration Testing →
Typosquatting
Domain impersonation detection:
- Similar domain discovery
- Takedown management
- Continuous monitoring
Learn more about Typosquatting →
Getting Started
Add Domains
Add your primary domains for monitoring.
Initial Scan
Bastion discovers subdomains and assets.
Review Assets
Verify discovered assets are legitimate.
Address Issues
Remediate discovered security issues.
Continuous Monitoring
Enable ongoing monitoring for changes.
Dashboard Overview
Key Metrics
| Metric | Description |
|---|---|
| Total Assets | Discovered assets |
| Open Issues | Unresolved findings |
| High/Critical | Severe issues |
| Exposure Score | Overall risk rating |
Quick Actions
- Add new domain
- Run discovery scan
- View critical issues
- Export reports
Best Practices
Start with Discovery
Begin by discovering what's out there. You can't protect what you don't know about.
Prioritize Findings
Focus on critical and high-severity issues first, especially those exposed to the internet.
Verify Assets
Review discovered assets. Flag unknown assets for investigation.
Monitor Continuously
Attack surface changes constantly. Continuous monitoring catches new exposure.