Skip to main content

Infrastructure Security

Introduction

The Infrastructure module provides attack surface management, penetration testing coordination, and typosquatting detection. Understand and reduce your external exposure.

Attack Surface
156
Total assets
4
Critical issues
11
Open findings
Recent Issues
IssueSeverityAsset
Exposed admin panel
Criticaladmin.example.com
TLS certificate expiring
Highapi.example.com
Missing security headers
Mediumapp.example.com
Open port 8080
Mediumstaging.example.com
Outdated server version
Lowdocs.example.com

Key Features

Attack Surface

Discover and monitor external-facing assets

Penetration Testing

Coordinate and track pentest campaigns

Typosquatting

Detect domain impersonation attempts

Attack Surface Management

What is Attack Surface?

Your attack surface includes everything visible to attackers:

  • Domains and subdomains
  • IP addresses
  • Web servers and services
  • APIs and endpoints
  • Cloud assets

Why Monitor?

  • Discover forgotten assets
  • Identify misconfigurations
  • Track exposure over time
  • Prioritize remediation

Module Components

Assets

Manage your digital asset inventory:

  • Domains and subdomains
  • IP addresses
  • Web servers
  • Cloud resources

Learn more about Assets →

Issues

Track security findings:

  • Vulnerability discoveries
  • Configuration issues
  • Exposure risks
  • Remediation status

Learn more about Issues →

Penetration Testing

Manage pentest programs:

  • Campaign scheduling
  • Pentester portal
  • Finding management
  • Remediation tracking

Learn more about Penetration Testing →

Typosquatting

Domain impersonation detection:

  • Similar domain discovery
  • Takedown management
  • Continuous monitoring

Learn more about Typosquatting →

Getting Started

  1. Add Domains

    Add your primary domains for monitoring.

  2. Initial Scan

    Bastion discovers subdomains and assets.

  3. Review Assets

    Verify discovered assets are legitimate.

  4. Address Issues

    Remediate discovered security issues.

  5. Continuous Monitoring

    Enable ongoing monitoring for changes.

Dashboard Overview

Key Metrics

MetricDescription
Total AssetsDiscovered assets
Open IssuesUnresolved findings
High/CriticalSevere issues
Exposure ScoreOverall risk rating

Quick Actions

  • Add new domain
  • Run discovery scan
  • View critical issues
  • Export reports

Best Practices

Start with Discovery

Begin by discovering what's out there. You can't protect what you don't know about.

Prioritize Findings

Focus on critical and high-severity issues first, especially those exposed to the internet.

Verify Assets

Review discovered assets. Flag unknown assets for investigation.

Monitor Continuously

Attack surface changes constantly. Continuous monitoring catches new exposure.

Next Steps