ATTACK SURFACE MONITORING

CREST-Aligned Continuous Attack Surface Monitoring (ASM) for UK Businesses

Attack surface management is no longer an annual snapshot — it’s a continuous discipline. Our ASM service provides 24/7 external asset discovery, exposed-service detection, certificate monitoring, and credential-leak alerting. Sector-aware, analyst-validated, SOC-ready.

CREST Member · Verify ↗
Attack Surface Monitoring
CONTINUOUS · 24/7
Real-Time Asset Discovery
ANALYST-VALIDATED
Never Raw Scanner Noise
CREST
Approved Provider
24/7
Continuous Coverage
FREE
Retest Included
24h
Scope to Active Test
40%
of an organisation’s public attack surface is unknown to the security team — shadow IT, M&A inheritance, forgotten subdomains, decommissioned-but-routable hosts.

Penetration testing is a snapshot. Attack surface management is continuous.

Annual pen tests show your security posture on the day of testing. The day after, a developer spins up a new subdomain. A team migrates a service to a new cloud account. An acquired company brings 200 unaudited domains. Your attack surface drifts. Real attackers find these gaps before your next pen test.

Our attack surface monitoring continuously discovers your external assets via Shodan, Censys, certificate transparency log mining, dark-web monitoring, and BGP-route observation. Every change is detected, validated by an analyst, and pushed to your SOC. Reports satisfy ISO 27001 Annex A.5.7 (Threat Intelligence), A.8.8 (vulnerability management), align with NCSC vulnerability management guidance, and provide DORA-acceptable evidence of continuous attack-surface awareness.

CONTINUOUS COVERAGE AREAS

What Attack Surface Monitoring Covers

Twelve continuous monitoring streams — surface, deep, and dark web. Real-time alerts, analyst-validated.

ASM-1

Asset Discovery

Continuous discovery of new IPs, subdomains, cloud resources, SaaS apps, exposed admin panels — anything routable from the internet.

ASM-2

Certificate Transparency

Real-time monitoring of certificate transparency logs for newly-issued certs against your domain space — catches typosquats, supply-chain SaaS, and shadow IT.

ASM-3

Subdomain Takeover

Continuous dangling-DNS detection. New CNAME pointing to deprovisioned cloud resources flagged within 24 hours.

ASM-4

Credential Breach Corpus

Continuous cross-reference of company / employee email addresses against breach data corpus (BreachCompilation, Collection #1-5, COMB, recent dumps).

ASM-5

Exposed Services

Shodan / Censys monitoring for exposed RDP, SSH, VPN, RPC, databases, message queues — anything your firewall shouldn’t allow.

ASM-6

SSL/TLS Posture

Continuous monitoring of TLS configuration, expiring certs, weak ciphers, deprecated protocols, certificate-pinning gaps.

ASM-7

SaaS Footprint

Discovery of SaaS apps registered with your domain — Slack workspaces, Jira instances, Confluence pages, GitHub orgs.

ASM-8

Dark Web Mentions

Mentions of your brand, executives, infrastructure, or credentials on dark web forums, marketplaces, and Telegram cybercrime channels.

ASM-9

Brand Impersonation

Typosquat domains, fake social profiles, lookalike SaaS apps, phishing kits targeting your customers / employees.

ASM-10

BGP & DNS Drift

Monitoring for BGP hijacks, DNS hijacks, NS record drift, MX record changes — early warning of routing-level attacks.

ASM-11

M&A Asset Discovery

When you acquire a company, we automatically discover their public attack surface within 48 hours — accelerates due diligence.

ASM-12

Supplier Attack Surface

Optional monitoring of your top 50 suppliers — early warning of partner exposures that could affect you.

FOUR-PHASE METHODOLOGY

Attack Surface Monitoring — From Asset Discovery to SOC-Ready Alert

Continuous monitoring. Analyst-validated alerts. Real-time SOC integration. Never raw scanner noise.

1

Initial Discovery

Comprehensive asset baseline within 5 working days. Domains, IPs, cloud accounts, SaaS apps, supplier list, executive watchlist.
2

Continuous Collection

24/7 monitoring across discovery sources. Every change captured: new asset, exposed service, certificate issuance, breach mention.
3

Analyst Validation

Every alert reviewed by an analyst. False positives filtered. Severity assigned. Context enriched. SOC-ready output.
4

Real-Time Reporting

Critical alerts within 1-4 hours. Standard alerts within 24 hours. Weekly digest, monthly report, quarterly threat-actor briefing.

Verified Accreditations Auditors Accept

Every accreditation independently issued by a recognised UK certification body. Click CREST to verify our membership.

COMPLIANCE READY

ASM Reports Mapped to Every Framework

ASM evidence accepted across compliance frameworks where continuous monitoring is a control requirement.

ISO 27001 A.5.7 + A.8.8

Threat Intelligence (A.5.7) and Vulnerability Management (A.8.8) — ASM provides the continuous evidence ISO auditors increasingly require.

NCSC Vulnerability Management

Aligned to NCSC continuous vulnerability management guidance.

FCA / PRA Operational Resilience

ASM supports Important Business Service threat awareness and severe-but-plausible scenario monitoring.

NIS2 + DORA

Continuous attack-surface awareness is a DORA Article 9 requirement and supports NIS2 essential-services obligations.

SOC 2

CC7.4 incident detection — ASM provides continuous external posture awareness SOC 2 auditors expect.

Cyber Essentials Plus

ASM exceeds CE+ baseline and demonstrably supports overall cyber maturity scoring during recertification.

TRANSPARENT PRICING

Transparent Attack Surface Monitoring Pricing

All tiers include 24/7 monitoring and analyst-validated alerts. Price varies by asset count, supplier scope, and reporting cadence.

BASELINE / SMB
£600 – £1,200 / month
Depends on monitoring scope

≤50 IPs, ≤25 subdomains, 50 employee email addresses, brand monitoring, monthly digest. 1 sector profile.

  • Free retests included
  • Free rescheduling
  • No cancellation fees
  • 24-hour scope to active testing
  • Live findings to client portal
  • Executive + technical report
  • 60-min walkthrough call
  • Letter of attestation
MOST COMMISSIONED
GROWTH / MID-MARKET
£1,200 – £3,500 / month
Depends on monitoring scope

50-200 IPs, 25-100 subdomains, 500 emails, supplier monitoring (top 25), real-time critical alerts, weekly digest.

  • Free retests included
  • Free rescheduling
  • No cancellation fees
  • 24-hour scope to active testing
  • Live findings to client portal
  • Executive + technical report
  • 60-min walkthrough call
  • Letter of attestation
ENTERPRISE
£3,500+ / month
Depends on monitoring scope

Unlimited IPs/subdomains, full employee monitoring, full supplier monitoring (top 100), real-time SIEM integration, monthly threat-actor reports.

  • Free retests included
  • Free rescheduling
  • No cancellation fees
  • 24-hour scope to active testing
  • Live findings to client portal
  • Executive + technical report
  • 60-min walkthrough call
  • Letter of attestation

What You Actually Get

Five things that distinguish our service from automated scans and box-tick competitors.

🎯

What You Get From Attack Surface Management

Continuous 24/7 external asset discovery, real-time analyst-validated alerts, monthly threat reports, and quarterly briefings.
🔬

Discovery-First, Continuous

Most “ASM” tools rescan your existing asset list. We discover new assets continuously — including unknown subdomains, shadow IT, M&A inheritance, supplier exposures.
🛡

Analyst-Validated, Never Noise

Every alert is reviewed by an analyst before reaching you. Your SOC sees signal — not 10,000 IoCs to triage.
🔁

Real-Time SOC Integration

Critical alerts within 1-4 hours via Slack / Teams / SIEM. Weekly digest. Monthly report. Quarterly threat-actor briefing. Format tailored to your team.
🇬🇧

UK CREST + IASME + ISO 27001 + ISO 9001

Independently accredited. Verifiable on the CREST marketplace. ASM deliverables align with NCSC vulnerability management guidance and ISO 27001 A.5.7 / A.8.8.

Frequently Asked

What is attack surface monitoring (ASM)?

Attack surface monitoring (also called attack surface management) is the continuous discovery, inventory, and analysis of an organisation’s external-facing assets. ASM finds shadow IT, forgotten subdomains, M&A inheritance, exposed services, and credential leaks before attackers exploit them.

How is ASM different from a one-off pen test?

A pen test is a point-in-time assessment. ASM is continuous. Your attack surface drifts daily — new subdomains, cloud resources, SaaS apps. ASM catches drift in real time. Most organisations combine ASM with annual pen testing for full coverage.

How quickly are alerts delivered?

Critical alerts (e.g., your company on a ransomware leak site, exposed RDP server appearing on Shodan) are delivered within 1-4 hours of analyst validation. Standard alerts within 24 hours. Weekly digest at agreed time. Monthly threat reports on a fixed cadence.

How much does ASM cost in the UK?

Baseline (SMB) £600-£1,200/month. Mid-market (most commonly commissioned) £1,200-£3,500/month. Enterprise £3,500+/month. Annual contracts with monthly billing. Setup fee of £1,500-£3,000 covers initial asset baseline and sector profiling.

Do you discover M&A targets?

Yes. When you provide an M&A target’s domain, we run an accelerated 48-hour discovery against their public attack surface. This dramatically accelerates cyber due diligence and gives the security team early visibility into inherited risk.

Does ASM include credential breach monitoring?

Yes. Continuous cross-reference of your company / employee email addresses against the breach data corpus (BreachCompilation, Collection #1-5, COMB, daily-updated breach feeds). Includes recent dumps within hours of disclosure.

Can ASM detect subdomain takeover?

Yes. Continuous dangling-DNS monitoring against your registered domain space. New CNAME records pointing to deprovisioned cloud resources (GitHub Pages, Heroku, S3, Azure CDN) flagged and validated within 24 hours.

Does ASM monitor cloud edge (AWS / Azure / GCP)?

Yes. ASM covers cloud edge surface — load balancers, public S3 / Blob containers, CloudFront origins, Lambda function URLs, API Gateway endpoints. Shadow cloud accounts (AWS sub-accounts, Azure subscriptions) often discovered through certificate transparency.

Can you integrate with our SIEM / SOC tools?

Yes. Alerts delivered via email, Slack, Microsoft Teams, ServiceNow, Jira, or custom webhook. For enterprise tier, direct integration with SIEM (Splunk, Sentinel, QRadar, Elastic) via API or syslog. STIX / TAXII supported.

Does ASM satisfy ISO 27001 A.5.7 and A.8.8?

Yes. ISO 27001:2022 introduced A.5.7 (Threat Intelligence) and updated A.8.8 (Vulnerability Management). Our ASM deliverables — sector profile, continuous monitoring records, alert workflow — provide the evidence required for ISO 27001 audit.

Can you also run pen tests against discovered assets?

Yes. We frequently combine ASM with annual external penetration testing — ASM discovers assets, then targeted pen testing validates exploitability. Bundled engagements typically save 15-20% versus separate contracts.

Do you sign NDAs?

Yes. Standard NDA before any sector profile or asset inventory is shared. We operate under a project-specific master agreement that includes data handling, intelligence-sharing protocols, and breach notification clauses.

READY TO SCOPE

Book an Attack Surface Monitoring Scoping Call

30 minutes with a CREST-certified ASM analyst. Initial baseline and pricing within 24 hours. No sales pipeline.