The Stratex Layers

A practical cycle from scoping to closure.

Most security work produces information. Our process is built to produce outcomes.

We start by mapping how compromise begins in your environment, prove what is reachable, translate that into a clear fix order, and stay engaged through remediation and re-validation. When response and recovery are part of the risk, we extend the work into readiness.

Our 5-Layer Approach

Five stages we use to prove real exposure, translate it into fix order, and support closure.

01

Exposure Mapping

Information Gathering

We map externally visible exposure and likely entry points, grounded in how compromise typically begins for your environment.

  • OSINT & digital footprint
  • Internet-facing attack surface
  • Identity & credential exposure
  • Third-party/integration exposure
Outcome: A clear view of what is visible, reachable, and worth testing first.
02

Target Discovery

Technical Discovery

We build an accurate picture of the environment so testing and readiness work focuses on the routes that actually matter.

  • Service & app discovery
  • Identity, roles, access
  • Control baseline review
  • Config & integration review
Outcome: A validated inventory of targets, controls, and realistic attack hypotheses.
03

Proof of Access

Vulnerability Validation

We validate what can be used to gain access under agreed rules of engagement, producing evidence that holds up under scrutiny.

  • Exploitability validation
  • Authn/authz testing
  • Safe proof artefacts
  • Human-path testing (scoped)
Outcome: Evidence of what can be used to gain access, including conditions and constraints.
04

Path to Impact

Impact Demonstration

We follow validated access through to meaningful impact and document the chain in a way that leadership and engineers can act on.

  • Privilege escalation analysis
  • Lateral movement mapping
  • Data/system reachability
  • Business-impact scenarios
Outcome: A demonstrated attack path and its blast radius in your environment.
05

Closure Support

Actionable Guidance

We translate evidence into an execution plan, stay engaged through follow-through, and extend into readiness when response matters.

  • Executive + technical brief
  • Prioritised fix order
  • Remediation support & Q&A
  • Re-validation & readiness
Outcome: An execution-ready plan, plus support to confirm progress and document closure.

Ready for an engagement that closes the loop?

Let's align on scope, constraints, and what "done" looks like — including remediation support and re-validation.

Start a conversation