The Process

How Automated Penetration Testing Works at Risk72

From subscription to a verified security assessment report in 72 hours. No consultants, no scheduling delays, no ambiguity about what was tested.

By the Numbers
72 Hours to verified report
4 Security test types
0 False positives in report
30+ Years analyst expertise
01
5 minutes

Subscribe & Sign the Scope Authorization

Choose your plan on the pricing page and complete checkout via Stripe. After payment, you digitally sign a scoped authorization agreement that defines exactly which assets Risk72 is permitted to scan, test, and assess. No authorization signature, no scan begins. This is your legal protection — and ours.

02
45–75 minutes at your own pace

Complete the Security Posture Questionnaire

A structured security interview across 8 critical domains. No technical background required — anyone in your organization can complete it:

  • Network & Infrastructure Configuration
  • Endpoint & Device Security
  • Identity & Access Management
  • Data Protection & Backup Practices
  • Email Security & Phishing Controls
  • Vendor & Third-Party Risk
  • Physical & Operational Security
  • Incident Response Readiness

Save your progress and return at any time. Responses remain editable until your run is submitted.

03
Automated — runs without interrupting your operations

Automated External Attack Surface Testing

Our penetration testing engine silently scans your external footprint. What gets tested depends on your plan, but the engine covers:

  • External web presence, SSL/TLS configuration, and certificate chains
  • Exposed network services and open ports across your IP range
  • DNS configuration and email security records (SPF, DKIM, DMARC)
  • Known CVEs tied to your exposed software versions
  • Data breach records and credential exposure linked to your domain
  • Web application vulnerability scanning (OWASP Top 10 coverage)
  • Internal network topology and lateral movement paths (Unlimited plan)

Non-intrusive. No downtime. No disruption to production.

04
Automated

AI-Powered Security Analysis

Scan data and questionnaire responses are fed together into our AI analysis pipeline (powered by Anthropic’s Claude). The model correlates findings across all test types, generates severity rankings based on business context, and produces draft remediation guidance for every discovered vulnerability. The AI accelerates what would otherwise take a human analyst days.

05
Every report, no exceptions

Certified Analyst Review & Approval

A certified cybersecurity analyst reviews every AI-generated finding, validates severity ratings, removes false positives, adds business context where needed, and formally approves the report before it is released. This step is mandatory. No report ships without a human signing off. This is what separates Risk72 from a raw automated scanner.

06
Within 72 hours of run submission

Report Delivered — Dashboard + PDF

Your dashboard unlocks. Your professional PDF report is generated. An email summary is sent. Everything is available immediately — no waiting for a follow-up call, no consultant debrief required. Your risk score, prioritized findings, and remediation roadmap are ready to act on.

Report Deliverables

What Every Risk72 Security Assessment Report Includes

Quantified Risk Score (0–100)

A single defensible number summarizing your organization’s security posture. Recalculated at every run so you can show auditors, insurers, and leadership a measurable risk reduction trend over time.

Prioritized Vulnerability Findings

Every discovered vulnerability confirmed and ranked Critical, High, Medium, or Low with CVSS context. No noise, no false positives — sorted by business impact so your team knows exactly what to fix first.

Remediation Roadmap

Plain-English remediation steps for every finding — written for your team, not a CISO. Actionable tasks your IT staff or MSP can actually execute, prioritized by severity and business risk.

Executive & Compliance Summary

A board-ready, auditor-ready one-pager documenting your tested security controls and current risk posture. Accepted by cyber insurance underwriters and compliance reviewers for HIPAA, FTC Safeguards, and similar frameworks.

Pricing

Standard vs. Unlimited — Which Plan Is Right for You?

Both plans include all four security test types. The only difference is the number of runs per month. Use code CYBERHERO2026 for 50% off every billing cycle.

Test Type / Capability Standard — $199/mo Unlimited — $299/mo
Security Posture Assessments10 runs / month
Web Application Vulnerability Scans10 runs / month
External Attack Surface Pentest Runs10 runs / month
Internal Network Penetration Tests10 runs / month
Professional Analyst-Reviewed PDF Reports
CVE & Vulnerability Intelligence
NIST CSF Framework Mapping
Run Comparison & Risk Trend Tracking
Annual Billing Discount (20% off)

Pricing & FAQs →

Know Your Risk Score Before an Attacker Does.

Start a penetration test run today. Report delivered within 72 hours. Cancel anytime.