The attack surface management process
ASM is a continuous process that involves the following steps:
Identification
Discovering all the assets within an organization that could be potential targets for cyberattacks. This includes everything from on-premises servers and databases to cloud services, third-party vendor systems, and even shadow IT assets that might be unknown to the IT department. Comprehensive identification requires the use of automated tools that scan for known assets and perform deep discovery to find unknown or forgotten assets.
Analysis
Once assets are identified, the next step is to analyze them for vulnerabilities and potential attack vectors. This involves assessing the security posture of each asset, identifying outdated software, misconfigurations, open ports, and other vulnerabilities that could be exploited by attackers. Analysis tools use threat intelligence feeds and vulnerability databases to identify known vulnerabilities.
Prioritization
Not all vulnerabilities pose the same level of risk. Prioritization involves evaluating the identified vulnerabilities to determine which ones need immediate attention based on the potential impact and likelihood of exploitation. This step typically uses risk scoring frameworks such as CVSS (Common Vulnerability Scoring System) or Exploit Prediction Scoring System (EPSS), using factors like asset criticality, exposure level, and the presence of active exploits in the wild.
Remediation
Taking steps to fix the identified issues. This can include applying patches, changing configurations, decommissioning outdated systems, or implementing additional security controls. The goal of remediation is to reduce the attack surface by addressing the most critical vulnerabilities first, reducing the risk of a successful attack.
Ongoing monitoring
Ensures that the attack surface is continuously scrutinized for new vulnerabilities and changes in the IT environment. This involves continuous scanning, real-time alerting, and regular reassessment of assets and their security postures. Ongoing monitoring helps in maintaining a dynamic view of the attack surface and quickly addressing any emerging threats or vulnerabilities as they arise.