{"id":252,"date":"2022-02-24T23:18:00","date_gmt":"2022-02-24T23:18:00","guid":{"rendered":"https:\/\/www.cycognito.com\/blog\/?p=252"},"modified":"2024-01-22T08:47:42","modified_gmt":"2024-01-22T16:47:42","slug":"principles-of-attack-surface-protection-part-one-discover-everything","status":"publish","type":"post","link":"https:\/\/www.cycognito.com\/blog\/principles-of-attack-surface-protection-part-one-discover-everything\/","title":{"rendered":"Principles of Attack Surface Protection: Discover Everything"},"content":{"rendered":"\n<p>Imagine a cybersecurity team that is working hard with the usual tools and best practices. All seems on course for protecting the enterprise attack surface. But there\u2019s an attractive path for attackers to assets the security team doesn\u2019t manage and may not even be aware of.<\/p>\n\n\n\n<p>In this case, which happens to be a true story, a Fortune 500 financial services company prevented exploitation of hidden danger from ransomware. Global operations entailed more than 200 subsidiaries and almost half a million IT assets. By using new techniques to probe hidden risks across the entire extended attack surface, this company found it was vulnerable to a critical Pulse Secure VPN CVE,&nbsp;<a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2019-11510\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2019-11510<\/a>, in three of its 30 VPN gateways. One gateway&nbsp;was in a subsidiary&nbsp;and two came with an acquired company. Discovery was in the nick of time!<\/p>\n\n\n\n<p>Scenarios like this are common and often undiscovered because security controls and their operators cannot see all risks to the entire external attack surface. Let\u2019s take a closer look at how such exposure impacts most large organizations today.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Defining the Attack Surface<\/h2>\n\n\n\n<p>The concept of an \u201cattack surface\u201d includes any asset that an attacker may see on or with a path to your network. For a large enterprise, the modern externally exposed attack surface can include thousands of segmented networks, tens or hundreds of thousands of devices, thousands of applications and dozens or hundreds of connected partners.&nbsp;<\/p>\n\n\n\n<p>Talk about endless exposure! Some of these elements are not systematically addressed by typical security tools and processes. We call these omissions an area of \u201cshadow risk.\u201d&nbsp;<\/p>\n\n\n\n<p>Shadow risk is a huge lure for attackers who seek the path of least resistance to your assets and data. The main attraction is these targets are unlikely to have any protection from security controls \u2014 especially unknown or unmanaged assets. Let\u2019s consider why shadow risk is a major unaddressed liability.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why Legacy Approaches Don\u2019t See the Extended Attack Surface<\/h2>\n\n\n\n<p>Security practitioners use a variety of tools and processes to map and assess risk exposure. For example, deployment of vulnerability scanners, penetration testing, threat intelligence feeds, security rating services and others are common \u2014 so much so that security frameworks and compliance regimes, such as the Payment Card Industry Data Security Standard (PCI DSS), specify their systematic use. Despite adherence to these requirements, we frequently read about successful exploits. Why?<\/p>\n\n\n\n<p>I believe there are two reasons why popular tools are unhelpful in seeing the extended attack surface. The first reason is these tools are only good at seeing the targets you focus them on.&nbsp;<\/p>\n\n\n\n<p>Consider how you configure a legacy vulnerability scan: by entering a target range of IP addresses. That\u2019s where the tool looks. If you want it to look somewhere else, you must tell it where to execute its processes, what to look for and when to run scans. A recent ESG study commissioned by our company offers clues on why many risks are unseen by organizations surveyed:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>47% don\u2019t include SaaS application.<\/li>\n\n\n\n<li>45% don\u2019t include workloads running in the public cloud.<\/li>\n\n\n\n<li>45% don\u2019t include third parties.<\/li>\n<\/ul>\n\n\n\n<p>Another reason for limited visibility is that tools are often used in \u201ca stand-alone capacity and not holistically,\u201d according to&nbsp;<a href=\"https:\/\/www.gartner.com\/en\/documents\/3906374\/a-guide-to-choosing-a-vulnerability-assessment-solution\" target=\"_blank\" rel=\"noreferrer noopener\">Gartner<\/a>. For instance, a vulnerability scanner can easily spot thousands of potential vulnerabilities in a mid- to large-sized organization. However, a penetration testing team usually focuses on a tiny subset, manually creeping for hours through the \u201cto-do\u201d list that barely scratches the surface of potential exploits. Doing the usual run of one, two or even a handful of pen tests each year might provide low single-digit coverage of risks. The other 95% of shadow risks are&nbsp;<em>very<\/em>&nbsp;attractive to attackers.<\/p>\n\n\n\n<p>Siloed tools are another major liability. The&nbsp;<a href=\"https:\/\/www.enisa.europa.eu\/publications\/emerging-trends\" target=\"_blank\" rel=\"noreferrer noopener\">European Union Agency for Cybersecurity<\/a>&nbsp;advises: \u201cNew approaches will be required during the next decade to stay away from silo analysis and move closer to a matrix-type of interconnected factors, variables and conditions.\u201d&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Discovering All Risks Automatically<\/h2>\n\n\n\n<p>The manual aspects of using many security tools and processes may be the biggest challenge to the discovery of risk on the enterprise attack surface. Attackers use automation and the economy of scale it delivers to probe the attack surface for easily exploitable risks&nbsp;<em>and<\/em>to execute attacks. Their offensive strategy of using automation to pursue the path of least resistance is cost-effective and efficient. A viable strategy for getting ahead of continuous threats is to&nbsp;<em>think and act like an attacker<\/em>.<\/p>\n\n\n\n<p>Note that attackers are not seeking just any unprotected asset. They don\u2019t waste time on noncritical assets. An attacker\u2019s fastest payoff is to find and penetrate&nbsp;<em>critical<\/em>&nbsp;assets, such as payment mechanisms or production databases. Breaching critical assets results in a faster, better payoff.<\/p>\n\n\n\n<p>So, what does this mean for you and your security team? Your mission of protecting the attack surface requires discovering the same information sought by enemies. Unfortunately, reliance on legacy discovery techniques means organizations are often unaware of 30% or more of their assets.&nbsp;<\/p>\n\n\n\n<p>For enterprise security, managing risks requires the discovery of all risks on your attack surface. My next article will\u00a0<a href=\"\/blog\/principles-of-attack-surface-protection-part-two-assess-all-assets-to-detect-all-risks\/\">explore the second principle of attack surface protection: how to assess what you\u2019ve discovered\u00a0<\/a>\u2014 and know if those risks are material to your business.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Imagine a cybersecurity team that is working hard with the usual tools and best practices. All seems on course for protecting the enterprise attack surface.<\/p>\n","protected":false},"author":18,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[6,11],"class_list":["post-252","post","type-post","status-publish","format-standard","hentry","category-perspectives","tag-attack-surface-management","tag-discovery"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Principles of Attack Surface Protection: Discover Everything | CyCognito Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cycognito.com\/blog\/principles-of-attack-surface-protection-part-one-discover-everything\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Principles of Attack Surface Protection: Discover Everything | CyCognito Blog\" \/>\n<meta property=\"og:description\" content=\"Imagine a cybersecurity team that is working hard with the usual tools and best practices. All seems on course for protecting the enterprise attack surface.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cycognito.com\/blog\/principles-of-attack-surface-protection-part-one-discover-everything\/\" \/>\n<meta property=\"og:site_name\" content=\"CyCognito Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-24T23:18:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-22T16:47:42+00:00\" \/>\n<meta name=\"author\" content=\"Rob Gurzeev\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rob Gurzeev\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/principles-of-attack-surface-protection-part-one-discover-everything\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/principles-of-attack-surface-protection-part-one-discover-everything\/\"},\"author\":{\"name\":\"Rob Gurzeev\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/d5cdeba13fde783ae5ebf80d0765b679\"},\"headline\":\"Principles of Attack Surface Protection: Discover Everything\",\"datePublished\":\"2022-02-24T23:18:00+00:00\",\"dateModified\":\"2024-01-22T16:47:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/principles-of-attack-surface-protection-part-one-discover-everything\/\"},\"wordCount\":894,\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"keywords\":[\"Attack Surface Management\",\"Discovery\"],\"articleSection\":[\"Perspectives\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/principles-of-attack-surface-protection-part-one-discover-everything\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/principles-of-attack-surface-protection-part-one-discover-everything\/\",\"name\":\"Principles of Attack Surface Protection: Discover Everything | CyCognito Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\"},\"datePublished\":\"2022-02-24T23:18:00+00:00\",\"dateModified\":\"2024-01-22T16:47:42+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/principles-of-attack-surface-protection-part-one-discover-everything\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cycognito.com\/blog\/principles-of-attack-surface-protection-part-one-discover-everything\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/principles-of-attack-surface-protection-part-one-discover-everything\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cycognito.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Principles of Attack Surface Protection: Discover Everything\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"name\":\"Cycognito Blog\",\"description\":\"Research, Product News and Latest Updates\",\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\",\"name\":\"Cycognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"width\":1720,\"height\":550,\"caption\":\"Cycognito\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/d5cdeba13fde783ae5ebf80d0765b679\",\"name\":\"Rob Gurzeev\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/188f9b5d63c82a731809f453b8cc26f8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/188f9b5d63c82a731809f453b8cc26f8?s=96&d=mm&r=g\",\"caption\":\"Rob Gurzeev\"},\"description\":\"CEO &amp; Co-Founder\",\"url\":\"https:\/\/www.cycognito.com\/blog\/author\/rob-gurzeev\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Principles of Attack Surface Protection: Discover Everything | CyCognito Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cycognito.com\/blog\/principles-of-attack-surface-protection-part-one-discover-everything\/","og_locale":"en_US","og_type":"article","og_title":"Principles of Attack Surface Protection: Discover Everything | CyCognito Blog","og_description":"Imagine a cybersecurity team that is working hard with the usual tools and best practices. All seems on course for protecting the enterprise attack surface.","og_url":"https:\/\/www.cycognito.com\/blog\/principles-of-attack-surface-protection-part-one-discover-everything\/","og_site_name":"CyCognito Blog","article_published_time":"2022-02-24T23:18:00+00:00","article_modified_time":"2024-01-22T16:47:42+00:00","author":"Rob Gurzeev","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Rob Gurzeev","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cycognito.com\/blog\/principles-of-attack-surface-protection-part-one-discover-everything\/#article","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/principles-of-attack-surface-protection-part-one-discover-everything\/"},"author":{"name":"Rob Gurzeev","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/d5cdeba13fde783ae5ebf80d0765b679"},"headline":"Principles of Attack Surface Protection: Discover Everything","datePublished":"2022-02-24T23:18:00+00:00","dateModified":"2024-01-22T16:47:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/principles-of-attack-surface-protection-part-one-discover-everything\/"},"wordCount":894,"publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"keywords":["Attack Surface Management","Discovery"],"articleSection":["Perspectives"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cycognito.com\/blog\/principles-of-attack-surface-protection-part-one-discover-everything\/","url":"https:\/\/www.cycognito.com\/blog\/principles-of-attack-surface-protection-part-one-discover-everything\/","name":"Principles of Attack Surface Protection: Discover Everything | CyCognito Blog","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/#website"},"datePublished":"2022-02-24T23:18:00+00:00","dateModified":"2024-01-22T16:47:42+00:00","breadcrumb":{"@id":"https:\/\/www.cycognito.com\/blog\/principles-of-attack-surface-protection-part-one-discover-everything\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cycognito.com\/blog\/principles-of-attack-surface-protection-part-one-discover-everything\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cycognito.com\/blog\/principles-of-attack-surface-protection-part-one-discover-everything\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cycognito.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Principles of Attack Surface Protection: Discover Everything"}]},{"@type":"WebSite","@id":"https:\/\/www.cycognito.com\/blog\/#website","url":"https:\/\/www.cycognito.com\/blog\/","name":"Cycognito Blog","description":"Research, Product News and Latest Updates","publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cycognito.com\/blog\/#organization","name":"Cycognito","url":"https:\/\/www.cycognito.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","width":1720,"height":550,"caption":"Cycognito"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/d5cdeba13fde783ae5ebf80d0765b679","name":"Rob Gurzeev","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/188f9b5d63c82a731809f453b8cc26f8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/188f9b5d63c82a731809f453b8cc26f8?s=96&d=mm&r=g","caption":"Rob Gurzeev"},"description":"CEO &amp; Co-Founder","url":"https:\/\/www.cycognito.com\/blog\/author\/rob-gurzeev\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/252","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/comments?post=252"}],"version-history":[{"count":5,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/252\/revisions"}],"predecessor-version":[{"id":674,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/252\/revisions\/674"}],"wp:attachment":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/media?parent=252"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/categories?post=252"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/tags?post=252"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}