MOBILE bot world

What Is External Attack Surface Management?

See Your Attack Surface The Way Attackers Do

External Attack Surface Management (EASM) Defined

An external attack surface is all of an organization’s IT assets and those closely related to the organization, as seen by attackers looking in from the outside. Managing that attack surface is the only way to ensure you stay secure. While organizations often define “attack surface” too narrowly, attackers do not make that mistake. Attackers simply want access to your data, applications and networks whether on-premises or in cloud, subsidiary, third-party, or partner environments. The best way to protect your organization, therefore, is to see, understand and manage all of the ways an attacker might get in to your organization.

What is an attack surface_

What is an attack surface?

Your attack surface is the group of your attacker-exposed assets, known and unknown, wherever they are: in the cloud, in third-party environments, or in your subsidiaries.

External Attack Surface Management: Manage From the Outside In

Security professionals want to discover and protect their attack surface and see that as a top priority, but they also report that their organizations aren’t defining “attack surface” the way attackers do. In our study with ESG, security professionals reported than when defining their attack surface:
  • 47% don’t include SaaS applications.
  • 45% don’t include workloads running in the public cloud.
  • 45% don’t include third parties.
You cannot protect your attack surface without visibility to all of your attacker-exposed assets wherever they are. Organizations must look at their attack surface the way attackers do - from the outside in, and adopt an external attack surface management perspective.

View Your Assets the Way Attackers Do

Attackers are looking for the path of least resistance into your organization: the easiest way in, with the least amount of effort, to your highest value assets. To stay ahead, you have to think like an attacker too. Attackers have proven over and over that their way works. They survey and test your attack surface nearly continuously until they find a path that provides little resistance. Organizations need to do the same, and perform reconnaissance across the entire IT ecosystem, using an external attack surface point of view.
 
external attack surface management
 
External attack surface management and attack surface protection require that organizations continuously discover and assess risk of their entire attack surface and prioritize and remediate those risks. Short of that, organizations leave themselves vulnerable to attackers who have proven that approach works.
mobile

Find out how CyCognito redefines attack surface management

Watch Demo Video

5 Key Elements for External Attack Surface Management and Protection

01

Discover

1-Bot-Network


The first step for external attack surface management is to find all the business and IT relationships your organization has including acquired companies, joint ventures, and cloud assets that are strongly related to your company. From there, you’ll want to discover the externally-exposed IT assets of those entities and identify additional connections between assets that are not clearly or traditionally related. These are the kinds of externally identifiable connections that, when discovered by attackers, provide an easy path into your data.

02

Assess

2-Discovery-Engine

Once you’ve discovered the assets in your IT ecosystem, it’s time to assess those for exposures. Attackers just need one opportunity, be it from: misconfigured assets; network architecture flaws; data exposures, authentication and encryption weaknesses; or other risks including common vulnerabilities and exposures (CVEs). You too must detect these across your external attack surface using multiple security testing techniques, and then correlate the results to identify the attack vectors bad actors can use.

03

Prioritize

Gartner external attack surface management

Prioritizing risks in the external attack surface makes it possible to know where to focus first. Without prioritization, it is nearly impossible to manage the volume of security issues and alerts organizations face. Importantly, prioritization must incorporate business context: which assets and data belong to what departments or subsidiaries within your organization, as well as the business processes associated with the assets.

04

Remediate

4-Risk-Prioritization

 


Remediation is critical for attack surface protection, so operationalizing remediation is a crucial element of effective external attack surface management. Typically IT operations teams -- not security teams -- are tasked with remediation. To accelerate remediation workflows, security teams should provide detailed and actionable evidence along with remediation guidance for every identified risk. That enables operations teams to remediate with little-to-no additional investigation.

05

Continuous

Continuous


Executing the previous elements continuously is the only way to stay ahead of the ever-changing IT and threat environment. The organization keeps building, changing, and adding to the IT ecosystem and attackers never stop. External attack surface management must be equally continuous to discover, test and eliminate risk from the changing attack surface.