It’s 2024, and by now it’s clear that nearly everything can be the object of a cyber attack. But knowing that doesn’t mean organizations are strategically managing and controlling their risks. In fact, a survey of over 6200 security decision makers from Trend Micro and Sapio Research found 73% described their attack surface as “constantly evolving and messy” while 43% said it’s simply “out of control.”
Enter attack surface management (ASM), a systematic way for companies to find, track, and manage all potential internal and external areas of vulnerability. Done right, attack surface management is a way organizations can thwart bad actors and drastically decrease the risk of security breaches.
ASM is a key piece of a company’s security posture, but it can be difficult to implement and maintain without the right tools. Here’s everything you need to know about the role ASM plays in improving the response to threats to security as well as best practices teams should follow in order to get the most out of it.
According to the National Institute of Standards (NIST), an attack surface is:
The set of points on the boundary of a system, a system element, or an environment where an attacker can try to enter, cause an effect on, or extract data from, that system, system element, or environment.
To put it another way, an organization’s attack surface can be any of the following things:
An attack surface can be comprised of so many things, which makes it *very* challenging to even know where to begin trying to track it all, let alone how to systematically stay ahead.
💭
If there’s one thing to remember about attack surfaces, it’s this:
less is more.
To get to “less” attack surfaces, an organization needs to know what’s there - it’s impossible to eliminate what isn’t known about, and that’s what ASM is all about. Attack surface management should bring three key elements to an organization’s security efforts: automation, using a hacker’s mindset to think like an attacker, and a focus on uncovering the unknown.
Even a small company is likely to be surprised by the vast number of assets created simply by doing business. No team of human beings will be able to easily identify and track all of these potential surfaces, which is why creating an automated (and continuous) process of discovery and monitoring is a critical step in ASM. The best ASM automation efforts will also simplify collaboration and communication because as assets are discovered, stakeholders will be automatically looped in, so decisions on criticality can be made. In the end, an automated ASM loop will constantly be looking at what’s there, what’s been added, and keeping everyone up to date about the state of the attack surface.
If automation is the engine of ASM, its guidance system is a hacker mentality. What distinguishes ASM from traditional threat detection and other security vulnerability efforts is the way hacker behaviors are literally codified into how a team approaches cybersecurity risks.
To understand what that means in the real world, consider penetration testing, a key tool that periodically tests for known vulnerabilities. Pen testing might happen monthly, or quarterly, while hackers are busy scanning a target’s surfaces routinely, if not daily. Hackers will also be scanning targets with a greater level of detail and an open approach that pen testing simply can’t provide. Pen testing helps understand potential risks, while hackers are looking everywhere for an opening. ASM can help flip the script and makes it possible to see what the hacker sees. If you can see it, obviously it’s easier to defend against it.
ASM’s third secret weapon centers on one central belief: you don’t know what you don’t know. That’s the problem with looking from the inside out - organizations are only going to see what they expect to see because no one hunts for something they don’t expect to find. But that’s exactly what bad actors do - every. single. day. They’re searching for the leaked password, open door, unsecured assets, or quickly created one-time use website that still contains sensitive data. So without the right tools - and a wide-open mindset - it will be impossible to actually map an attack surface in its entirety.
This is definitely a case of what you don’t know will hurt you.
At a time when security pros are in short supply, it’s tempting to think ASM is the answer to all of an organization’s security needs, but don’t make the mistake of thinking it can replace Red teams, penetration testing, or other established security processes. Ideally, ASM works *with* existing security efforts and, by providing a very detailed analysis of assets, should actually make it easier for other processes and teams to be more successful. Pen testing can be directed at identified and suspected vulnerabilities. Red teams - often stretched way too thin - can stop aimless hunts and focus their expertise on issues that matter most to the organization.
For many organizations, security continues to be somewhat neglected and, on average in 2022, an enterprise devoted only 9.9% of its tech budget to security, according to data published in Venture Beat. But cybersecurity attacks increased 38% from 2021 to 2022, according to Security Magazine, so, clearly there’s a disconnect.
And the disconnect is even more worrying when looking at a typical organization’s attack surface. A survey from the Massachusetts Institute of Technology found fully half of respondents experienced a security breach from assets that weren’t known about, managed, or dealt with correctly. Data from ESG Research indicated about one-third of organizations found highly “sensitive” data in areas they didn’t even know existed, while almost 30% found mystery SaaS applications running. And finally, the attack surface problem isn’t going to go away on its own. Randori’s 2022 State of Attack Surface Management found 67% of organizations expect their attack surfaces to expand over the next year.
At a time when hackers have never been more tech savvy or persistent, organizations can’t simply carry on in the typical way. ASM promises a fresh, automated, and systematic way to find, deal with, and control assets, giving an organization a clear look into what attackers are seeing. If it’s findable, it’s fixable, and, bonus, ASM also takes the burden off the rest of the security team, making them more able to focus on the tasks that matter most.
To get the most out of an ASM effort, there are a number of key principles to keep in mind.
In most organizations, security needs a fresh start. Attack surface management is exactly that - a wholly different way to discover the unknown, automate the process, and outhack the attackers by behaving like they do. ASM not only can help level the playing field but it can make existing security efforts more successful. ASM is a key step in the process of democratizing security, something ProjectDiscovery is passionate about.
Intrigued? Take a deeper dive into a brave new (and democratic) world of security.