In their recent Innovation Insight for Attack Surface Management report, Gartner calls Attack Surface Management (or “ASM”, for short) the first pillar in a broader Exposure Management strategy. According to Gartner, ASM addresses the questions:An organization’s attack surface is made up of all IT assets with points of entry that can lead to unauthorized access to its systems, making those assets susceptible to hacking and exploitation for the purpose of conducting a cyberattack. The average enterprise has a wide array of assets comprising its attack surface.With digital transformation over the last decade, and the growth of remote/hybrid work models over the last two years, the number of attack surface assets that most organizations must manage has exploded exponentially. Currently, 52% of IT organizations manage 10,000+ assets.Industry experts cite any number of reasons why the average enterprise’s attack surface continues to expand. These include:Enterprise IT departments, and cybersecurity teams in particular, are responsible for inventorying, managing, protecting, and defending the attack surface. What happens if an organization isn’t even aware of all its assets?Whatever the synonym used for ASM, Forrester rightly recommends that enterprises think holistically about their entire IT asset estate.Gartner’s definition of ASM as part of Exposure Management, on the other hand, lists three elements as core ASM capabilities: cyber asset attack surface management (for internal assets), external attack surface management, and digital risk protection services.Whatever the definition, the experts agree that all enterprises need to improve asset visibility, risk prioritization, and security control over their entire attack surface.Blog: Introducing CyberSecurity Asset Management 2.0
- What does my organization look like from an attacker’s point of view?
- How should cybersecurity find and prioritize the issues attackers will see first?
Types of Attack Surfaces
Digital
- Applications
- Code
- Ports
- Servers
- Websites
- Clouds & containers
- Digital certificates
- Un/authorized system access points
Physical
- Desktop computers
- Laptops
- Mobile devices
- USB ports
- IoT devices
- Improperly discarded hardware
- Complex IT supply chain ecosystem
- Device diversity among end-users
- Use of public cloud infrastructure
- Use of SaaS apps and services
- Growth in numbers of remote workers
What Isn’t Seen Can’t Be Protected
Research from industry analyst firm ESG shows that 69% of organizations have experienced an attack targeting an “unknown, unmanaged, or poorly managed internet-facing asset.” This often involves ones that the organization may have lost track of or isn’t aware even exists (also known as “shadow IT”). It’s no wonder malicious actors have a great deal of success exploiting them.The number and diversity of assets under IT management has exploded, making it challenging to discover them all. However, it’s of utmost importance to surface these unknown assets. What isn’t seen can’t be protected.ESG’s research further finds that only 9% of organizations are monitoring 100% of their attack surface. As if keeping track of every possible pathway into enterprise systems wasn’t difficult enough, it’s also very time-consuming. The study shows that 43% of organizations spend more than 80 hours on attack surface discovery, only tackling it weekly, semi-monthly or monthly, according to ESG.It’s clear that the volume, diversity, and complexity of IT asset management is increasing—often beyond the capability of Cybersecurity teams to track, manage, and protect effectively.Enter Attack Surface Management (ASM).Defining Attack Surface Management
It’s no wonder Attack Surface Management has become a hot topic among Cybersecurity professionals.However, industry analyst firm Forrester Research points out that cybersecurity and risk management vendors are using a dizzying variety of monikers to describe the same thing. These include:- Asset discovery
- Attack surface assessment
- Attack surface monitoring
- Digital asset discovery
- Digital footprint
- Digital risk monitoring
- Digital risk protection
- External attack surface management