Different ways to penetrate the cloud
You need to scan your organization's cloud and what's left of the on-premises network. Unfortunately, there's no single scanning method that provides perfect clarity. Let's quickly go through the pros and cons of each.The most basic method is an unauthenticated external scan that shows what your network looks like to an outside observer — or an attacker. This is a good way to find internet-facing weak spots, but it only gives you the surface view.Next up is an authenticated scan, one in which the scanning tool is given authorization to enter the company network and probe it from the inside. This is more comprehensive than an unauthenticated scan and can detect flaws and misconfigurations, but it takes longer and may have blind spots if it can't gain access to certain areas.There's also API-based scanning, which uses APIs provided by public cloud service providers (CSPs) such as Amazon, Google or Microsoft. This gives you a view of your organization's cloud instances from the CSP's perspective, but its reach is limited as it has trouble detecting flaws in open-source software.The most sophisticated method is agent-based scanning. A small piece of software is installed on every endpoint, server, database and other piece of hardware and in every software asset. The agent checks the asset for vulnerabilities and outdated software, installs patches if necessary, and monitors the asset continuously. The agent also profiles the asset and sends the profile back to a central program for inventorying.
Comprehensive scanning for cloud visibility
The most comprehensive way to get a good picture of your organization's assets is to combine all these scanning methods and feed the results into an intelligent program that can combine the information and present it coherently.The Qualys Cloud Platform builds such a picture using unauthenticated, authenticated and agent-based scans. Its most basic feature, Qualys Global AssetView, is entirely free."Global AssetView automatically discovers and classifies all IT assets including software, on-prem devices and applications, mobile, clouds, containers, and enterprise IoT devices using both agent and agentless methods," said Ed Rossi, former vice president of product management at Qualys, in a 2021 blog post.The Cloud Platform can even label assets on different public clouds using consistent metadata, and merge duplicate asset-inventory results from agent-based and unauthenticated scans.
Why on-prem tools no longer cut it
Keeping track of assets was once simpler. Servers, databases and most endpoints were on the premises, and the network map was generally static. Security involved putting a perimeter around the office network, putting antivirus software on endpoints and making remote laptops log into the company VPN."Network perimeters were well-defined and IT environments were tightly encapsulated," said the Qualys white paper. "Accounting for and monitoring all the hardware, software and networking elements in these self-contained and sealed IT environments was straightforward."Now many or most of your systems are in the cloud. Employees connect to the network from anywhere using their own laptops and smartphones as well as company-issued devices.The network map, if you can still call it that, is dynamic. Endpoints continually log on and off and change locations. Cloud instances are spun up and wound down, while data is scattered over an array of servers, few of which your organization may control.

"Many organizations are finding that ... they have lost the visibility they once had over their IT assets," warns the Qualys white paper. "As these blind spots multiply within an IT environment, so does the risk of hacker intrusions, data breaches, malware infections, internal IT policy violations and regulatory non-compliance."
The old on-prem network-scanning tools don't work well in the cloud, and the perimeter has vanished. So how are you supposed to know about everything that's on your network at any given moment?