
CrowdStrike Falcon SurfaceĬrowdStrike Falcon Surface EASM offers a view from the adversary’s perspective, providing a real-time map of exposed assets and potential attack vectors. It can also perform monitoring based on security controls from policy sets such as PCI or HIPAA, identifying configurations or vulnerabilities that equate to policy violations, allowing the user to take action to resolve the finding. Axonius starts with an asset inventory which is updated automatically and fleshed out with context from both internal data sources and resources Axonius has access to outside a user’s network. Axonius Cyber Asset Attack Surface ManagementĪxonius offers a robust CAASM suite that touches all of the key factors for monitoring the attack surface. Here are 9 tools to help discovering and managing risks. Identifying these changes early allows for the cybersecurity team to react appropriately and mitigate any further damage. Configuration drift could be benign and part of a design change, but also has the potential to be the result of human error or the early stages of an attack. New assets need to be identified and incorporated into the monitoring solution as these could potentially be part of a brand attack or shadow IT. They are the IP address or domain name, coupled with the technology stack that makes up the application or service. The units that make up the attack surface are referred to as assets. The attack surface includes things like open ports and protocols, SSL and cryptographic standards being used, applications being hosted, and even the server platforms hosting the application.

This could be applications hosted on-premises with ports opened through the corporate firewall, SaaS applications hosted in the cloud, or any number of cloud-hosted resources with a public presence. The attack surface is the entirety of corporate resources – also known as assets – accessible from the internet in some form. This process is similar to both attacking and protecting enterprise IT resources: Gain knowledge of publicly visible resources on the internet, learn what makes up the technology stack, and find vulnerabilities and weaknesses. If you’ve ever watched a heist film, step one in executing the score of the century is casing the place: observing security measures, measuring response times, and mapping out escape routes. The goal with CAASM tools is to give the adversary as little information about the security posture of the business as possible while still maintaining critical business services. Cyber asset attack surface management (CAASM) or external attack surface management (EASM) solutions are designed to quantify the attack surface and minimize and harden it.
