Why Now? The Rise of Attack Surface Management

Jun
12,
2023The
Hacker
NewsAttack
Surface
Management

The
term
“attack
surface
management”
(ASM)
went
from
unknown
to
ubiquitous
in
the
cybersecurity
space
over
the
past
few
years.

Why Now? The Rise of Attack Surface Management



Jun
12,
2023
The
Hacker
News
Attack
Surface
Management

The
term
attack
surface
management

(ASM)
went
from
unknown
to
ubiquitous
in
the
cybersecurity
space
over
the
past
few
years.
Gartner
and
Forrester
have
both
highlighted
the


importance
of
ASM

recently,
multiple
solution
providers
have
emerged
in
the
space,
and
investment
and
acquisition
activity
have
seen
an
uptick.

Many
concepts
come
and
go
in
cybersecurity,
but
attack
surface
management
promises
to
have
staying
power.
As
it
evolves
into
a
critical
component
of
threat
and
exposure
management
strategies,
it’s
worth
examining
why
attack
surface
management
has
grown
to
become
a
key
category,
and
why
it
will
continue
to
be
a
necessity
for
organizations
worldwide.

What
is
Attack
Surface
Management?

Attack
surfaces
are
rapidly
expanding.
The
attack
surface
includes
any
IT
asset
connected
to
the
internet

applications,
IoT
devices,
Kubernetes
clusters,
cloud
platforms

that
threat
actors
could
infiltrate
and
exploit
to
perpetuate
an
attack.
A
company’s
attack
surface
faces
a
barrage
of
daily
attacks,
and
any
external
network
vulnerabilities
could
open
the
door
to
a
potential
breach.

Attack
surface
management
identifies
all
external
assets,
both
known
and
unknown,
with
the
intent
of
discovering
vulnerabilities
or
exposures
before
threat
actors
do.
It
also
prioritizes
vulnerabilities
based
on
risk
so
that
remediation
efforts
can
focus
on
the
most
critical
exposures.
By
taking
a
continuous
approach
to
attack
surface
management,
organizations
can
address
vulnerabilities
quickly
as
new,
more
sophisticated
threats
emerge
and
attack
surfaces
expand,
helping
to
better
protect
their
critical
assets.

What’s
Driving
Attack
Surface
Management
Adoption?

National
Institute
of
Standards
and
Technology
(NIST)
recommended
cataloging
external
assets
as
far
back
as
2014,
so
why
has
it
taken
until
now
for
attack
surface
management
to
see
more
widespread
adoption?
Several
recent
developments
and
trends
have
made
it
more
urgent
than
before.


  • Hybrid
    Work

    Facilitating
    remote
    work
    makes
    companies
    more
    dependent
    on
    technology
    and
    less
    tethered
    to
    a
    single
    location,
    both
    of
    which
    lead
    to
    an
    expanded
    attack
    surface
    and
    the
    potential
    for
    increased
    exposures.

  • Cloud
    Computing

    Rapid
    cloud
    adoption
    has
    also
    expanded
    the
    attack
    surface
    faster
    than
    many
    security
    and
    IT
    teams
    can
    keep
    pace
    with,
    often
    resulting
    in
    technical
    debt
    or
    insecure
    configurations.

  • Shadow
    IT

    Employees
    now
    frequently
    use
    their
    own
    devices
    and
    services
    to
    handle
    company
    data
    without
    alerting
    the
    IT
    department
    or
    securing
    this
    “shadow
    IT”
    by
    following
    proper
    protocols.

  • Connected
    Devices

    The
    proliferation
    of
    internet-connected
    devices,
    from
    smartphones
    to
    sensors,
    in
    business
    environments
    has
    created
    a
    new
    and
    growing
    corner
    of
    the
    attack
    surface
    at
    high
    risk
    due
    to
    the
    relative
    insecurity
    of
    many
    IoT
    devices.

  • Digital
    Transformation

    Companies
    are
    digitizing
    as
    broadly,
    deeply,
    and
    quickly
    as
    possible
    to
    stay
    competitive,
    creating
    new
    layers
    of
    the
    attack
    surface
    while
    altering
    the
    layers
    already
    in
    place.

  • Development
    Expectations

    The
    expectation
    to
    constantly
    be
    launching
    new
    features
    and
    products
    has
    influenced
    the
    speed
    at
    which
    technologies
    go-to-market.
    The
    pressure
    to
    meet
    these
    demands
    can
    lead
    to
    new
    lines
    of
    code
    being
    written
    hastily,
    without
    thorough
    security
    checks
    in
    place.Finding
    a
    way
    to
    innovate
    with
    confidence
    requires
    implementing
    robust
    security
    practices
    and
    integrating
    security
    into
    every
    stage
    of
    the
    development
    process.

The
attack
surface
has
become
significantly
more
widespread
and
unwieldy
as
organizations
grow
their
IT
infrastructure
while
facing
resource
shortages.
At
the
same
time,
their
external-facing
assets
are
susceptible
to
more
threats
than
ever
(a
record-breaking

146
billion
cyber
threats
were
detected

in
2022).

Attack
surface
management
is
an
effective
solution
to
key
challenges
overwhelming
security
teams
of
all
sizes.
In
short
order,
however,
it
has
evolved
into
something
much
bigger
than
that:
the
frontline
of
cybersecurity.

What
is
the
Future
of
Attack
Surface
Management?

As
organizations
of
all
sizes
and
across
industries
become
increasingly
dependent
on
the
digital
world,
the
attack
surface
becomes
both
more
challenging
to
secure
and
critical
to
protect.

NetSPI’s
Attack
Surface
Management
solution
combines
cutting-edge
technology
with
extensive
offensive
security
expertise
to
provide
the
richest
insight
into
the
attack
surface.
NetSPI’s
team
and
tools
empower
security
staff
to
protect
an
ever-expanding
number
of
assets
and
address
vulnerabilities
with
prioritized
remediation
actions.
And
by
making
the
external
attack
surface
as
difficult
to
penetrate
as
possible,
companies
prevent
more
attacks
before
they
even
start,
further
improving
the
effectiveness
of
the
security
team.

Attack
surface
management
is
at
the
forefront
of
the
cybersecurity
conversation
right
now
and
this
likely
won’t
change
anytime
soon.
Learn
more
about
advancing
your
offensive
security
program
by


connecting
directly
with
the


NetSPI
team
.


Note:


This
expertly
contributed
article
is
written
by
Brianna
McGovern.
Brianna
is
NetSPI’s
Product
Manager,
Attack
Surface
Management
and
holds
a
degree
in
Industrial
Engineering
from
Penn
State
University.

NetSPI
is
the
global
leader
in
offensive
security,
delivering
the
most
comprehensive
suite
of
penetration
testing,
attack
surface
management,
and
breach
and
attack
simulation
solutions.
Through
a
combination
of
technology
innovation
and
human
ingenuity
NetSPI
helps
organizations
discover,
prioritize,
and
remediate
security
vulnerabilities.
Its
global
cybersecurity
experts
are
committed
to
securing
the
world’s
most
prominent
organizations,
including
nine
of
the
top
10
U.S.
banks,
four
of
the
top
five
leading
global
cloud
providers,
four
of
the
five
largest
healthcare
companies,
three
FAANG
companies,
seven
of
the
top
10
U.S.
retailers
&
e-commerce
companies,
and
many
of
the
Fortune
500.
NetSPI
is
headquartered
in
Minneapolis,
MN,
with
offices
across
the
U.S.,
Canada,
the
UK,
and
India.

Found
this
article
interesting?
Follow
us
on

Twitter


and

LinkedIn

to
read
more
exclusive
content
we
post.

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.