IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

What is attack surface management?

Instigate attack surface management to anticipate where cyber attackers might strike and avoid falling prey

A cybersecurity expert examines an attack

Attack surface management (ASM) might sound like something the SAS might get involved in, but this most definitely refers to the world of networks and cyber security

The attack surface is the sum of all possible entry points that a cyber criminal might use to gain unauthorised access to systems, networks or data. For a typical business, this might include devices, websites, servers, software platforms and even people. Every time the enterprise adds a server, deploys a new application, sets up a virtual private network (VPN) or enrols more users, the surface grows.

That’s where ASM can come in handy. Taking the perspective of the hacker into account, this process involves discovering, analysing and mitigating the vulnerabilities and potential vectors that altogether comprise the attack surface. Proper attack surface management highlights the targets and understands the level of risk associated with the attack vectors in question. 

What does attack surface management involve?

Attack vectors are methods that attackers use to gain access, such as phishing, malware, API exploits or zero-day vulnerabilities. The attack surface is the target against which those methods can be deployed. So social engineering is an attack vector; an individual whose trust is exploited is part of the attack surface.

Figuratively speaking, your attack surface generally has three sides. One is the digital attack surface: that’s everything connected to your network, from apps to websites and the ports they connect through. Then there’s the physical attack surface – servers, mobile devices, routers and even printers. Finally, the social attack surface comprises staff, contractors and so forth. You can of course further break down these divisions with greater levels of granularity, but the digital, physical and social aspects broadly cover everything.

What steps can my business take to shrink its attack surface? 

This is very much the hard part. Because the attack surface is always changing and evolving, managing it can seem like a Sisyphean task. 

1. Minimise complexity

As a business expands, its IT environment tends to accumulate legacy endpoints and applications – prime targets for attackers. Security processes grow in complexity too, creating more potential for exploitable mistakes. Cut out legacy assets wherever you can, and segment your network to limit the potential for intrusions.

2. Know your vulnerabilities

Static vulnerability scanning is valuable, but real attackers are more cunning and resourceful than any automated test. Schedule regular penetration testing, and include “red team” exercises to obtain a realistic, adversary’s-eye view of your vulnerabilities.

3. Raise awareness

Many compromises start at the social attack surface. Promote awareness of threats, from the shop floor to the boardroom – and support it with upstream security controls. Don’t play the blame game, but embrace zero trust principles to make it as hard as possible for anyone, whether inside the organisation or outside of it, to breach security.

4. Seek out an ASM solution

There are numerous ASM platforms out there, including ASM as a service. Most of these solutions address ASM from four perspectives: asset discovery, classification, risk prioritisation and ongoing monitoring. If you’re familiar with the security mindset you might wonder why there’s no risk remediation step – but that’s the sum of the other parts.

What do ASM services offer, in practical terms?

The asset discovery part is all about making sure you know what you’re working with. You can’t begin to manage the risks to your IT systems unless you’re fully apprised of exactly what and where those systems are. Creating a map of potential entry points can immediately highlight which are the most attractive to a threat actor.

This leads onto classification, where assets are analysed with regard to what they connect to, the attack routes they could enable, and the vulnerabilities they may contain. Once the process is complete, it’s time to prioritise, so that issues that represent the highest risk to the business can be dealt with most urgently. Those classifications, those priorities, will likely be subject to constant change, of course; that’s where the ongoing monitoring comes in, to ensure your organisation remains on top of its ASM game.

What’s the best ASM solution for my company?

As always in cyber security, there’s no one-size-fits-all answer. The best solution for your business won’t be the same as for someone else’s, perhaps for reasons of scalability, integration or cost. We can, however, give you some names to look up: Coalfire, CyCognito, ImmuniWeb, Randori, SearchLight, SpectralOps and UpGuard are all good places to start your ASM research.

Featured Resources

IT best practices for accelerating the journey to carbon neutrality

Considerations and pragmatic solutions for IT executives driving sustainable IT

Free Download

The Total Economic Impact™ of IBM Spectrum Virtualize

Cost savings and business benefits enabled by storage built with IBMSpectrum Virtualize

Free download

Using application migration and modernisation to supercharge business agility and resiliency

Modernisation can propel your digital transformation to the next generation

Free Download

The strategic CFO

Why finance transformation propels business value

Free Download

Most Popular

The big PSTN switch off: What’s happening between now and 2025?

The big PSTN switch off: What’s happening between now and 2025?

13 Mar 2023
Why – and how – IP can be the hero in your digital transformation success story

Why – and how – IP can be the hero in your digital transformation success story

6 Mar 2023
Why Amazon is cutting staff from AWS

Why Amazon is cutting staff from AWS

21 Mar 2023