<?xml version="1.0" encoding="utf-8"?><rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Ivanti Blog: Posts by </title><description /><language>en</language><atom:link rel="self" href="https://www.ivanti.com/en-gb/blog/authors/robert-waters/rss" /><link>https://www.ivanti.com/en-gb/blog/authors/robert-waters</link><item><guid isPermaLink="false">11710027-c723-488c-a221-3e83218decf6</guid><link>https://www.ivanti.com/en-gb/blog/risk-appetite</link><atom:author><atom:name>Robert Waters</atom:name><atom:uri>https://www.ivanti.com/en-gb/blog/authors/robert-waters</atom:uri></atom:author><category>Security</category><title>Understanding Risk Appetite – a Critical Component of Exposure Management</title><description>&lt;p&gt;Risk is inherent in any business. It’s how an organisation understands and manages it that makes all the difference.&lt;/p&gt;

&lt;p&gt;From operational challenges to market volatility, regulatory changes and technological advancements, companies face a spectrum of uncertainties that could either generate growth or lead to losses.&lt;/p&gt;

&lt;p&gt;To effectively manage them, a business needs to set out a framework that helps it determine just how much risk it’s willing to accept in pursuit of its objectives. This is where the concept of "risk appetite" comes into play.&lt;/p&gt;

&lt;p&gt;But to define its risk appetite, a company has to see and understand all the risks it faces. And for security teams that are laying the groundwork for their &lt;a href="https://www.ivanti.com/glossary/exposure-management" target="_blank" rel="noopener"&gt;exposure management&lt;/a&gt; strategy, defining their organisation’s risk appetite is a critical step.&lt;/p&gt;

&lt;h2&gt;What is risk appetite?&lt;/h2&gt;

&lt;p&gt;Risk appetite is the level of risk an organisation is willing to accept in pursuit of its objectives. Defining it sets boundaries for the organisation regarding what risks it will take and to what degree. A&amp;nbsp;&lt;em&gt;high risk&lt;/em&gt; appetite means being open to accepting greater risks for possibly higher rewards, while a &lt;em&gt;low risk&lt;/em&gt; appetite means the organisation prefers reducing risk as much as possible.&lt;/p&gt;

&lt;p&gt;Consider a tech startup that wants to invest in cutting-edge research and development. It may adopt a higher risk appetite to achieve disruptive, breakthrough innovations, knowing that the potential rewards are worth the uncertainty. Conversely, a large, well-established corporation might have a lower risk appetite, focusing on steady growth while avoiding projects that could significantly harm its market position or reputation.&lt;/p&gt;

&lt;h2&gt;Risk appetite is both quantitative and qualitative&lt;/h2&gt;

&lt;p&gt;Risk appetite is never static; it’s a dynamic measure that should be adjusted based on factors such as industry, company size and health, strategic objectives, regulatory requirements and the overall market environment.&lt;/p&gt;

&lt;p&gt;Nor is it just about the numbers: risk appetite is a blend of both quantitative and qualitative factors.&lt;/p&gt;

&lt;p&gt;On one hand, a business may have measurable elements like how much loss it’s willing to tolerate, its debt ratios and what kind of return on investment (ROI) it’s shooting for. It may also have subjective aspects to consider, such as the potential effect on company reputation, ethical considerations and how well its decisions align with its core values.&lt;/p&gt;

&lt;h2&gt;Why is it important to define risk appetite?&lt;/h2&gt;

&lt;p&gt;Nearly any organisation that wants to succeed has to take calculated risks. But without a clear understanding of its risk appetite, it can wander into inconsistent, reactive or overly cautious decision-making. That can lead to missed opportunities or business losses. Here's why defining risk appetite is essential:&lt;/p&gt;

&lt;h3&gt;To align strategy and risk management&lt;/h3&gt;

&lt;p&gt;Having a clearly defined risk appetite provides a strategic framework that aligns &lt;a href="https://www.ivanti.com/blog/vulnerability-and-risk-management-how-to-simplify-the-process" target="_blank" rel="noopener"&gt;risk management practices&lt;/a&gt; with overall business goals. When an enterprise knows how much risk it is willing to accept, it can pursue opportunities that match its risk appetite while avoiding others that might expose it to undue risk.&lt;/p&gt;

&lt;h3&gt;To improve decision-making&lt;/h3&gt;

&lt;p&gt;Defining risk appetite allows leaders and managers to make informed decisions by clearly understanding what constitutes an acceptable risk. It also sets expectations for both risk-taking and risk-avoidance behaviours across the organisation, helping managers evaluate risk/reward trade-offs in different scenarios.&lt;/p&gt;

&lt;h3&gt;To build stakeholder confidence&lt;/h3&gt;

&lt;p&gt;A clearly defined risk appetite reassures investors, regulators, employees and other stakeholders that the organisation prioritises risk management. It also demonstrates a methodical, trustworthy approach to balancing risk against reward, further shoring up stakeholder confidence.&lt;/p&gt;

&lt;h3&gt;To promote consistency&lt;/h3&gt;

&lt;p&gt;When everyone in an organisation “gets the memo” on how much risk is permissible, that helps them make consistent decisions because they all understand what's an acceptable gamble. This means there’s less chance of working at cross-purposes or even pulling in opposite directions. For instance, a legal department might put the brakes on a marketing team’s Big Idea if they don’t share the same notion of acceptable risk.&lt;/p&gt;

&lt;h3&gt;To support effective risk monitoring&lt;/h3&gt;

&lt;p&gt;When companies define their risk appetite, they can set up systems to monitor risk levels across the entire enterprise, from finance to operations. Thus, they’re able to spot potential issues early and ensure activities stay within the boundaries of what’s seen as safe — or at least acceptable. Setting and monitoring key risk indicators (KRIs) provides early warnings if somebody is coming too close to those boundaries.&lt;/p&gt;

&lt;h2&gt;How does a company define its risk appetite?&lt;/h2&gt;

&lt;p&gt;Typically, an organisation does this by drafting a risk appetite statement (RAS). The first parts of an RAS lay out the company’s strategic objectives and the risks involved.&lt;/p&gt;

&lt;p&gt;A company might want to become the leading software provider in their industry. They should list the strategic objectives that are vital to reaching that goal and also list the risks associated with them. For instance, Ivanti is in the business of delivering cloud-based IT services and security management solutions. That means it’s incumbent on us that our risk appetite statement catalogues all the risks involved in that line of business and explains how we’ll manage them.&lt;/p&gt;

&lt;p&gt;Here’s an example of how one section of a risk appetite statement might look for a software provider:&lt;/p&gt;

&lt;blockquote&gt;
&lt;table&gt;
	&lt;thead&gt;
		&lt;tr&gt;
			&lt;th colspan="2" scope="col"&gt;
			&lt;p&gt;General Risk Appetite&lt;/p&gt;

			&lt;p&gt;[Company XYZ] adopts a balanced approach to risk, recognising that not all risks are equal and that some level of risk is necessary to achieve our strategic goals.&lt;/p&gt;
			&lt;/th&gt;
		&lt;/tr&gt;
	&lt;/thead&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td&gt;Innovation Risk&lt;/td&gt;
			&lt;td&gt;We have a high risk appetite for investing in advanced technologies and innovative solutions that differentiate our products in the competitive landscape. We understand this requires accepting a degree of uncertainty in R&amp;amp;D and product development.&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Operational Risk&lt;/td&gt;
			&lt;td&gt;We maintain a low to moderate risk appetite. While striving for operational excellence, we prioritise initiatives that improve efficiency and service quality without compromising our delivery standards.&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Security Risk&lt;/td&gt;
			&lt;td&gt;We have an extremely low risk appetite for security threats and breaches. Our commitment to network security and data protection is paramount, and we invest substantially in safeguarding our systems and our clients’ data.&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Compliance Risk&lt;/td&gt;
			&lt;td&gt;We have a low risk appetite for non-compliance with legal and regulatory requirements. Ensuring adherence to relevant laws, standards and best practices in all operational areas is critical.&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;
&lt;/blockquote&gt;

&lt;p&gt;The RAS should define the risks that would have the greatest impact on the organisation, not everyday risks that are simply part of doing business. It ought to account for multiple risk scenarios; for instance, a specific strategy may entail supply chain risk, such as the effects of being locked into a vendor or the dangers of regulatory exposure if a supplier mishandles customer data.&lt;/p&gt;

&lt;p&gt;It should also define the amount of financial risk a company is willing to take on. If its objectives include offering a new product or service, there's always a chance of failure in the marketplace.&lt;/p&gt;

&lt;h2&gt;Components of risk appetite&lt;/h2&gt;

&lt;p&gt;These are key factors that have to be considered in defining risk appetite:&lt;/p&gt;

&lt;h3&gt;Risk capacity&lt;/h3&gt;

&lt;p&gt;This refers to the &lt;em&gt;maximum&lt;/em&gt; amount of risk that an organisation can bear. Financial resources, operational capabilities and regulatory constraints decide this. And risk capacity differs from risk appetite: an organisation may have the capacity to take on a certain level of risk but might choose not to, based on its risk appetite.&lt;/p&gt;

&lt;h3&gt;Risk tolerance&lt;/h3&gt;

&lt;p&gt;Whereas risk capacity is about how much risk an organisation can withstand, risk tolerance is an acceptable deviation from its target. It may even set different tolerances for different areas. For example, an organisation might be good with taking a chance on a new product, but risk-avoidant about managing customer data.&lt;/p&gt;

&lt;h3&gt;Risk thresholds&lt;/h3&gt;

&lt;p&gt;We’ve mentioned risk monitoring and KRIs above, as they’re used to keep a company from crossing risk thresholds — the “red lines” that represent too much risk. Crossing a risk threshold might require a change in plans, increased safety measures or even a complete halt to what they’re doing.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Related: Ivanti Research Report: &lt;a href="https://www.ivanti.com/resources/research-reports/cybersecurity-risk-management" target="_blank" rel="noopener"&gt;Aligning Perspectives: Cyber Risk Management in the C-Suite&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;Why is risk appetite important in exposure management?&lt;/h2&gt;

&lt;p&gt;Once upon a time, mitigating digital risk was much simpler than it is today. That’s because most large organisations’ attack surfaces have vastly expanded over time. The addition of more devices and applications, used by employees in more places, have transformed the workplace and expanded the digital threat landscape.&lt;/p&gt;

&lt;p&gt;It’s one reason why &lt;a href="https://www.ivanti.com/resources/research-reports/attack-surface-management" target="_blank" rel="noopener"&gt;Ivanti research&lt;/a&gt; found that more than half of IT professionals are not very confident they can prevent a damaging security incident in the next 12 months. More than one in three even say they’re less prepared to detect threats and respond to incidents than they were a year ago.&lt;/p&gt;

&lt;p&gt;Traditional &lt;a href="https://www.ivanti.com/en-gb/products/risk-based-vulnerability-management"&gt;vulnerability management&lt;/a&gt; has long been focused on reactively remediating software and hardware vulnerabilities and other CVEs, but usually only applies intermittent scans. But today’s cyberthreat scenario demands a new approach.&lt;/p&gt;

&lt;p&gt;Modern exposure management is focused on continually, proactively finding and remediating risks and vulnerabilities across the entire digital attack surface. That’s whether they arise from exposed IT assets, unsecured endpoints and applications, cloud-based resources or other vectors. What makes exposure management and risk appetite so intertwined?&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;em&gt;Assessing exposure according to acceptable risk levels:&lt;/em&gt; Exposure management involves quantifying the risk levels associated with different exposures. By defining acceptable risk, organisations can compare the possible impact of different risks with their risk appetite.&lt;/li&gt;
	&lt;li&gt;&lt;em&gt;Deploying resources based on risk:&lt;/em&gt; Organisations must prioritise which exposures pose the greatest threat to their strategies – an assessment they can only make with a clear understanding of their risk appetite. That prioritisation lets them concentrate resources on mitigating the most critical ones, often with the help of an advanced RBVM tool.&lt;/li&gt;
	&lt;li&gt;&lt;em&gt;Adjusting risk appetite:&lt;/em&gt; As a business environment changes or new risks emerge, risk appetite may need to be adjusted. The data and insights organisations uncover as part of their exposure management practice help them make informed decisions around such adjustments.&lt;/li&gt;
	&lt;li&gt;&lt;em&gt;Ensuring compliance:&lt;/em&gt; Many industries have regulatory requirements related to risk management, which in turn influence an organisation’s risk appetite. Exposure management involves identifying and addressing risks that could cause non-compliance.&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;Related: Ivanti Research Report: &lt;a href="https://www.ivanti.com/resources/research-reports/attack-surface-management" target="_blank" rel="noopener"&gt;Attack Surface Management&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;Looking at security risk through the lens of exposure management&lt;/h2&gt;

&lt;p&gt;A notable difference between exposure management and other security practices is that exposure management includes not just prioritising remediation of the risks that pose the most risk to the organisation, but actively defining which risks fall within an organisation’s risk tolerance. For example, an e-commerce company may be willing to accept heightened security risks in order to keep their site functional on Black Friday – the tradeoff is worth it to them.&lt;/p&gt;

&lt;p&gt;Instead of viewing every potential risk as a crisis that needs instant remediation, organisations need to prioritise them based on business needs. In this framework, most risk &lt;em&gt;isn’t&lt;/em&gt; bad: it’s about how you react to it, control it and mitigate it to bring it to an acceptable level.&lt;/p&gt;
</description><pubDate>Mon, 10 Feb 2025 14:44:03 Z</pubDate></item><item><guid isPermaLink="false">1f9777b1-e2bd-491c-8eaf-df3503467a13</guid><link>https://www.ivanti.com/en-gb/blog/exposure-management-checklist</link><atom:author><atom:name>Robert Waters</atom:name><atom:uri>https://www.ivanti.com/en-gb/blog/authors/robert-waters</atom:uri></atom:author><category>Security</category><title>The Five Ws (and H) of Exposure Management</title><description>&lt;p&gt;The Five Ws and H — who, what, when, where, why and how — have long been used as a checklist in journalism to make sure a story covers every piece of essential information. The same concept is employed here to make sure all the essential information about exposure management is covered in this post.&lt;/p&gt;

&lt;p&gt;Read on for a better understanding of &lt;a href="https://www.ivanti.com/en-gb/resources/exposure-management-strategy-guide" target="_blank"&gt;exposure management &lt;/a&gt;(the Five Ws) and actionable guidance for implementing it (the H).&lt;/p&gt;

&lt;h2&gt;Who&lt;/h2&gt;

&lt;h3&gt;Who invented exposure management?&lt;/h3&gt;

&lt;p&gt;The term “exposure management” has been used in various contexts for decades, though it’s unknown when it was first used within the context of cybersecurity. That being said, exposure management is an evolution of vulnerability management, so it’s not an entirely new concept within the cybersecurity space but rather a reimagining of a preexisting practice.&lt;/p&gt;

&lt;p&gt;Exposure management started gaining popularity in the cybersecurity space in 2022 as analyst firms began publishing research reports on the topic and vendors began releasing exposure management products and services.&lt;/p&gt;

&lt;h3&gt;Who benefits from exposure management?&lt;/h3&gt;

&lt;p&gt;Exposure management benefits a range of internal stakeholders — I recommend reading on if you fit any of the following profiles:&lt;/p&gt;

&lt;table&gt;
	&lt;thead&gt;
		&lt;tr&gt;
			&lt;th scope="col"&gt;Role&lt;/th&gt;
			&lt;th scope="col"&gt;Relevant Responsibility&lt;/th&gt;
			&lt;th scope="col"&gt;Benefit&lt;/th&gt;
		&lt;/tr&gt;
	&lt;/thead&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td&gt;Security architect&lt;/td&gt;
			&lt;td&gt;Develop secure systems and networks&lt;/td&gt;
			&lt;td&gt;Improved understanding of risk posed to systems and networks&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Vulnerability risk management (VRM)&lt;/td&gt;
			&lt;td&gt;Identify exposures and prioritise for remediation&lt;/td&gt;
			&lt;td&gt;Improved efficiency and accuracy of prioritisation process&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;SOC / security analyst&lt;/td&gt;
			&lt;td&gt;Detect and respond to cyber attacks&lt;/td&gt;
			&lt;td&gt;Lower volume of incidents requiring reactive response&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;IT operations&lt;/td&gt;
			&lt;td&gt;Remediate exposures prioritised by VRM&lt;/td&gt;
			&lt;td&gt;Lower volume of exposures requiring remediation&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Development&lt;/td&gt;
			&lt;td&gt;Make code changes to resolve exposures in software&lt;/td&gt;
			&lt;td&gt;Lower volume of exposures requiring resolution&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Chief information security officer (CISO)&lt;/td&gt;
			&lt;td&gt;Oversee infosec programme that protects systems and data&lt;/td&gt;
			&lt;td&gt;Stronger security posture better protects systems and data&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Chief information officer (CIO)&lt;/td&gt;
			&lt;td&gt;Own management, implementation and usability of IT&lt;/td&gt;
			&lt;td&gt;Less downtime leads to improved &lt;a href="https://www.ivanti.com/glossary/digital-employee-experience-dex" target="_blank" rel="noopener"&gt;digital employee experience&lt;/a&gt;&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;C-suite&lt;/td&gt;
			&lt;td&gt;Ensure day-to-day operations align with long-term strategies&lt;/td&gt;
			&lt;td&gt;Better equipped to make decisions regarding risk&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Board of directors&lt;/td&gt;
			&lt;td&gt;Protect interests of shareholders and stakeholders&lt;/td&gt;
			&lt;td&gt;Fewer attacks means less damage to reputation and revenue&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Business unit (BU) leader&lt;/td&gt;
			&lt;td&gt;Lead a specific division towards its goals&lt;/td&gt;
			&lt;td&gt;Decreased downtime of BU’s critical systems and services&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Public relations (PR)&lt;/td&gt;
			&lt;td&gt;Reverse negative communication and perception around a crisis&lt;/td&gt;
			&lt;td&gt;Fewer PR crises stemming from cyber attacks&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Chief financial officer (CFO) / finance organisation&lt;/td&gt;
			&lt;td&gt;Maintain the fiscal health of the organisation&lt;/td&gt;
			&lt;td&gt;Less unanticipated costs for cyber attack response and recovery&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Compliance team&lt;/td&gt;
			&lt;td&gt;Ensure adherence to regulations and avoidance of missteps that could harm the organisation&lt;/td&gt;
			&lt;td&gt;Lower odds of violating regulations or experiencing other harm thanks to fewer breaches&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;

&lt;p&gt;External stakeholders also benefit when exposure management results in improved security postures for organisations. For example, customers are at lower risk of having their personally identifiable information (PII) compromised in a data breach and shareholders are less likely to see stock prices dip due to a brand’s reputation being damaged by a cyber attack.&lt;/p&gt;

&lt;h3&gt;Who “owns” exposure management?&lt;/h3&gt;

&lt;p&gt;This may seem illogical, or even controversial, but it’s the C-suite that owns exposure management. While Security owns day-to-day exposure management operations, those operations are executed at the direction of the executive team — as noted above, they’re the ones determining the organisation’s risk appetite. The numbers support this stance. &lt;a href="https://www.ivanti.com/resources/research-reports/cybersecurity-risk-management" target="_blank" rel="noopener"&gt;86% of security professionals&lt;/a&gt; we surveyed said that cybersecurity is a topic discussed at the board level.&lt;/p&gt;

&lt;p&gt;Such a stance may have been blasphemous in the past, as most C-suite members lack the knowledge necessary to make cybersecurity decisions. But by focusing on exposure management, organisations can use quantifiable data to assess risks, reducing reliance on subjective judgement. This means that decisions regarding cybersecurity priorities and responses can be based on measurable risk factors, such as the likelihood of a threat and its potential impact.&lt;/p&gt;

&lt;p&gt;Further, by linking cybersecurity operations directly to risk posture, exposure management offers a greater opportunity for aligning these operations with the overall business strategy. Under this approach, cybersecurity is no longer just a technical requirement but a strategic enabler that supports broader business objectives.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;h2&gt;What&lt;/h2&gt;

&lt;h3&gt;What is exposure management?&lt;/h3&gt;

&lt;p&gt;Exposure management is a proactive cybersecurity practice that enables organisations to maintain their exposures at a level that aligns with their risk appetite. It is, in essence, an evolution of vulnerability management that addresses the shortcomings of traditional vulnerability management practices.&lt;/p&gt;

&lt;p&gt;Exposure management practices are commonly guided by continuous threat exposure management (CTEM) programmes.&lt;/p&gt;

&lt;p&gt;Refer to Ivanti’s &lt;a href="https://www.gartner.com/document/4016760" rel="noopener" target="_blank"&gt;Exposure Management glossary page&lt;/a&gt; for a more thorough answer to this question.&lt;/p&gt;

&lt;h3&gt;What is continuous threat exposure management (CTEM)?&lt;/h3&gt;

&lt;p&gt;Continuous threat exposure management — or CTEM — is defined in the 2023 Gartner® &lt;a href="https://www.gartner.com/document/4016760" rel="noopener" target="_blank"&gt;Implement a Continuous Threat Exposure Management (CTEM) Program&lt;/a&gt; report as follows:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;“Continuous Threat Exposure Management (CTEM) programme is a set of processes and capabilities that allow enterprises to continually and consistently evaluate the accessibility, exposure and exploitability of an enterprise’s digital and physical assets.&lt;/p&gt;

&lt;p&gt;At any stage of maturity, a CTEM cycle must include five steps to be completed: scoping, discovery, prioritisation, validation and mobilisation.”&lt;sup&gt;1&lt;/sup&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3&gt;What are the components of exposure management?&lt;/h3&gt;

&lt;p&gt;In its current form, exposure management effectively combines capabilities from these existing categories:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/glossary/attack-surface-management-asm" target="_blank" rel="noopener"&gt;Attack surface management&lt;/a&gt; (ASM), e.g., &lt;a href="https://www.ivanti.com/en-gb/products/external-attack-surface-management" target="_blank"&gt;external attack surface management&lt;/a&gt; (EASM) and cyber asset attack surface management (CAASM).&lt;/li&gt;
	&lt;li&gt;Risk-based vulnerability management (RBVM).&lt;/li&gt;
	&lt;li&gt;Validation, e.g., breach and attack simulation (BAS), continuous automated red teaming (CART) and penetration testing as a service (PTaaS).&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Expect to see purpose-built exposure management products and platforms as the exposure management market matures.&lt;/p&gt;

&lt;h3&gt;What is risk appetite?&lt;/h3&gt;

&lt;p&gt;Risk appetite is the level of cyber risk an organisation is prepared to accept in pursuit of its business objectives, such as increased agility, innovation or performance. To determine its risk appetite, an organisation must weigh the cost of maintaining a certain security posture against the benefit of doing so. Setting risk appetite is a business decision, though one that must include input from Security.&lt;/p&gt;

&lt;p&gt;Refer to&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/risk-appetite" target="_blank" rel="noopener"&gt;Understanding Risk Appetite – a Critical Component of Exposure Management&lt;/a&gt;&amp;nbsp;for an in-depth description of risk appetite.&lt;/p&gt;

&lt;h2&gt;Where&lt;/h2&gt;

&lt;h3&gt;Where should exposure management be implemented?&lt;/h3&gt;

&lt;p&gt;Exposure management practices should be implemented at all organisations that rely on technology that’s accessible from the internet or other external pathways.&lt;/p&gt;

&lt;p&gt;Exposure management is especially important for organisations that are beholden to laws and/or other regulations regarding the safe handling of personal data. Examples include the California Consumer Privacy Act (CCPA) and the General Data Protection Regulation (GDPR).&lt;/p&gt;

&lt;p&gt;Organisations likely to have lots of unknown devices connecting to the network and other unknown internet-facing assets in their environment are also optimal candidates for exposure management. Unknown assets often proliferate as a result of bring your own device (BYOD) policies and mergers and acquisitions.&lt;/p&gt;

&lt;h2&gt;When&lt;/h2&gt;

&lt;h3&gt;When should I implement exposure management?&lt;/h3&gt;

&lt;p&gt;According to a &lt;a href="https://www.gartner.com/en/newsroom/press-releases/2024-02-22-gartner-identifies-top-cybersecurity-trends-for-2024" rel="noopener" target="_blank"&gt;Gartner press release&lt;/a&gt;, “By 2026, Gartner predicts that organisations prioritising their security investments based on a CTEM programme will realise a two-thirds reduction in breaches.”&lt;sup&gt;2 &lt;/sup&gt;We believe that’s a compelling reason to begin implementing exposure management as soon as possible. It’s also good news at a time when &lt;a href="https://www.ivanti.com/resources/research-reports/attack-surface-management" target="_blank" rel="noopener"&gt;organizations’ attack surfaces are rapidly expanding&lt;/a&gt;, putting them at higher risk of attack.&lt;/p&gt;

&lt;p&gt;More good news: any organisation practising vulnerability management has already laid the foundation upon which they can build an exposure management practice. Read on for actionable advice on how to do so.&lt;/p&gt;

&lt;h2&gt;Why&lt;/h2&gt;

&lt;h3&gt;Why implement exposure management?&lt;/h3&gt;

&lt;p&gt;Many organisations have an incomplete understanding of their cyber risk due to limited views of the assets and exposures in their environments. Lots of effort is exerted in attempts to lower risk by remediating exposures, but the ROI on that effort is often low due to shortcomings associated with traditional vulnerability management methods.&lt;/p&gt;

&lt;p&gt;Such organisations thus remain at elevated risk of experiencing cyber attacks that take advantage of un-remediated exposures and can negatively impact their operations, image and revenue. Exposure management solves this problem by empowering those organisations to maintain their exposures in alignment with their risk appetite.&lt;/p&gt;

&lt;p&gt;The following is an overview of the shortcomings of traditional vulnerability management that exposure management addresses:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Shortcoming #1: Organisations look only at a narrow sliver of their continuously expanding attack surfaces.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Many organisations only closely monitor and manage their traditional perimeter — endpoints and servers — from a cybersecurity standpoint.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Why it’s a problem: Full attack surface visibility is needed to properly protect against all potential threats.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Modern attack surfaces have expanded beyond the traditional perimeter to include mobile devices, applications, websites, certificates/domains and more. Each of these components introduces added risk to an organisation that must be accounted for.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Shortcoming #2: The number of cybersecurity exposures organisations face continues to grow at an unmanageable rate.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;There are hundreds of thousands of existing Common Vulnerabilities and Exposures (CVEs) and dozens — sometimes hundreds — more are published to the National Vulnerability Database (NVD) every day. And while CVEs are often the only type of exposure organisations account for, they face many others, such as misconfiguration of assets and security controls.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Why it’s a problem: Remediating all exposures is operationally infeasible, leaving organisations stuck in reactive mode.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Organisations are overwhelmed by the constant onslaught of exposures turning up in their environments. They can’t fix every exposure as that would require critical systems to be offline far too often — not to mention many exposures don’t have known fixes.&lt;/p&gt;

&lt;p&gt;This forces them into firefighting mode, always trying to unbury themselves from endless exposures or overcome ongoing security incidents instead of working proactively to improve their security posture.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Shortcoming #3: Remediation activities are prioritised based strictly on the severity of vulnerabilities.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The Common Vulnerability Scoring System (CVSS) v3.1 is among the most popular methods for prioritising vulnerabilities for remediation. CVSS assigns vulnerabilities with scores from zero to 10 based on their severity — zero being the least critical and 10 being the most.&lt;/p&gt;

&lt;p&gt;Unfortunately, those scores don't account for real-world threat context — meaning organisations employing CVSS are misguided if their intent in doing so is to reduce risk.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Why it’s a problem: Remediation decisions are based on the makeup of vulnerabilities instead of a given organisation’s risk appetite and the potential impact a given vulnerability may pose to their business.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Organisations that use CVSS are basing decisions on vulnerabilities’ characteristics without accounting for their own. For starters, since CVSS scores don’t accurately reflect risk, organisations can’t use CVSS to determine if a given vulnerability exceeds their individual risk appetite.&lt;/p&gt;

&lt;p&gt;Further, CVSS doesn’t enable organisations to determine how a vulnerability might impact their business — certainly a crucial consideration when determining whether that vulnerability needs to be remediated.&lt;/p&gt;

&lt;h2&gt;How&lt;/h2&gt;

&lt;h3&gt;How do I implement exposure management?&lt;/h3&gt;

&lt;p&gt;This bears repeating one more time: exposure management is an evolution of vulnerability management. Most organisations thus already have the foundation for its exposure management practice in place.&lt;/p&gt;

&lt;p&gt;But how do you advance from vulnerability management to exposure management? Here are six best practices to guide the process:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Best practice #1: Widen your attack surface aperture&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Evolving to exposure management requires widening your attack surface aperture to include non-patchable attack surfaces. While you’ll always need to account for traditional devices and applications, nowadays, you also need to account for all systems, applications and subscriptions, including those not owned by IT or even managed by the business.&lt;/p&gt;

&lt;p&gt;Examples include everything from third-party applications and services — such as SaaS, supply chain dependencies and online code repositories — to corporate social media accounts and leaked data. To gain this visibility, you’ll need to implement digital risk protection services (DRPS) and &lt;a href="https://www.ivanti.com/en-gb/products/external-attack-surface-management"&gt;external attack surface management (EASM)&lt;/a&gt; solutions in addition to any existing &lt;a href="https://www.techtarget.com/searchsecurity/definition/cybersecurity-asset-management-CSAM" rel="noopener" target="_blank"&gt;cybersecurity asset management (CSAM)&lt;/a&gt; tools.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Best practice #2: Reframe remediation&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If you expand your exposure management programme to include non-patchable attack surfaces, you’ll also need to expand it to include means for managing your exposure through ways other than patching.&lt;/p&gt;

&lt;p&gt;There are many routes to resolution for threat exposures, ranging from accepting and managing the risk by increasing monitoring, through to mitigation and resolutions that, in addition to patching, may mean implementing a policy change or redeveloping an application.&lt;/p&gt;

&lt;p&gt;Remember, there's often more than one fix to an issue, and your team will often need to collaborate closely with other teams to implement those fixes, including infrastructure and operations teams and enterprise architecture functions. In some cases, your team may need to acquire new skills and understanding to execute fixes that fall under Security’s umbrella.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Best practice #3: Reprioritize&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;As mentioned under “Why implement exposure management?” above, using CVSS to prioritise exposures for remediation omits risk from the prioritisation process. That can be remedied through the use of &lt;a href="https://www.ivanti.com/en-gb/products/risk-based-vulnerability-management"&gt;risk-based vulnerability management (RBVM)&lt;/a&gt; solutions.&lt;/p&gt;

&lt;p&gt;&lt;img alt="infographic" src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/1/ws-ls-blog-min.png"&gt;&lt;/p&gt;

&lt;p&gt;Here’s how such solutions improve exposure management, using the graphic above as a reference:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;There are 330,000+ known vulnerabilities.&lt;/li&gt;
	&lt;li&gt;Fortunately, you don’t need to remediate every vulnerability in your environment. The number that are tied to ransomware is low, and even less are trending/active exploits.&lt;/li&gt;
	&lt;li&gt;RBVM solutions provide risk-based scoring and views to help you focus remediation efforts on that small number of vulnerabilities that pose a significant risk.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Ultimately, a risk-based approach ensures you don’t waste time and effort mitigating or remediating any of the hundreds of thousands of exposures that pose no real danger to your organisation, and that the effort you do expend actually goes toward improving your security posture.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Best practice #4: Build a bridge to the business side&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;With traditional vulnerability management, the “business side” typically only learns a patch is coming when they receive a notification telling them their PC needs to restart to finish installing updates — such is not the case with exposure management.&lt;/p&gt;

&lt;p&gt;For starters, their input is required to determine the business impact of exposures and your organisation’s risk appetite. You’ll need to continually work with the revenue-generating functions of the organisation to determine what systems and solutions have a high impact on their priorities so that exposures that threaten those systems and solutions can be prioritised accordingly.&lt;/p&gt;

&lt;p&gt;This is the type of work that earns Security a seat at the business table — work that shows Security exists to enable the business. Of course, teams on the business side may not be thrilled with the prospect of taking on extra work for something that has never been their responsibility, but there are ways to earn their buy-in:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;CISOs need to lead the outreach effort — their position within the organisation will make it easier for them to open the necessary doors.&lt;/li&gt;
	&lt;li&gt;Once you’re in the door, work with senior leadership to develop metrics that will enable them to make effective exposure management decisions without having to be security specialists.&lt;/li&gt;
	&lt;li&gt;Ensure you keep all the departments you interact with informed on the various options that exist for resolving issues that may impact them. You may need to put in extra time here to shed Security’s reputation for being overly restrictive.&lt;/li&gt;
	&lt;li&gt;Make it clear to them that the business will simply have to accept large amounts of unknown and unquantified risk if a poorly governed exposure management programme fails to accurately scope, discover, prioritise and validate issues, thereby leading to a lack of visibility into threat exposure.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Best practice #5: Validate, validate, validate&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Traditional vulnerability management is guided by prioritisation, while exposure management couples prioritisation with validation. Validation is necessary since prioritisation alone leaves a large volume of issues to resolve.&lt;/p&gt;

&lt;p&gt;In the context of exposure management, validation involves:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;Assessing how potential attackers can exploit an identified exposure.&lt;/li&gt;
	&lt;li&gt;Estimating the highest potential impact of potential attack paths.&lt;/li&gt;
	&lt;li&gt;Identifying how monitoring and control systems might react in the event of an attack.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Validation can be conducted via a mixture of manual and technological methods, including:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Penetration testing conducted by automated tools, internal teams or contract pen testing as a service (PTaaS).&lt;/li&gt;
	&lt;li&gt;Red team exercises.&lt;/li&gt;
	&lt;li&gt;Breach and attack simulation (BAS).&lt;/li&gt;
	&lt;li&gt;Attack path analysis.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Best practice #6: Crawl, walk, run&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Last but not least, the final best practice for evolving to exposure management is: don’t attempt to do it overnight. Use your vulnerability management practice as your starting point and expand from there by adopting the other best practices covered here as your bandwidth and budget allow.&lt;/p&gt;

&lt;hr&gt;
&lt;ol&gt;
	&lt;li&gt;Gartner. D’Hoinne, J., Schneider, M., Shoard, P. (2022, July 21). &lt;em&gt;Implement a Continuous Threat Exposure Management (CTEM) Programme&lt;/em&gt;. &lt;a href="https://www.gartner.com/document/4016760" rel="noopener" target="_blank"&gt;https://www.gartner.com/document/4016760&lt;/a&gt;.&lt;/li&gt;
	&lt;li&gt;Gartner Press Release. &lt;em&gt;Gartner Identifies the Top Cybersecurity Trends for 2024&lt;/em&gt;. (2024, February 22). &lt;a href="https://www.gartner.com/en/newsroom/press-releases/2024-02-22-gartner-identifies-top-cybersecurity-trends-for-2024" rel="noopener" target="_blank"&gt;https://www.gartner.com/en/newsroom/press-releases/2024-02-22-gartner-identifies-top-cybersecurity-trends-for-2024&lt;/a&gt;.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.&lt;/p&gt;
</description><pubDate>Wed, 22 Jan 2025 17:10:20 Z</pubDate></item><item><guid isPermaLink="false">ab703481-4cb9-41b3-90b1-24a121f5ec6b</guid><link>https://www.ivanti.com/en-gb/blog/attack-surface-discovery</link><atom:author><atom:name>Robert Waters</atom:name><atom:uri>https://www.ivanti.com/en-gb/blog/authors/robert-waters</atom:uri></atom:author><category>Security</category><category>Service Management</category><title>How to Identify Your Organisation’s Attack Surface</title><description>&lt;p&gt;Our &lt;a href="https://www.ivanti.com/glossary/attack-surface"&gt;glossary page on attack surfaces&lt;/a&gt; defined the terms associated with the concept. This post provides information that'll help your organization identify its attack surface.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Much like your lawn after a good rain, your attack surface will grow rapidly if left unchecked. Along with increases in attack surface size comes an increase in cybersecurity risk. That risk can’t be eliminated as attack surfaces are always evolving, but it must be carefully managed.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;How do I identify my organisation’s attack surface?&lt;/h2&gt;

&lt;p&gt;Managing that risk begins with identifying your organization’s attack surface. More specifically, you must identify what lurks below the surface — the endpoints, vulnerabilities and other attack vectors that expose your environment.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;To quote &lt;a href="https://learn.cisecurity.org/cis-controls-download" rel="noopener" target="_blank"&gt;CIS Critical Security Controls (CIS Controls) v8&lt;/a&gt;: “Enterprises cannot defend what they do not know they have.” But how does one figure out what they have? If you or anyone from your team has ever wondered the same, you’ve come to the right place.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;By the end of this post, you’ll discover the answers to these questions and better understand how to identify your organization’s attack surface using modern best practices:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="#one"&gt;How do I identify my organization’s digital attack surface?&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="#two"&gt;What is attack surface management (ASM)?&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="#three"&gt;What is cyber asset attack surface management (CAASM)?&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="#four"&gt;What is external attack surface management (EASM)?&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="#five"&gt;What are digital risk protection services (DRPS)?&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="#six"&gt;What’s the difference between CAASM, EASM and DRPS?&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="#seven"&gt;Are there any options beyond ASM offerings for identifying digital attack surfaces?&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="#eight"&gt;How do I identify my organization’s physical attack surface?&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="#nine"&gt;How do I identify my organization’s human attack surface?&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2 id="one"&gt;How do I identify my organisation’s digital attack surface?&lt;/h2&gt;

&lt;p&gt;Identifying your &lt;a href="https://www.ivanti.com/glossary/attack-surface" target="_blank"&gt;digital attack surface&lt;/a&gt; can be difficult with traditional tools and practices, especially as that surface seems to expand exponentially every year. Fortunately, technology and service providers are mobilizing to meet this moment with attack surface management (ASM) offerings.&amp;nbsp;&lt;/p&gt;

&lt;h2 id="two"&gt;Attack surface management (ASM)&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Gaining visibility into the IT assets deployed across your organization — plus their exposure and associated risk — is essential to achieving a strong cybersecurity posture. Leading security frameworks corroborate this stance. For instance, the first &lt;a href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf" rel="noopener" target="_blank"&gt;Function of the National Institute of Standards and Technology Cybersecurity Framework (NIST CSF) Version 1.1&lt;/a&gt; is Identify, and NIST states, “The activities in the Identify Function are foundational for effective use of the Framework.” Similarly, &lt;a href="https://learn.cisecurity.org/cis-controls-download" rel="noopener" target="_blank"&gt;CIS Controls v8&lt;/a&gt; contains the following Controls:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Control 1: Inventory and Control of Enterprise Assets&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Control 2: Inventory and Control of Software Assets&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Control 7: Continuous Vulnerability Management&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Such visibility is also the key to defining your digital attack surface. Unfortunately, organizations have long struggled to attain high levels of visibility.&lt;/p&gt;

&lt;p&gt;Research from Randori and Enterprise Strategy Group (ESG) reveals that, on average, organizations have &lt;a href="https://www.randori.com/reports/the-state-of-attack-surface-management-2022/" rel="noopener" target="_blank"&gt;30% more exposed assets&lt;/a&gt; than traditional asset management programs indicate. That figure stands to grow if companies fail to act as Gartner predicts &lt;a href="https://www.gartner.com/en/newsroom/press-releases/2023-03-28-gartner-unveils-top-8-cybersecurity-predictions-for-2023-2024" rel="noopener" target="_blank"&gt;75% of employees&lt;/a&gt; will acquire, modify or create technology outside IT’s visibility by 2027.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Companies need to close the gap between the number of assets exposed to attackers and the number they know about. They must eliminate those blind spots and unmanaged technology from their environments. ASM does just that. According to Gartner, &lt;a href="https://www.gartner.com/document/4012816" rel="noopener" target="_blank"&gt;ASM aims to answer the question&lt;/a&gt;: “What does my organization look like from an attacker’s point of view, and how should it find and prioritize the issues attackers will see first?”&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;What is attack surface management (ASM)?&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;By taking an attacker’s perspective, ASM enables security teams to gain visibility into assets over which IT lacks governance and control, such as shadow IT, third-party systems and line-of-business applications.&lt;/p&gt;

&lt;p&gt;It works by combining people, processes, technologies and services to continuously discover, inventory and manage an organization’s internal and external assets. By doing so, ASM ensures any newly identified exposures are addressed before they can be exploited by malicious actors.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;ASM is comprised of three areas: cyber asset attack surface management (CAASM), external asset surface management (EASM) and digital risk protection services (DRPS). Each area focuses on a specific use case: CAASM for assets and vulnerabilities, EASM for external assets and DRPS for digital assets.&lt;/p&gt;

&lt;p&gt;When combined, their capabilities can greatly help the 47% of security professionals surveyed for Ivanti’s &lt;a href="https://www.ivanti.com/en-gb/resources/v/doc/ivi/2747/a856c631661d"&gt; Government Cybersecurity Status Report &lt;/a&gt; that lack visibility into all the users, devices, applications and services residing on their networks.&amp;nbsp;&lt;/p&gt;

&lt;h2 id="three"&gt;What is cyber asset attack surface management (CAASM)?&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;CAASM provides a complete, current and consolidated view of an organization’s internal and external assets, such as endpoints, servers, devices and applications. CAASM products enable this visibility by collecting data from existing internal sources such as asset discovery, IT asset management, endpoint security, vulnerability management and patch management tools as well as ticketing systems via API integrations.&lt;/p&gt;

&lt;p&gt;Collected data is automatically aggregated, normalized and deduplicated, then presented in a single user interface, eliminating the need for IT and security teams to manually gather and reconcile asset data. CAASM products also let those teams query against collected data, identify security vulnerabilities, spot gaps in security controls and remediate issues.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Gartner states &lt;a href="https://www.gartner.com/account/signin?method=initialize&amp;amp;TARGET=http%3A%2F%2Fwww.gartner.com%2Fdocument%2F4012816" rel="noopener" target="_blank"&gt;less than 1% of companies&lt;/a&gt; had CAASM functionality implemented in 2022 but anticipates 20% will by 2026. Adoption is thought to be slow as CAASM relies on existing technologies but doesn't replace any of them. It can also likely be attributed to the fact that there are currently &lt;a href="https://www.gartner.com/reviews/market/cyber-asset-attack-surface-management" rel="noopener" target="_blank"&gt;limited vendors in the CAASM space&lt;/a&gt;&lt;/p&gt;

&lt;h2 id="four"&gt;What is external attack surface management (EASM)?&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;As its full name implies, EASM focuses on an organization’s external attack surface by employing processes, technology and managed services to discover internet-facing assets and systems plus related vulnerabilities.&lt;/p&gt;

&lt;p&gt;Examples of &lt;a href="https://www.gartner.com/account/signin?method=initialize&amp;amp;TARGET=http%3A%2F%2Fwww.gartner.com%2Fdocument%2F4021245" rel="noopener" target="_blank"&gt;external assets and systems EASM&lt;/a&gt; discovers include web applications, Internet Protocols (IPs), domain names, Secure Sockets Layer (SSL) certificates and cloud services. Additionally, examples of &lt;a href="https://www.gartner.com/reviews/market/external-attack-surface-management" rel="noopener" target="_blank"&gt;vulnerabilities discovered by EASM&lt;/a&gt; include — but aren't limited to — exposed servers, credentials, public cloud service misconfigurations, deep web and dark web disclosures&amp;nbsp;and vulnerabilities in third-party partner software code.&lt;/p&gt;

&lt;p&gt;In addition to asset discovery, EASM products commonly offer &lt;a href="https://www.gartner.com/account/signin?method=initialize&amp;amp;TARGET=http%3A%2F%2Fwww.gartner.com%2Fdocument%2F4007309" rel="noopener" target="_blank"&gt;other capabilities&lt;/a&gt;, including:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Active external scanning of cloud, IT, IoT and OT environments.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Analysis of assets to determine if they are risky, vulnerable or behaving in an anomalous manner.&lt;/li&gt;
	&lt;li&gt;Prioritization of assets based on business impact, likelihood of exploitation by a malicious actor and other factors.&lt;/li&gt;
	&lt;li&gt;Remediation workflow and third-party integrations with ticketing systems, security orchestration, automation and response (SOAR) solutions&amp;nbsp;and other tools.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The &lt;a href="https://www.gartner.com/account/signin?method=initialize&amp;amp;TARGET=http%3A%2F%2Fwww.gartner.com%2Fdocument%2F4007309" rel="noopener" target="_blank"&gt;main benefits of EASM&lt;/a&gt; are its ability to provide visibility of unknown digital assets and an outside-in view of an organization’s external attack surface. These benefits have helped 31% of companies with an EASM solution to find unknowingly exposed sensitive data, 30% to discover unknown or third-party hosted web assets, and 29% to discover unknown misconfigurations and vulnerable systems.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;EASM’s benefits have also driven &lt;a href="https://www.randori.com/reports/the-state-of-attack-surface-management-2022/" rel="noopener" target="_blank"&gt;34% of organizations&lt;/a&gt; to deploy a dedicated EASM offering. Like CAASM products, EASM products don't replace any existing technologies — meaning they require net-new spending — and there &lt;a href="https://www.gartner.com/reviews/market/external-attack-surface-management" rel="noopener" target="_blank"&gt;aren't currently very many of them on the market&lt;/a&gt;. However, unlike CAASM, EASM products aren't dependent on any existing technologies to operate, making them easier to adopt.&amp;nbsp;&lt;/p&gt;

&lt;h2 id="five"&gt;What are digital risk protection services (DRPS)?&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;DRPS blends technology and services to protect digital assets and data from external threats. It does so by &lt;a href="https://www.gartner.com/document/code/729072" rel="noopener" target="_blank"&gt;extending detection and monitoring&lt;/a&gt; outside the enterprise perimeter — to the open web, deep web, dark web, social media and app marketplaces — to search for threats to enterprise digital resources, including IP addresses, domains and brand-related assets.&lt;/p&gt;

&lt;p&gt;As organizations engage in more and more online activities, it's critical for security teams to adopt DRPS capabilities and look beyond threats within the enterprise network.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.gartner.com/document/4007309" rel="noopener" target="_blank"&gt;According to Gartner&lt;/a&gt;, DRPS products don't simply identify threats, but provide actionable intelligence on threat actors as well as the tools, tactics and processes they exploit to carry out malicious activities. Additionally, DRPS also enables security teams to mitigate active threats using a combination of people, process and technology;and carry out activities required to foil future threats and protect digital assets.&lt;/p&gt;

&lt;p&gt;In its &lt;a href="https://info.jupiterone.com/resources/gartner-hype-cycle-security-operations" rel="noopener" target="_blank"&gt;2022 Hype Cycle for Security Operations&lt;/a&gt;, Gartner indicated DRPS is two to five years away from reaching the last key phase of a technology’s life cycle. That phase — deemed the Plateau of Productivity — is &lt;a href="https://www.gartner.com/en/research/methodologies/gartner-hype-cycle" rel="noopener" target="_blank"&gt;defined as follows&lt;/a&gt;:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Mainstream adoption starts to take off. Criteria for assessing provider viability are more clearly defined. The technology's broad market applicability and relevance are clearly paying off.&amp;nbsp;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Delayed adoption of DRPS plus other ASM solutions like CAASM and EASM can likely be attributed to market confusion on the distinction between such solutions. We'll erase some of that confusion in the next section.&amp;nbsp;&lt;/p&gt;

&lt;h2 id="six"&gt;What’s the difference between CAASM, EASM and DRPS?&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;CAASM, EASM and DRPS are all components of ASM. Additionally, they all focus on security asset management and issue prioritization. These similarities have caused confusion in the market between these different solutions.&lt;/p&gt;

&lt;p&gt;The following table highlights the differences between CAASM, EASM and DRPS to help you distinguish between the different solutions:&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;table 10px="" border="1" cellpadding="1" cellspacing="1"&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td&gt;&lt;strong&gt;Feature / Capability&lt;/strong&gt;&lt;/td&gt;
			&lt;td&gt;&lt;strong&gt;CAASM&lt;/strong&gt;&lt;/td&gt;
			&lt;td&gt;&lt;strong&gt;EASM&lt;/strong&gt;&lt;/td&gt;
			&lt;td&gt;&lt;strong&gt;DRPS&lt;/strong&gt;&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;&lt;strong&gt;Focus area&lt;/strong&gt;&lt;/td&gt;
			&lt;td&gt;Assets and vulnerabilties&amp;nbsp;&lt;/td&gt;
			&lt;td&gt;External assets&lt;/td&gt;
			&lt;td&gt;Digital risk&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;
			&lt;p&gt;&lt;strong&gt;Applicable assets&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td&gt;
			&lt;ul&gt;
				&lt;li&gt;Endpoints&lt;/li&gt;
				&lt;li&gt;Servers&lt;/li&gt;
				&lt;li&gt;Devices&lt;/li&gt;
				&lt;li&gt;Applications&lt;/li&gt;
			&lt;/ul&gt;
			&lt;/td&gt;
			&lt;td&gt;
			&lt;ul&gt;
				&lt;li&gt;Web applications&lt;/li&gt;
				&lt;li&gt;IPs&lt;/li&gt;
				&lt;li&gt;Domain names&lt;/li&gt;
				&lt;li&gt;SSL certificates&lt;/li&gt;
				&lt;li&gt;Cloud services&lt;/li&gt;
			&lt;/ul&gt;
			&lt;/td&gt;
			&lt;td&gt;
			&lt;ul&gt;
				&lt;li&gt;IP addresses&lt;/li&gt;
				&lt;li&gt;Domains&lt;/li&gt;
				&lt;li&gt;Brand-related assets&lt;/li&gt;
			&lt;/ul&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;&lt;strong&gt;Composition&lt;/strong&gt;&lt;/td&gt;
			&lt;td&gt;
			&lt;ul&gt;
				&lt;li&gt;Technology&lt;/li&gt;
			&lt;/ul&gt;
			&lt;/td&gt;
			&lt;td&gt;
			&lt;ul&gt;
				&lt;li&gt;Technology&lt;/li&gt;
				&lt;li&gt;Services&lt;/li&gt;
				&lt;li&gt;Processes&lt;/li&gt;
			&lt;/ul&gt;
			&lt;/td&gt;
			&lt;td&gt;
			&lt;ul&gt;
				&lt;li&gt;Technology&lt;/li&gt;
				&lt;li&gt;Services&lt;/li&gt;
			&lt;/ul&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;&lt;strong&gt;Capabilities&lt;/strong&gt;&lt;/td&gt;
			&lt;td&gt;
			&lt;ul&gt;
				&lt;li&gt;Collect, aggregate, normalize, deduplicate and present data&lt;/li&gt;
				&lt;li&gt;Query against collected data&lt;/li&gt;
				&lt;li&gt;Identify security vulnerabilities&lt;/li&gt;
				&lt;li&gt;Spot gaps in security controls&lt;/li&gt;
				&lt;li&gt;Remediate issues&lt;/li&gt;
			&lt;/ul&gt;
			&lt;/td&gt;
			&lt;td&gt;
			&lt;ul&gt;
				&lt;li&gt;Discover assets&lt;/li&gt;
				&lt;li&gt;Employ active external scanning&amp;nbsp;of cloud, IT, IoT and OT environments&lt;/li&gt;
				&lt;li&gt;Analyze assets&lt;/li&gt;
				&lt;li&gt;Prioritize assets&lt;/li&gt;
				&lt;li&gt;Leverage remediation workflow&lt;/li&gt;
				&lt;li&gt;Integrate with third-party ticketing systems, SOAR solutions and other tools&lt;/li&gt;
			&lt;/ul&gt;
			&lt;/td&gt;
			&lt;td&gt;
			&lt;ul&gt;
				&lt;li&gt;Detect and monitor for threats outside the enterprise perimeter&lt;/li&gt;
				&lt;li&gt;Gain actionable intelligence on threat actors&lt;/li&gt;
				&lt;li&gt;Mitigate active threats&amp;nbsp;&lt;/li&gt;
				&lt;li&gt;Carry out activities required to foil future threats and protect digital assets&lt;/li&gt;
			&lt;/ul&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;&lt;strong&gt;Data sources&lt;/strong&gt;&lt;/td&gt;
			&lt;td&gt;
			&lt;p&gt;Passive data collection via API integrations with existing internal tools:&lt;/p&gt;

			&lt;ul&gt;
				&lt;li&gt;Asset discovery&lt;/li&gt;
				&lt;li&gt;ITAM&lt;/li&gt;
				&lt;li&gt;Endpoint security&lt;/li&gt;
				&lt;li&gt;Vulnerability management&lt;/li&gt;
				&lt;li&gt;Patch management&lt;/li&gt;
				&lt;li&gt;Ticketing systems&lt;/li&gt;
			&lt;/ul&gt;

			&lt;p&gt;&lt;/p&gt;
			CAASM tools commonly also collect data from DRPS and EASM tools.&lt;/td&gt;
			&lt;td&gt;
			&lt;ul&gt;
				&lt;li&gt;Active Internet-wide scans performed by EASM&lt;/li&gt;
				&lt;li&gt;Passive DNS&lt;/li&gt;
				&lt;li&gt;WHOIS&lt;/li&gt;
			&lt;/ul&gt;
			&lt;/td&gt;
			&lt;td&gt;
			&lt;p&gt;Monitoring of:&lt;/p&gt;

			&lt;ul&gt;
				&lt;li&gt;Open web&lt;/li&gt;
				&lt;li&gt;Deep web&lt;/li&gt;
				&lt;li&gt;Dark web&lt;/li&gt;
				&lt;li&gt;Social media&lt;/li&gt;
				&lt;li&gt;App marketplaces&lt;/li&gt;
			&lt;/ul&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;
			&lt;p&gt;&lt;strong&gt;Sample vendors&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td&gt;
			&lt;ul&gt;
				&lt;li&gt;Axonius&lt;/li&gt;
				&lt;li&gt;Balbix&lt;/li&gt;
				&lt;li&gt;JupiterOne&lt;/li&gt;
				&lt;li&gt;Lansweeper&lt;/li&gt;
				&lt;li&gt;Lucidum&lt;/li&gt;
				&lt;li&gt;Noetic Cyber&lt;/li&gt;
				&lt;li&gt;OctoXLabs&lt;/li&gt;
				&lt;li&gt;Panaseer&lt;/li&gt;
				&lt;li&gt;Qualys&lt;/li&gt;
				&lt;li&gt;Resmo&lt;/li&gt;
				&lt;li&gt;runZero&lt;/li&gt;
				&lt;li&gt;Scrut Automation&lt;/li&gt;
				&lt;li&gt;Sevco&lt;/li&gt;
				&lt;li&gt;ThreatAware&lt;/li&gt;
			&lt;/ul&gt;
			&lt;/td&gt;
			&lt;td&gt;
			&lt;ul&gt;
				&lt;li&gt;C2SEC&lt;/li&gt;
				&lt;li&gt;Censys&lt;/li&gt;
				&lt;li&gt;Cyberpion&lt;/li&gt;
				&lt;li&gt;CyCognito&lt;/li&gt;
				&lt;li&gt;FireCompass&lt;/li&gt;
				&lt;li&gt;Palo Alto Networks (Cortex Xpanse)&lt;/li&gt;
				&lt;li&gt;Pentera&lt;/li&gt;
				&lt;li&gt;Randori&lt;/li&gt;
				&lt;li&gt;Reposify&lt;/li&gt;
				&lt;li&gt;RiskIQ (a Microsoft company)&lt;/li&gt;
			&lt;/ul&gt;
			&lt;/td&gt;
			&lt;td&gt;
			&lt;ul&gt;
				&lt;li&gt;BlueVoyant&lt;/li&gt;
				&lt;li&gt;CloudSEK&lt;/li&gt;
				&lt;li&gt;Digital Shadows&lt;/li&gt;
				&lt;li&gt;Group-IB&lt;/li&gt;
				&lt;li&gt;GroupSense&lt;/li&gt;
				&lt;li&gt;HelpSystems (PhishLabs)&lt;/li&gt;
				&lt;li&gt;IntSights (a Rapid7 company)&lt;/li&gt;
				&lt;li&gt;SafeGuard Cyber&lt;/li&gt;
				&lt;li&gt;ZeroFox&lt;/li&gt;
			&lt;/ul&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;In the future, the distinctions between these solutions may not matter much.&amp;nbsp;Gartner predicts&amp;nbsp;70% of all CAASM, EASM and DRPS functionality will be part of broader, preexisting security platforms by 2026 and not provided by standalone vendors as it is today.&lt;/p&gt;

&lt;h3&gt;Are there any options beyond ASM offerings for identifying digital attack surfaces?&lt;/h3&gt;

&lt;p&gt;Organizations have had a need to identify and manage their digital attack surfaces since before ASM solutions have been available.&amp;nbsp;Instead of&amp;nbsp;ASM solutions, many organizations have leveraged&amp;nbsp;—&amp;nbsp;and continue to leverage&amp;nbsp;—&amp;nbsp;other approaches to do so:&lt;/p&gt;

&lt;table border="1" cellpadding="1" cellspacing="1"&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td&gt;&lt;strong&gt;Approach used in place of ASM solution&lt;/strong&gt;&lt;/td&gt;
			&lt;td&gt;&lt;strong&gt;Description&lt;/strong&gt;&lt;/td&gt;
			&lt;td&gt;&lt;strong&gt;Pro&lt;/strong&gt;&lt;/td&gt;
			&lt;td&gt;&lt;strong&gt;Con&lt;/strong&gt;&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;&lt;strong&gt;Asset discovery tools&lt;/strong&gt;&lt;/td&gt;
			&lt;td&gt;Find and inventory hardware and software assets connecting to your network.&amp;nbsp;&lt;/td&gt;
			&lt;td&gt;Already deployed at most organizations.&amp;nbsp;Better than spreadsheets.&lt;/td&gt;
			&lt;td&gt;
			&lt;p&gt;Often has blind spots such as shadow IT, third-party systems and line-of-business applications.&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;&lt;strong&gt;&lt;a href="https://www.gartner.com/reviews/market/breach-and-attack-simulation-bas-tools" rel="noopener" target="_blank"&gt;Breach and attack simulation (BAS)&lt;/a&gt;&lt;/strong&gt;&lt;/td&gt;
			&lt;td&gt;Automatically test threat vectors to gain a deeper understanding of security posture vulnerabilities and validate security controls.&lt;/td&gt;
			&lt;td&gt;Generates reports on security gaps and prioritizes remediation based on risk.&lt;/td&gt;
			&lt;td&gt;&lt;a href="https://www.gartner.com/document/4018063?ref=solrAll&amp;amp;refval=364074293" rel="noopener" target="_blank"&gt;Only focuses&lt;/a&gt;&amp;nbsp;on known attacks.&amp;nbsp;Doesn't&amp;nbsp;provide remediation.&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;&lt;strong&gt;&lt;a href="https://cloudsecurityalliance.org/blog/2022/03/23/the-debate-should-you-build-or-buy-caasm/" rel="noopener" target="_blank"&gt;Cloud security posture management (CSPM)&lt;/a&gt;&lt;/strong&gt;&lt;/td&gt;
			&lt;td&gt;
			&lt;p&gt;Understand changes in cloud configurations.&lt;/p&gt;
			&lt;/td&gt;
			&lt;td&gt;Ability to understand cloud configuration changes.&lt;/td&gt;
			&lt;td&gt;
			&lt;p&gt;Doesn't&amp;nbsp;reveal when configurations drift out of compliance or potential impact of emerging threats.&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;&lt;strong&gt;Configuration management database (CMDB)&lt;/strong&gt;&lt;/td&gt;
			&lt;td&gt;Track changes made to systems.&lt;/td&gt;
			&lt;td&gt;Already deployed at most organizations. Know when configuration changes are made.&lt;/td&gt;
			&lt;td&gt;Doesn't&amp;nbsp;reveal when configurations drift out of compliance or potential impact of emerging threats.&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;&lt;strong&gt;Homegrown approach&lt;/strong&gt;&lt;/td&gt;
			&lt;td&gt;Combine spreadsheets, scripts and manual processes to manage attack surface.&lt;/td&gt;
			&lt;td&gt;Inexpensive or free from a pure cost perspective (overlooking analyst hours).&lt;/td&gt;
			&lt;td&gt;
			&lt;p&gt;Time-consuming and error-prone. Not scalable or real-time.&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;&lt;strong&gt;IT asset management (ITAM)&lt;/strong&gt;&lt;/td&gt;
			&lt;td&gt;Track and monitor assets through their full lifecycle.&lt;/td&gt;
			&lt;td&gt;Already deployed at most organizations. Better than spreadsheets.&lt;/td&gt;
			&lt;td&gt;&lt;a href="https://www.randori.com/reports/the-state-of-attack-surface-management-2022/" rel="noopener" target="_blank"&gt;Only covers&lt;/a&gt;&amp;nbsp;known and managed assets while overlooking unknown or unmanaged facets of attack surface.&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;&lt;strong&gt;Penetration testing (e.g., automated penetration testing tools and penetration testing as a service)&amp;nbsp;&lt;/strong&gt;&lt;/td&gt;
			&lt;td&gt;Identify vulnerabilities within your network and applications by simulating a cyberattack.&lt;/td&gt;
			&lt;td&gt;&lt;a href="https://www.synopsys.com/glossary/what-is-penetration-testing.html#A" rel="noopener" target="_blank"&gt;Provides examples&lt;/a&gt;&amp;nbsp;of security posture and associated budget priorities.&lt;/td&gt;
			&lt;td&gt;&lt;a href="https://www.varonis.com/blog/cyber-kill-chain" rel="noopener" target="_blank"&gt;Only focuses&lt;/a&gt;&amp;nbsp;on the first phase of the cyber kill chain: reconnaissance. Also, results are typically point-in-time and only as good as the penetration testers carrying out the simulation.&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;&lt;strong&gt;&lt;a href="https://www.varonis.com/blog/red-teaming" rel="noopener" target="_blank"&gt;Red teaming&lt;/a&gt;&lt;/strong&gt;&lt;/td&gt;
			&lt;td&gt;
			&lt;p&gt;Provides a comprehensive picture of an organization’s cybersecurity posture by staging a cyberattack simulation against networks, applications, physical safeguards and employees.&lt;/p&gt;
			&lt;/td&gt;
			&lt;td&gt;Goes beyond penetration testing by focusing on other phases of the cyber kill chain. Also goes beyond digital attack surface and touches on physical and human attack surfaces.&lt;/td&gt;
			&lt;td&gt;Results are typically point-in-time and only as good as the penetration testers carrying out the simulation.&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;&lt;strong&gt;Threat intelligence&lt;/strong&gt;&lt;/td&gt;
			&lt;td&gt;Access information on threats and other cybersecurity issues.&lt;/td&gt;
			&lt;td&gt;Arms security experts with intelligence on threats and vulnerabilities.&amp;nbsp;&lt;/td&gt;
			&lt;td&gt;&lt;a href="https://www.gartner.com/document/4007309" rel="noopener" target="_blank"&gt;Geared toward organizations&lt;/a&gt;&amp;nbsp;with highly mature security operations consisting of skilled personnel and extensive resources.&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;&lt;strong&gt;Vulnerability management tools (e.g., scanners)&lt;/strong&gt;&lt;/td&gt;
			&lt;td&gt;Identify and manage vulnerabilities within your infrastructure and applications.&lt;/td&gt;
			&lt;td&gt;Already deployed at most organizations.&amp;nbsp;&lt;/td&gt;
			&lt;td&gt;No visibility into unknown assets. Overwhelming amounts of data.&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;While these technologies, services and other approaches&amp;nbsp;don't&amp;nbsp;offer all the capabilities and benefits that purpose-built CAASM, EASM and DRPS solutions deliver, most still have their place in an organization’s IT and security practices. In fact, CAASM tools&amp;nbsp;can't&amp;nbsp;function without data from asset discovery, ITAM, vulnerability management and/or patch management tools.&lt;/p&gt;

&lt;p&gt;Similarly,&amp;nbsp;according to Gartner, &lt;a href="https://www.gartner.com/document/4021245" rel="noopener" target="_blank"&gt;EASM complements&lt;/a&gt;&amp;nbsp;a few of&amp;nbsp;the technologies and services listed above. These include threat intelligence and various types of security testing, including breach and attack simulation, penetration testing as a service&amp;nbsp;and automated penetration testing and red teaming tools.&lt;/p&gt;

&lt;h2 id="seven"&gt;How do I identify my organization’s physical attack surface?&lt;/h2&gt;

&lt;p&gt;The first major component of an organization’s physical attack surface is what may be referred to as its&amp;nbsp;&lt;a href="https://www.ivanti.com/glossary/attack-surface"&gt;endpoint attack surface&lt;/a&gt;&amp;nbsp;as it’s composed primarily of all the endpoints that connect to the organization’s network: desktop computers, laptops, mobile devices and IoT devices.&lt;/p&gt;

&lt;p&gt;Fortunately, this component of the digital attack surface can be identified via any CAASM tool used to identify the same elements of the digital attack surface, eliminating the need to purchase another new technology. Asset discovery and ITAM tools are other, if less capable, options.&lt;/p&gt;

&lt;p&gt;The second major component of an&amp;nbsp;organization's&amp;nbsp;physical attack surface is its offices,&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/cloud-security-indiana-bob-s-server-closet-versus-data-centers-security-insights-podcast-episode-28"&gt;data centers&lt;/a&gt;&amp;nbsp;and other facilities. Again, fortunately, techniques already used in the identification of the digital attack surface overlap with those that can be used to identify the physical attack surface. In this case,&amp;nbsp;that'd&amp;nbsp;be the&amp;nbsp;&lt;a href="https://www.cisco.com/c/en/us/products/security/what-is-pen-testing.html#~types-of-pen-testing" rel="noopener" target="_blank"&gt;physical penetration testing&lt;/a&gt; component of red teaming.&amp;nbsp;&lt;/p&gt;

&lt;h2 id="eight"&gt;How do I identify my organization’s human attack surface?&lt;/h2&gt;

&lt;p&gt;Identifying your human attack surface begins by looking at your organizational chart. Anyone associated with your organization that possesses the ability to access your organization’s sensitive information&amp;nbsp;—&amp;nbsp;or to prevent others from accessing that information&amp;nbsp;—&amp;nbsp;can contribute to your human attack surface.&lt;/p&gt;

&lt;p&gt;That includes not just full-time employees but part-time employees, board members, contractors, partners, vendors, suppliers, temps and others as well.&lt;/p&gt;

&lt;p&gt;On top of that, it includes both the people currently in those roles and anyone&amp;nbsp;that's held&amp;nbsp;those roles in the past. &lt;a href="/en-gb/resources/v/doc/ivi/2732/7b4205775465"&gt;Press Reset: A 2023 Cybersecurity Status Report&lt;/a&gt;&amp;nbsp;shows nearly half of security professionals believe or know the login credentials for some former employees and contractors are still active, allowing those individuals access to company systems and data.&lt;/p&gt;

&lt;p&gt;The tricky part is that it’s not humans themselves but their actions&amp;nbsp;—&amp;nbsp;or inactions&amp;nbsp;—&amp;nbsp;that make up a human attack surface. Those actions and inactions are hard to spot as they often happen in the moment and out of sight of others, especially with more and more people working remotely.&lt;/p&gt;

&lt;p&gt;Red teaming, a practice used to identify elements of both the digital and physical attack surfaces, can also be used to identify a major component of the human attack surface: employee susceptibility to&amp;nbsp;&lt;a href="https://www.varonis.com/blog/red-teaming" rel="noopener" target="_blank"&gt;social engineering&lt;/a&gt;. Red teamers accomplish this by attempting to manipulate employees into offering up sensitive information such as access credentials via&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/9-types-of-phishing-and-ransomware-attacks-and-how-to-identify-them"&gt;phishing, smishing, vishing&lt;/a&gt;&amp;nbsp;and other tactics.&lt;/p&gt;

&lt;p&gt;Improper assignment of user privileges is another major contributor to human attack surfaces. Reviewing the systems and data the people that contribute to your human attack surface&amp;nbsp;&lt;a href="https://elevatesecurity.com/blog-what-is-human-attack-surface-management/" rel="noopener" target="_blank"&gt;have access to&lt;/a&gt;, plus the levels of access they possess, is another way to identify parts of that surface.&lt;/p&gt;

&lt;p&gt;Identifying most other elements of human attack surfaces requires employees to be vigilant for issues and to hold others accountable. For example, say one employee sees that another has written their password on a post-it note and stuck it to their&amp;nbsp;monitor&amp;nbsp;or that an HVAC vendor propped the back door to an office building open.&lt;/p&gt;

&lt;p&gt;That employee should politely inform the others they are in violation of security best practices&amp;nbsp;—&amp;nbsp;and likely company policy as well — and ask them to correct their actions. When necessary, they should also involve the organization’s security team.&lt;/p&gt;

&lt;h2 id="nine"&gt;You’ve identified your organization’s attack surface … now what?&lt;/h2&gt;

&lt;p&gt;With the information in this post, you should be well on your way to identifying your organization’s digital, physical and human attack surfaces. Once you achieve that visibility, it’s time to take the next step: minimizing your attack surface.&lt;/p&gt;

&lt;p&gt;Read&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/the-8-best-practices-for-reducing-your-organization-s-attack-surface"&gt;The 8 Best Practices for Reducing Your Organization’s Attack Surface&lt;/a&gt; to uncover the technologies and tactics your organization can employ to shrink its attack surface.&lt;/p&gt;</description><pubDate>Thu, 05 Oct 2023 14:59:23 Z</pubDate></item></channel></rss>