SlideShare a Scribd company logo
1 of 8
What is external
attack surface
management
&
Why is it important?
An attack surface includes all the open or insecure digital getaways that can be used
by cyber attackers to gain access to a company’s assets. Today all digital assets are
connected so there are numerous entry points available to the attackers. Thus ASM
EXTERNAL ATTACK
SURFACE
Attack surface management has a
distinctive approach i.e. It looks at
asset management through the
attacker's perspective. The IT
infrastructure of a company is
discovered, classified, and monitored
continuously with the help of ASM.
Apart from the direct assets of the
company, ASM also takes into its
purview the assets that are owned by
third parties like cloud providers,
contractors.
EXTERNAL ATTACK
SURFACE
MANAGEMENT
An attack surface includes the
following
• Assets
Secure or insecure
known or unknown
Active or inactive
Managed by vendors
• Shadow IT
• Hardware
• Managed and unmanaged devices
• Software
• IoT devices
• SaaS
• Cloud assets and services
Attack surface monitoring reduces risks that can
arise from some factors mentioned below:
• Software that is outdated or vulnerable
• Omissions or mistakes by employees or third
parties like data leaks
• Unknown OSS or open-source software
• Infringement of intellectual property
• Large scale or targeted attacks on an industry
We also have to understand that attack surfaces constantly keep changing
especially since the digital assets are distributed across the cloud.
With the pandemic hitting the normal working of organizations and work from
home increasing among employees, the assets are more vulnerable and there are
more entry points than before. The attackers always plan a step ahead so the
external attack surface management needs to be evaluated and protected on a
steady basis, this can be done only by ASM.
Therefore as the attack surfaces
increase with the development of IoT,
faster networks, and hybrid cloud
computing, there is a prominent need
for a proactive approach that includes
ASM
What is external attack surface management and why is it important

More Related Content

Similar to What is external attack surface management and why is it important

SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
Norm Barber
 

Similar to What is external attack surface management and why is it important (20)

Daniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity storyDaniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity story
 
M1_Introduction_IPS.pptx
M1_Introduction_IPS.pptxM1_Introduction_IPS.pptx
M1_Introduction_IPS.pptx
 
Be the Hunter
Be the Hunter Be the Hunter
Be the Hunter
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 
Week-09-10-11-12 Fundamentals of Cybersecurity.pptx
Week-09-10-11-12 Fundamentals of Cybersecurity.pptxWeek-09-10-11-12 Fundamentals of Cybersecurity.pptx
Week-09-10-11-12 Fundamentals of Cybersecurity.pptx
 
The future of cyber security
The future of cyber securityThe future of cyber security
The future of cyber security
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
 
Unit 1.pptx
Unit 1.pptxUnit 1.pptx
Unit 1.pptx
 
Data protection and security
Data protection and securityData protection and security
Data protection and security
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdf
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
 
information security (Audit mechanism, intrusion detection, password manageme...
information security (Audit mechanism, intrusion detection, password manageme...information security (Audit mechanism, intrusion detection, password manageme...
information security (Audit mechanism, intrusion detection, password manageme...
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
SMB Network Security Checklist
 SMB Network Security Checklist SMB Network Security Checklist
SMB Network Security Checklist
 
“Verify and never trust”: The Zero Trust Model of information security
“Verify and never trust”: The Zero Trust Model of information security“Verify and never trust”: The Zero Trust Model of information security
“Verify and never trust”: The Zero Trust Model of information security
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)
 
Security and Control.ppt
Security and Control.pptSecurity and Control.ppt
Security and Control.ppt
 
Managed Security Operations Centre Alternative - Managed Security Service
Managed Security Operations Centre Alternative - Managed Security Service Managed Security Operations Centre Alternative - Managed Security Service
Managed Security Operations Centre Alternative - Managed Security Service
 

More from Hasna Zameer

More from Hasna Zameer (20)

Emerging Industries in the UAE A Guide to Lucrative Ventures.pptx
Emerging Industries in the UAE A Guide to Lucrative Ventures.pptxEmerging Industries in the UAE A Guide to Lucrative Ventures.pptx
Emerging Industries in the UAE A Guide to Lucrative Ventures.pptx
 
Chilling Out the Smart Way_ The Power of District Cooling Energy Systems.pptx
Chilling Out the Smart Way_ The Power of District Cooling Energy Systems.pptxChilling Out the Smart Way_ The Power of District Cooling Energy Systems.pptx
Chilling Out the Smart Way_ The Power of District Cooling Energy Systems.pptx
 
How to Secure an HR Job in Dubai.pptx
How to Secure an HR Job in Dubai.pptxHow to Secure an HR Job in Dubai.pptx
How to Secure an HR Job in Dubai.pptx
 
Benefits of District Cooling Networks_ Energy Efficiency Solutions in Dubai.pptx
Benefits of District Cooling Networks_ Energy Efficiency Solutions in Dubai.pptxBenefits of District Cooling Networks_ Energy Efficiency Solutions in Dubai.pptx
Benefits of District Cooling Networks_ Energy Efficiency Solutions in Dubai.pptx
 
The Future of Higher Education in the UAE_ Trends to Watch.pptx
The Future of Higher Education in the UAE_ Trends to Watch.pptxThe Future of Higher Education in the UAE_ Trends to Watch.pptx
The Future of Higher Education in the UAE_ Trends to Watch.pptx
 
Comparing MDF and Solid Wood Furniture_ Which Type is Superior_.pptx
Comparing MDF and Solid Wood Furniture_ Which Type is Superior_.pptxComparing MDF and Solid Wood Furniture_ Which Type is Superior_.pptx
Comparing MDF and Solid Wood Furniture_ Which Type is Superior_.pptx
 
Top Scholarships for UAE Nationals_ Opportunities and Eligibility.pptx
Top Scholarships for UAE Nationals_ Opportunities and Eligibility.pptxTop Scholarships for UAE Nationals_ Opportunities and Eligibility.pptx
Top Scholarships for UAE Nationals_ Opportunities and Eligibility.pptx
 
Whitewood vs. Pine_ Which is Better_.pptx
Whitewood vs. Pine_ Which is Better_.pptxWhitewood vs. Pine_ Which is Better_.pptx
Whitewood vs. Pine_ Which is Better_.pptx
 
A World of Opportunities_ UAE Scholarships for Ambitious International Schola...
A World of Opportunities_ UAE Scholarships for Ambitious International Schola...A World of Opportunities_ UAE Scholarships for Ambitious International Schola...
A World of Opportunities_ UAE Scholarships for Ambitious International Schola...
 
How Scholarships Can Make Higher Education Affordable and More.pptx
How Scholarships Can Make Higher Education Affordable and More.pptxHow Scholarships Can Make Higher Education Affordable and More.pptx
How Scholarships Can Make Higher Education Affordable and More.pptx
 
Navigating Business Success_ How Contract Recruiting Reshapes and Enhances Yo...
Navigating Business Success_ How Contract Recruiting Reshapes and Enhances Yo...Navigating Business Success_ How Contract Recruiting Reshapes and Enhances Yo...
Navigating Business Success_ How Contract Recruiting Reshapes and Enhances Yo...
 
Navigating Higher Education in the UAE_ Programs, Opportunities, and Challeng...
Navigating Higher Education in the UAE_ Programs, Opportunities, and Challeng...Navigating Higher Education in the UAE_ Programs, Opportunities, and Challeng...
Navigating Higher Education in the UAE_ Programs, Opportunities, and Challeng...
 
TYPES OF AUTOIMMUNE SKIN DISEASES_.pptx
TYPES OF AUTOIMMUNE SKIN DISEASES_.pptxTYPES OF AUTOIMMUNE SKIN DISEASES_.pptx
TYPES OF AUTOIMMUNE SKIN DISEASES_.pptx
 
Why AURAK in UAE Stands Out Among Universities in the UAE (1).pptx
Why AURAK in UAE Stands Out Among Universities in the UAE (1).pptxWhy AURAK in UAE Stands Out Among Universities in the UAE (1).pptx
Why AURAK in UAE Stands Out Among Universities in the UAE (1).pptx
 
What Makes AURAK Dubai Your First Choice for Your Higher Education Journey_ (...
What Makes AURAK Dubai Your First Choice for Your Higher Education Journey_ (...What Makes AURAK Dubai Your First Choice for Your Higher Education Journey_ (...
What Makes AURAK Dubai Your First Choice for Your Higher Education Journey_ (...
 
Why Choose AURAK University for Higher Studies_ Advantages and Opportunities....
Why Choose AURAK University for Higher Studies_ Advantages and Opportunities....Why Choose AURAK University for Higher Studies_ Advantages and Opportunities....
Why Choose AURAK University for Higher Studies_ Advantages and Opportunities....
 
Unlocking the Potential of District Cooling in the Middle East.pptx
Unlocking the Potential of District Cooling in the Middle East.pptxUnlocking the Potential of District Cooling in the Middle East.pptx
Unlocking the Potential of District Cooling in the Middle East.pptx
 
Galvanized Steel_ Understanding the Types, Uses, and Benefits.pptx
Galvanized Steel_ Understanding the Types, Uses, and Benefits.pptxGalvanized Steel_ Understanding the Types, Uses, and Benefits.pptx
Galvanized Steel_ Understanding the Types, Uses, and Benefits.pptx
 
Understanding Cancer Risks Using Genetic Lab tests.pptx
Understanding Cancer Risks Using Genetic Lab tests.pptxUnderstanding Cancer Risks Using Genetic Lab tests.pptx
Understanding Cancer Risks Using Genetic Lab tests.pptx
 
Air-cooled chiller Vs Water-cooled chiller..pdf
Air-cooled chiller Vs Water-cooled chiller..pdfAir-cooled chiller Vs Water-cooled chiller..pdf
Air-cooled chiller Vs Water-cooled chiller..pdf
 

Recently uploaded

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 

What is external attack surface management and why is it important

  • 1. What is external attack surface management & Why is it important?
  • 2. An attack surface includes all the open or insecure digital getaways that can be used by cyber attackers to gain access to a company’s assets. Today all digital assets are connected so there are numerous entry points available to the attackers. Thus ASM EXTERNAL ATTACK SURFACE
  • 3. Attack surface management has a distinctive approach i.e. It looks at asset management through the attacker's perspective. The IT infrastructure of a company is discovered, classified, and monitored continuously with the help of ASM. Apart from the direct assets of the company, ASM also takes into its purview the assets that are owned by third parties like cloud providers, contractors. EXTERNAL ATTACK SURFACE MANAGEMENT
  • 4. An attack surface includes the following • Assets Secure or insecure known or unknown Active or inactive Managed by vendors • Shadow IT • Hardware • Managed and unmanaged devices • Software • IoT devices • SaaS • Cloud assets and services
  • 5. Attack surface monitoring reduces risks that can arise from some factors mentioned below: • Software that is outdated or vulnerable • Omissions or mistakes by employees or third parties like data leaks • Unknown OSS or open-source software • Infringement of intellectual property • Large scale or targeted attacks on an industry
  • 6. We also have to understand that attack surfaces constantly keep changing especially since the digital assets are distributed across the cloud. With the pandemic hitting the normal working of organizations and work from home increasing among employees, the assets are more vulnerable and there are more entry points than before. The attackers always plan a step ahead so the external attack surface management needs to be evaluated and protected on a steady basis, this can be done only by ASM.
  • 7. Therefore as the attack surfaces increase with the development of IoT, faster networks, and hybrid cloud computing, there is a prominent need for a proactive approach that includes ASM