Guide Evaluating Attack Surface Management 39905
Guide Evaluating Attack Surface Management 39905
This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express
written permission.
A SANS Spotlight
Many organizations spend vast amounts of time and money trying to identify, catalogue
and track every asset they have exposed to the internet. With the rise of cloud computing
and the rapid transition to work from home, maintaining a perfect inventory of every
internet-exposed asset has become an impossible challenge. As a result, organizations
are searching for new ways to better manage the risk introduced by these rapid changes.
• The number of connected devices has doubled during the past five years to more
than 25 billion (see Figure 1).2
1
LogicMonitor, “Cloud Vision 2020: The Future of the Cloud,”
www.scribd.com/document/403188911/LogicMonitor-Cloud-2020-The-Future-of-the-Cloud-pdf, p. 3. [Subscription required.]
2
Strategy Analytics, “Global Connected and IoT Device Forecast Update,”
www.strategyanalytics.com/access-services/devices/connected-home/consumer-electronics/reports/report-detail/global-connected-and-iot-device-forecast-update
[Subscription required.]
3
Gartner, “Gartner Survey Reveals 82% of Company Leaders Plan to Allow Employees to Work Remotely Some of the Time,”
www.gartner.com/en/newsroom/press-releases/2020-07-14-gartner-survey-reveals-82-percent-of-company-leaders-plan-to-allow-employees-to-work-remotely-some-of-the-time
4
Strategy Analytics, “Global Connected and IoT Device Forecast Update,”
www.strategyanalytics.com/access-services/devices/connected-home/consumer-electronics/reports/report-detail/global-connected-and-iot-device-forecast-update
[Subscription required.]
• P
roduct requirements—How well do the product features and capabilities meet the
functional technical requirements defined by the organization? For example, what
techniques does the ASM solution use to discover external assets, including cloud
and IPv6 assets?
• Operational requirements—How well will the product align with the operational
needs and requirements of the organization, including ease of deployment,
breadth of coverage, and interoperability with existing security and asset
management infrastructure?
Product Requirements
Your ASM solution must have three key features: automated discovery, continuous
monitoring and risk-based management.
Automated Discovery
The purpose of the ASM solution is to automate the discovery of your assets. There
should be no need to provide IP address ranges or other asset information to get
started. The ASM solution must have an advanced algorithm capable of building a map
of your assets with minimal input and limited false positives. Ideally, just your domain ASM solutions should generate
a risk score for each asset,
name should be sufficient.
combining the ASM provider’s
From there, the ASM solution must: external threat assessment with
user-provided information on
• Discover internet-exposed assets (both IPv4 and IPv6) relative business value, impact
and remediation status.
• Support cloud asset discovery
Each ASM solution is likely to have different techniques to achieve the discovery phase.
In general, however, you should expect them to leverage whois, passive DNS and network
registration data to identify associated network ranges and domains. They should
then scan discovered assets for open ports, analyze service banners, and analyze SSL
certificates to identify assets and the services they are running.
ASM solutions should include some ability to discover cloud assets and include
functionality to limit the noise created by dynamic infrastructure (rotating IPs, dynamic
DNS). Be sure to thoroughly test your ASM solution for this functionality. Further, ASM
solutions should enable organizations to import cloud ranges or asset lists to ensure
monitoring of cloud assets not automatically discovered by the system.
As your assets are analyzed against potential threats, the ASM solution needs to be able
to alert you if a certain threshold is met. An integration with your security operation
center or vulnerability management team is essential. We will address this concept in the
“Operational Requirements” section later in this paper.
The most difficult requirement for any ASM solution is dealing with false positives. It’s
inevitable that some assets will be misclassified or perhaps not even belong to your
company. The ASM solution must have the means to exclude these assets and manage
them at an acceptable level. This problem is particularly difficult for ASM solutions
leveraging keyword matching and other rigid methods of assigning ownership.
Risk-Based Management
Not all assets have the same value to your organization. A great ASM solution will enable
users to prioritize resources based on additional information, such as business impact
and remediation status. With your input, the ASM solution should create and maintain a
risk score for each asset that combines the ASM provider’s external threat assessment
with user-provided information on relative business value, impact and remediation status.
An ASM solution’s external threat assessment should take into account the following criteria:
• Asset criticality
• Known vulnerabilities
The value derived from an ASM solution will significantly increase if the assessment is
performed from the perspective of the attacker. Remember that many attackers operate as
a business and won’t build an exploit simply because a new CVE is announced. With that
in mind, the score should take into account both the likelihood of compromise and the
business impact of the asset.
Comprehensive Automatically discover and monitor assets across Does the solution provide broad asset support? Does the solution
discovery IPv4 and IPv6 as well as data center and cloud provide consistent discovery across asset types? Verify the results
infrastructure. by taking a sample of known IPv4, IPv6 and external cloud IPs and
making sure they were correctly discovered by the platform.
Detailed service Enumerate detailed service information for Does the solution provide detailed enumeration of discovered
discovery discovered assets, including service name and services, including name and version, with the capability to check
version running on a system. For select services, configuration status either directly or through integration?
configuration information also may be available.
Detailed artifact Collect detailed artifacts from monitored assets for Does the solution collect detailed artifacts on each discovered
discovery each scan. asset, such as SSL certificates, screenshots and banners?
Path discovery Show a user how the solution discovered an asset Does the solution provide details into how an asset was
and the artifacts used to assign it to an organization. discovered? This feature is especially important for cloud assets.
Continuous Ongoing discovery Discover new assets in an ongoing manner, outside Does the solution provide ongoing asset discovery? Review
monitoring of initial discovery. the vendor’s methodology for updating the asset database for
frequency of updates and data sources used. Prioritize those
with weekly updates and those that rely on external data sources
(passive DNS, certificates, network registrations) beyond user-
provided data (IP ranges, domains).
Change monitoring User can monitor and track changes, such as Does the solution provide dashboards and alerts to enable
newfound assets and new or impactful changes in change monitoring?
risk, to their attack surface over time.
Alerting Automatically alert users to discoveries or changes Does the solution provide email, API and in-app mechanisms to
on their perimeter. alert on critical changes?
False positives and Automatically reduce the number of false positives Does the solution limit noise and present highly confident
noise reduction and filter out noise generated by routine changes in results? Take a sample of 50 assets and verify that:
dynamic infrastructure.
• T he discovered asset does, in fact, belong to your
organization
Risk-based External Automatically provide an external assessment Does the solution leverage a multifactor methodology for
management assessment of risk beyond those provided by vulnerability external risk assessment, including vulnerabilities, asset
scanners. prevalence, configuration and local indicators of weakness
(expired certs, default pages, test/dev)?
Impact scoring User may input information about business value Does the solution include built-in functionality for users to adjust
as well as remediation and workflow status into the and manage risk based on business value and workflow status?
system to develop a prioritized assessment of risk.
Alerting
Critical to the success of any ASM solution is its ability to monitor and alert on changes. It is
not reasonable to expect users to routinely check the console of a solution to identify new
or meaningful changes to an organization’s attack surface. Successful operation of an ASM
solution must support proactive email-based alerting, including:
• Immediate alerts for critical issues, such as newly discovered exploitable software
• R
egular summary notifications of non-critical changes, such as newly discovered IPs
or changes in configuration
Enterprise Management
ASM solutions should include basic enterprise management capabilities that enable large
teams and organizations to operationalize the solution. Those capabilities should include:
• R
BAC (role-based access control) enabling observer-only roles, such as asset owners,
to view and comment on critical information in the solution
• Rule-based policy management for triage, status and workflow tracking
• SSO (single sign-on) to manage access to the ASM solution website
Email alerting Automatically alerts users to discoveries or changes Does the solution provide email, API and in-app mechanisms to
on their perimeter via email. receive alerts on critical changes?
Enterprise RBAC Supports role-based access control. Does the solution support RBAC control with permissions for
management write and read-only users?
Rule-based Supports rule-based and policy-based Does the solution provide an easy-to-use interface for policy-
management configurations for ongoing management. driven rule development?
SSO Supports single sign-on. Does the solution integrate with your SSO policy?
Interoperability API and Supports third-party integrations and custom Does the solution provide a robust API with documentation?
and integrations integrations development using a provided API.
Validate API by generating an API token and exporting a
list of all IPs.
After the vendor has completed the discovery phase, focus on the following:
• How many assets were found that you didn’t know about?
• What was the rate of false positives? Analyze a sample for best results.
• How accurate was the inventory regarding open services and applications?
Now that you have a better idea of your attack surface, focus your POC on your
operational requirements:
• Evaluate the capabilities of the ASM’s API to interface with your existing systems.
Conclusion
Organizations struggling to maintain visibility of their internet-exposed assets or looking
for help prioritizing and reporting on external risks will find great value in adopting an
ASM solution. Use the selection criteria presented in this guide to help you evaluate and
choose the ASM solution that’s right for you.
Remember, though, that ASM solutions are not a replacement for a robust and effective
asset and vulnerability management program and should be seen as an addition to those
processes, rather than a replacement. No organization will be able to find every asset,
but well-adopted ASM solutions can help security teams prioritize risks based on what is
exposed and enumerable from an adversary’s perspective and identify unknown assets
missed by traditional vulnerability scanning solutions.
Sponsor