ASM tools and strategies for threat management

Choose Your Armor

Conclusions

Keeping an eye on all areas of attack. The Nibelungs found this out to their own downfall. You can take some warnings from the Song of the Nibelungs that still apply today. The most dangerous attackers are people like Hagen von Tronje, who proceed with patience and thorough planning; today, this approach would be referred to as APT. The attacker is even more dangerous if they have detailed knowledge of attack surfaces – not least through carelessly disclosed internal information. Finally, the murder of Siegfried shows that exploiting even a small security vulnerability can have fatal consequences if the attacker exhibits determination and purpose.

Software solutions and SaaS offerings for attack surface management can support the defense team in their task. According to experts, ASM tools are particularly effective in large, confusing, and constantly changing IT landscapes and are helpful when you can no longer see the trees for the leaves, because they make it easier for security teams to gain an overview and set priorities promptly to close the most critical gaps as quickly as possible.

ASM can also play a role in industrial environments – at least if the industrial network is open to the Internet in the scope of Industry 4.0 or smart factory initiatives. Although cyber risk management is required by law (e.g., in NIS2), ASM is not. However, any company that becomes aware of attack surfaces as part of its risk management must respond. After all, you do not want potential attackers to find an attractively large target.

Infos

  1. "Attack Surface Management" by O. Celik and J. Tolbert, KuppingerCole Analysts AG, September 2023, https://www.kuppingercole.com/research/lc81218/attack-surface-management
  2. "Forrester's New Research On Attack Surface Management" by Jess Burn, Forrester Research Inc., January 2022, https://www.forrester.com/blogs/announcing-forresters-new-research-on-attack-surface-management-asm/
  3. External attack surface management, Gartner Peer Insights: https://www.gartner.com/reviews/market/external-attack-surface-management
  4. Stefan Strobel: https://cirosec.de/en/news/author/stefanstrobel/
  5. Google threat intelligence: https://cloud.google.com/security/products/threat-intelligence

Buy this article as PDF

Express-Checkout as PDF
Price $2.95
(incl. VAT)

Buy ADMIN Magazine

SINGLE ISSUES
 
SUBSCRIPTIONS
 
TABLET & SMARTPHONE APPS
Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

comments powered by Disqus
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=