Long gone are the days when a monthly vulnerability scan could deliver peace of mind. The recent attack on Change Healthcare, which disrupted prescription processing services for over 67,000 pharmacies and 129 million individuals, was linked to the exploitation of a new vulnerability merely days after the vendor published a patch. Software exploits served as the initial intrusion point for 32% of attacks, according to Mandiant, and certified software vulnerabilities grew another 15% in 2023, with over 29,000 CVEs. In this article, we’ll discuss the importance of continuous attack surface monitoring (including finding the unknown, shadow IT attack surfaces), how to protect yourself from software vulnerabilities, and how continuous attack surface monitoring tools can reduce your risk of a breach.
What Is Your Organization’s Attack Surface?
Your attack surface includes anything an attacker can use to access your environment, data, or operations. “There is no perimeter anymore,” says Tom Pohl, LMG’s penetration testing team lead. With the prevalence of SaaS and public clouds, our pentest team often finds initial entry points resulting from connected supplier software, exposed legacy systems, cloud misconfigurations, and more. In addition, systems have become increasingly interconnected, and we are seeing a rise in “shadow” attack surfaces—where departments add a new cloud provider or partner integration without talking to IT. This is where the concept of continuous attack surface monitoring comes into play. The right continuous attack surface monitoring solution can automate rapid asset detection, in addition to helping you discover new vulnerabilities.
How to Identify Your Entire Attack Surface
Identifying your attack surface is an ongoing process that often evolves over time. If you’re working with a very small budget and looking for a quick, free view, you can try Shodan—a search engine that can help you discover exposed attack surfaces. It can show you hardware, software versions, open services, and vulnerable devices with open ports; it can be a valuable source of open-source intelligence gathering (OSINT) for mapping your systems.
OSINT should also serve as part of a comprehensive attack surface management plan. You can use many free or low-cost OSINT tools to collect information to help identify your attack surface. As you consider defending your system, remember that hackers can also use these publicly available tools to gather information, as well as discover the names of employees and services used by your organization. They can then use this data for customized phishing attacks and password spraying attacks.
For a more full-featured approach, we recommend using a continuous attack surface monitoring tool to monitor your attack surface and manage your software vulnerabilities in an integrated platform. While we use Tenable One internally and recommend it to our clients, there are certainly many options. A continuous attack surface monitoring tool helps you determine your attack surface, monitor it, identify exposure, manage vulnerabilities, inventory assets, and prioritize your remediation efforts.
How Continuous Attack Surface Monitoring Tools Reduce Your Risk from Software Vulnerabilities
Many software vulnerabilities don’t show up on vulnerability scans—especially zero-day weaknesses or newer vulnerabilities that have not yet had time for proper integration into scanning utilities. Attack surface monitoring is key to reducing risk because it enables defenders to identify and then minimize services that are exposed to the Internet.
Continuous attack surface monitoring tools may also include built-in version identification and vulnerability scanning features. This can enable you to identify unpatched systems and confirm when a patch has been applied. It provides comprehensive reporting and will give you a rating for the vulnerabilities to help you track, manage, and prioritize remediation. We recommend that you schedule daily scans and review them to create prioritized remediation plans.
Some continuous attack surface monitoring tools can also provide attack mapping pathways that show what types of services can be accessed and attacked using the vulnerability. This can provide your team with guidance as you assess potentially connected services and create a plan to prioritize and remediate these vulnerabilities.
A Checklist for Implementing an Effective Vulnerability Management Program
Using a continuous attack surface monitoring tool is a great start for creating an effective vulnerability management program, but it is only part of the solution. You also need to:
We hope you found this guide helpful. Please contact us if you have any questions or would like support with implementing a continuous vulnerability monitoring tool, pentesting, policy development, training, and more. Our expert team is ready to help!
Blog post courtesy of LMG Security.