Seven Times To Attack Your Attack Surface In 2021 - Netenrich
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
2
Managing cybersecurity is like Attack surface management (ASM) checks
staying in shape. There are endless all of these boxes and could well become
the next keto of cybersecurity—something
things we could do, lots of things we
everyone tries because they keep hearing
should do, and for most of us, a core about it, and many adopt long-term
set of things we end up doing on a because it works as advertised.
routine basis.
This book will explore ideal opportunities
The worldwide focus for businesses to try ASM in 2021 if you haven’t already.
in 2021 will be getting back in shape Try it anytime your team or company:
with massive investments in IT and
cybersecurity. As with fitness, we welcome Launches or promotes cloud- or SaaS-
new shortcuts—better, smarter, faster based services
ways of getting the results we want—and Merges or acquires another company
there’s no shortage of fads, ads, or expert
opinions. Finds or suspects Shadow IT
So, what new techniques and tactics Assesses third-party risk
should make the cut? Security
Prepares for a cyber audit
professionals must choose wisely.
Justifies your security spend
What’s realistic, practical, and doable
on a regular basis? Incurs serious breaches
What solutions and strategies meet You’ll see in detail what ASM brings to the
our needs right now and set us up for table that other weapons in your arsenal
the future? may not and how you can try it risk-free.
But first a quick intro.
Which deliver the greatest bang for the
buck on investments in tools, training,
and our most precious resource of
all—time?3
What is Attack Surface Management?
Think of your digital footprint as suffer mishaps. ASM involves discovering,
a fast-moving, ever-changing assessing, prioritizing, and mitigating cyber
risk—on a continuous basis—across critical
target. The more publicly accessible
areas that lead to most breaches:
infrastructure or external-facing digital
assets you have, the bigger and more Brand exposure from domains, sub-
attractive the target becomes. domains, leaked credentials, and on
cloud storage or public code repos
Some elements in your digital attack Vulnerabilities, with a focus on risk to
surface—your company’s website for your company versus criticality only for
example—need to be right where they are, patch prioritization
with the proper security controls in place.
Others, like old domains, publicly exposed Misconfigurations that are difficult to
code repo, and other by-products of digital find any other way
transformation should not be where they are
and need to be cleaned up post-haste. Risks uncovered during discovery should be
correlated with real-time threat intelligence
Keeping your digital attack surface in for prioritization and metrics established to
good shape takes constant vigilance to let experts track progress.
make sure you find and fix risks before you
Netenrich’s ASI dashboard shows current risks, criticality, trends, and an overall exposure rating
at a glance for easy drill-down exploration.4
Less risk with less effort “But why do I need another
Making it easy to visualize external risk tool?”
exposure and severity in one place increases
Chances are you already conduct pen testing
the odds that the team can act quickly to close
and vulnerability scans on a somewhat regular
out the most serious things fast, and chip
basis, and that’s a great start. You may also
away at the rest as time allows. To this end,
engage providers or dedicate analysts to run
attack surface discovery must be automated,
red, blue, or purple team exercises.
always-on, and near-real-time.
But efforts to mitigate external risk can’t stop
Advanced ASM solutions like Attack Surface
there. ASM offers a critical advantage versus
Intelligence (ASI) from Netenrich focus on
other strategies in that coverage is non-
actionability, with automated threat correlation
stop so nothing slips past you. You cannot
and prioritization, and expert intelligence from
manage dynamic risk by assessing it at one
our Intelligent Security Operations Center
point any more than you could build muscle by
(SOC) to help contextualize and propose
working out once a month.
remediation strategies.
ASM offers a singular combination of
actionable data and continuous coverage that
Integrated threat intelligence needs to become part of the routine, without
delivers rich context to prioritize creating more work and stress for those
involved. ASM also offers additional insights
and resolve risk faster. on risk that likely gets missed during most pen
test engagements.
So, let’s take a quick look at the best times to
get started, times when you save save time
and effort while making security stronger.5
1. Anytime you say the word “cloud”
It’s no secret that migrating apps and services Securing services
from physical systems to the cloud brings
risk. Security faces two major stumbling ASM targets the major hazards of cloud
blocks—loss or lack of visibility, and the migration such as services becoming exposed
dynamic nature of everything cloud. For as hosted cloud infrastructures spin virtual
example, Engineering or DevOps teams may machines (VMs) up and down. This happens
spin up machines in the cloud without thinking as VMs that serve a single purpose at some
through the potential security implications or point are left running when they’re no longer
making IT aware of new cloud instances. needed. Multi-cloud environments add to the
chaos as a large SaaS provider might operate
90 machines in Google Cloud one day, see
that spike to 110 the next day, and drop back
Cyber events like annual sales down to 80 the day after that.
require servers to scale up fast ASM also finds critical risks that may
to dramatically increase capacity. arise simply from services being left
unauthenticated, often due to simple
In the absence of impeccable misconfigurations. In one real-world situation,
digital hygiene among both Netenrich’s ASI discovered a company’s
open source automation server had become
clients and providers, these exposed leaving the Engineering team’s CI/CD
dramatic fluctuations can add pipeline at risk outside the organization.
sizeable risk. With large segments of the population
working remotely, users might move
things to the cloud to make it easy for
others on their team to check them out.
This might mean exposing public cloud
Continuous attack surface monitoring infrastructure without implementing
helps you stay on top of exposed or the proper controls, and without anyone
unauthenticated services and publicly knowing about it. An attacker targeting
exposed storage, even if one or more of your your company could come across these
cloud providers has gaps. ASM helps steadily oversights and start working backwards
improve best practices, and lets you see what to map your infrastructure to see what’s
matters as soon as it changes. unauthenticated, and what they can reach.6 ASI detects publicly accessible unauthenticated services within 24 hours. Without an automated heads-up, finding these misconfigurations as they occur is virtually impossible at worst, and daunting and time-consuming at best. DevOps and CI/CD New software releases might result in code being left exposed in public repositories. Proper attack surface management would flag this within 24 hours and take IT professionals from at- risk to taking action in a few easy clicks. Within ASI, Brand Exposure is summarized with criticality indicated by color. In this example, Code Repository Check is shown in red making this a top priority. Clicking on the summary shows the two critical risks as indicated by the red bar.
7 Selecting the alert with critical severity brings up context, showing that the exposure has existed since November of the previous year. ASI points to the page which has the exposure to review and take action—all in seconds or minutes.
8
Without ASM, the DIY alternative to finding
such risks would be searching on your brand
name in Github and other code repositories “The second you say you’re a
and sifting through the results manually.
SaaS platform, people start
And while the process is tedious for the bad
guys too, if they’re intent on sizing up your asking questions about security.
attack surface, they may very well find such They want to know how we store
exposures before you do.
and transfer data, what types of
Conducting pen tests every few months compliance practices we follow,
doesn’t cut it. IT needs to know the moment
anyone uploads something to a public- how often we do vulnerability
facing repository that inadvertently puts the assessments. I would say security
company at risk.
is the one of the most important
factors in deciding to use our
Customer confidence services.”
According to OpsRamp, a Netenrich partner Viswanatha Penmetsa
and ASI customer, “The second you say Director of SaaS Operations at OpsRamp.
you’re a SaaS provider, customers start
asking about security.” If your company
operates monetized services in the cloud,
You may have a multi-faceted strategy that
you too face the added challenge of making
includes maintaining secure code practices,
customers comfortable with it. developing detailed strategies for hardening
techniques and methodologies. Even so, ASM
If an adversary hacks into your customer
can add great value in dynamically testing
portal, the potential exists for them to
security controls.
access customer data, or leverage web
applications hosted on servers inside As a provider, the goal should be to increase
your cloud infrastructure to compromise security earlier in the migration or DevOps
assets. Intentional misconfigurations lifecycle and throughout the coding process.
might also be employed to infect All releases should be gated by a security
customers as they access the portal with review. Since this doesn’t always happen, ASM
malicious code that can be traced back to offers an easy, always-on safeguard to help
you. Clearly, a loyalty killer. keep you current, and in control.
As you migrate services to the cloud, And when you’re on the other side of the
ASM helps ensure assets and your digital equation—the customer side—using third-
footprint do not unknowingly become party services to handle critical business
exposed without the appropriate security functions such as Human Resources (HR),
controls being put in place. ASI quickly payroll, or benefits, you should ask potential
uncovers risk associated with customer providers about security certifications
portals, servers, network connections, and and best practices before unlocking your
applications exposed in the cloud. employee or customer data.9
2. Mergers and acquisitions (M&As)
More often than not, a bigger The would-be acquired company might
company acquires a smaller one say, and may even believe that they’re
watching things 24X7 but does that mean
with less mature cybersecurity
all things?If you run their domain through a
defenses and best practices. When security rating service and they score low,
IT gets brought in early, like during what can be done about it?
due diligence or before anything
ASM helps assess the target company’s
gets announced, the security
overall security posture and find major
team can assess potential risks gaps in defenses quickly. That’s best-case
of integrating systems and better scenario.
gauge the time and effort needed to
More often than not, IT does not get
do it safely.
brought in early, and when it does,
Finding serious risk won’t generally affect development and network infrastructure
the decision to move forward with the teams get connected before security
acquisition. It can, however, help inform professionals. If IT gets handed a
negotiations around upfront costs and alert mess after an acquisition has been
CIOs and CTOs to unknown or undisclosed publicly announced, automating and
breaches that represent brand risk. operationalizing insight around external
brand risk using ASI speeds the cyber due
diligence.10
ASM helps rank critical exposures to focus Merging security itself
and fast-track initial clean-up campaigns.
Analysts get a running start by simply ASM is one of several important tools
plugging in and validating the security for making sure the acquired company’s
posture of the new entity and rooting out assets and processes don’t introduce risk,
the nasty surprises. or work, into the acquirer’s incumbent
environment.
You need to know what’s out there that can
hurt you, how much it can hurt you, and For example, merging e-mail systems
how—and how fast—you can fix it. Attack and calendaring functions, simple as this
surface discovery offers actionable insight sounds, plays a huge role in determining
with sound indications of where to go next. whether users perceive the integration as
First, you can see what the other company a well-managed process. A lot goes into
might be missing, or that issues have this, but from a hygiene perspective, having
persisted well beyond the normal time to automated ASM can turn up breached
remediate, potentially indicating they may e-mail IDs and show whether specific
have already suffered a breach without usernames and passwords have already
having realized it. been compromised---an easy thing to clean
up before you move on to more complex
Once you get a baseline, efforts to aspects.
integrate disparate security teams,
assuming the acquired company has
one, and infrastructures can unfold more
quickly.11
You might also look at typo-squatted domains, which tend to get overlooked. Attack surface
discovery will show instantly whether domains that look like the acquired company’s public
sites exist, who they’re registered to, and whether the sites are actually active.
If you find someone mimicking
your brand, you might want to
drill down a bit to see what risk
rules got triggered during ASI
discovery. A quick correlation with
threat intelligence drives valuable
context around whether the IP a
domain is resolving to is known
to be associated with malicious
activity and should be tackled
first.12
Content Management
Systems (CMSes)
Misconfigurations relating to content
management systems occur frequently,
and one or both companies may already
have safeguards in place for this. Either
way, attack surface discovery offers a
near-real-time status check showing
when, where, how many, and how critical
exposure relating to CMSes is right now,
within a matter of clicks. Even if e-mail addresses, domains, CMSes
and other assets associated with acquired
ASI’s automated correlation with threat companies go away, IT needs to know the
intelligence shows whether known likelihood that systems have already been
vulnerabilities associated with a particular breached or data compromised. ASM can
system might indicate nefarious activity. help.13
The partner can take on detection, triage,
Or you can skip and response throughout the transition
the whole thing or on a long-term, even permanent basis.
Easily adopted solutions like Netenrich’s
Baselining risk is one early step in merging Intelligent SOC extend visibility, intelligence,
two disparate security practices. Integration expertise, and comprehensive capabilities
also means getting VPNs set up, deploying to the new environment quickly—with
sensors, training one or both teams on new minimal lift required by the parent
technologies that will remain in place in the company’s own team.
hybrid environment, and much, much more.
Ideally, the provider would help manage
If the acquired company’s practice is both threat detection and risk mitigation
not on par with that of the new parent holistically to further streamline the
company and can’t get there anytime soon, process.
outsourcing instead of integrating offers
a viable strategic alternative. Some or Whether you decide to onboard or merge
all of the company’s SOC efforts can be another company’s security infrastructure
transitioned to a managed security service with your own over a period of months, or
(MSSP) or SOC-as-a-Service partner much continue to operate it separately, team leads
faster than you could bring them up to can be assured that the bases stay covered,
code. even as skills and tribal knowledge exit the
playing field.
Exposures,
Threats Opportunities
Intelligent SOC
Resident malware Brand exposure
Ransomware Code exposure
Phishing Vulnerabilities, internal + external
Exfiltration Certificates
Bots Domain risks
User-based Misconfigurations
Saas External infrastructure
Cloud exposure
Third party
A modern Intelligent SOC features managed threat detection and attack surface management
to proactively address security posture. Integrated threat and attack surface intelligence helps
close down exposures that usher in threats down the road. An Intelligent SOC features real-
time discovery, contextualization, prioritization, and L1 triage while reining in brand exposure to
reduce alerts and prevent future incidents.14
3. Shining the light on shadow IT
It’s taxing enough to worry about Securing the servers is Amazon’s
threats lurking outside your company responsibility. Configuring and
without losing sleep over risks created safeguarding the S3 buckets is
within. But more and more, Shadow IT
the responsibility of the bucket
puts security at equal or greater risk
than phishing attacks and other tried-
owner. And that seems to be
and-true campaigns. where things go wrong.
New online presence, for example, might
The S3 buckets come with strong
get created by anyone seeking a shortcut security out of the box. But the
or workaround for time-consuming IT owners end up misconfiguring the
procedures. Obviously, that happened a lot
in 2020. buckets, leaving their IP addresses
wide open on the web for anyone
Your Marketing team or one of its agencies
may have hosted web-based events or
to sniff out, using tools readily
content that did not pose much of a threat available on code repository sites.
in and of themselves. But someone might
forget to renew a domain name only to FairInstitute.org
have an adversary hijack the URL for use in
a phishing campaign.
Odds are good that anything created on
the fly without IT’s knowledge has not
undergone scrutiny for compliance, routine
updates, branding, copyrighting, etc. So,
if external digital exposure got created or
left behind by someone circumventing IT,
your Security team never knew to monitor
that presence for threats, vulnerabilities, or
other digital exposure.15
This is not to say that shadow IT only In 2020, protocols likely became compromised
gets created by the likes of Sales and by employees working from home creating
Marketing. Cloud storage processes, IP external access to remote into the office and
addresses, and services all may contribute inadvertently leaving SSH remote access
to the problem at one time or another. protocols exposed. Once you find IPs you
didn’t know belonged to you, or that were once
Continuous ASI discovery uncovers legitimate but should since have been shut
external digital risk from Shadow IT as it down, risk can be quickly eliminated.
appears. The most likely vectors include:
Exposed cloud services. As detailed
IP addresses you didn’t know were earlier, shadow IT would also include assets
associated with your brand, are part of exposed in hosted cloud services of which
a block you don’t know about, or are IT is unaware. For example, IT might migrate
hosted by providers not sanctioned by everything to Amazon Web Services (AWS)
central IT departments. For example, a and ASI discovers assets in Azure.
company might officially host corporate
infrastructure with Verizon and discover ASI keeps a constant watch over your cloud
through ASM that a bunch of IPs hosted by footprint, flagging anomalies like public-
other providers are affiliated publically with facing Amazon S3 buckets within the Brand
the organization. Exposure category.
4. Sizing up third-party risk
Third-party cyber risk overshadowed some The attack on the Solar Winds ecosystem
pretty hot topics toward the end of 2020 got us thinking about what can and should
proving once again what you don’t know can happen in the wake of a similar disaster. As
hurt you. This challenge may be the classic unwitting victims by association, we’re asking
use case for ASM in that, while you cannot what we can rightly (and legally) expect to
control everything that happens on the public pursue or demand. As cyber citizens seeking
Internet, you must continually seek it out, to reassure and protect our own partners and
monitor, and address your risk in relation to customers, what proof can we provide that
it. we’re doing all we can?16
These seemingly simple questions have ASM vs. security ratings
complex implications. While no direct liability
may exist for glitches in another company’s Chances are one or both companies
defenses, the goal of minimizing third-party subscribe to a cybersecurity ratings service.
risk clearly merits an all-out, anything- These scores reflect an organization’s overall
and-everything strategy. Including your reputation as a safe company to do business
vendors, partners, and other affiliates in your with and rank its performance versus
strategies and best practices helps instill competitors or companies in the same
confidence while strengthening your overall industry.
cyber risk posture.
Insight into peer ratings provides value
If you suspect you’re going to be the focus in baselining third-party risk from IP
of a third-party risk assessment, a deep dive addresses and vulnerabilities, but does
with ASI helps clean up the high-end critical not offer deep technical insight into other
exposures that can be used and held against aspects of digital risk. For example, those
you. Perception-wise, adding ASI and security associated with cloud and web application
ratings to regular certifications, pen testing, exposures described above. Nor can rating
and SOC2 reports shows stakeholders you’re services trace specific IPs of interest to a
taking a comprehensive and innovative particular provider without building technical
approach to visualizing and shrink potential integrations to the other party’s systems.
exposure day-in, day-out.
Conversely, ASM lets you see the source of
risk from a particular service and quickly drill
Simply highlighting down to see what’s at risk, and how to fix it.
Having done the hard work of integrating to
any and all exposed domains Google Cloud Platform (GCP), Azure, AWS,
and IPs, exposed services and other leading public infrastructures,
Netenrich ASI offers quick context that
and whether they’re fully speeds resolution.
authenticated offers
In general, ASM complements ratings with
a solid start. actionability as you delve into things like
phishing, typo squatting, and unauthenticated
services, some of which are not reflected in
risk ratings.17
5. Getting ready for cyber audits
Show of hands:
Who likes the word “audit”? Right. Are you patching external systems? ASI
shows that you are. Do you have services
And while we do our best to avoid them in exposed publicly? ASI can show you do not
life, they’re an inevitable reckoning point or that you’re monitoring for them and can
in doing business. As with third-party skip that step.
risk, ASM can streamline and fast-track
the process by arming you with proof of Solutions like Netenrich’s ASI offer
coverage. precise evidence to satisfy auditors that
you’re monitoring specific elements of
Mapping items covered by ASM discovery individual frameworks and mounting an
to specific controls listed in popular aggressive defense overall. Once again,
cybersecurity frameworks such as NIST a lot more goes into preparing for an
800 or CSF, COBIT (Control Objectives for audit, but anything that can help check
Information and Related Technologies) boxes in multiple areas—and equip you
and other industry-specific models makes to focus other efforts like vulnerability
it easier to check the box and go on to the management—is a definite plus.
next thing without having to provide more
detailed evidence.18
6. Justifying your security spend
Like that gym membership fee that
hits your account on the first of the
month, IT tends to be a “What have
you done for me lately” proposition,
with one nasty difference. When it
works, nothing happens, and nobody
notices.
When even one little thing slips by you,
avoidable or not, havoc ensues, and
everyone hears about it. Making headlines
leads to making heads roll as the whole
effort gets deemed a failure.
ASM plays an increasingly vital role in
preventing that from happening, delivering
fast, ongoing coverage and investment
value. ASI dashboards afford you an easy
way to show a steadily shrinking attack
surface, or that you’ve got things covered
during predictable spikes around things like
holiday shopping, market fluctuations, and
event registration.
Moreover, you can literally demonstrate
that you’re eliminating exposure—and
work—as time goes on to avoid risk in the
first place. Though harder to quantify than
saving experts time, lessening your appeal
ASI sifts through and correlates alerts to close false positives
and present users with only real risk that warrants attention,
as a cyber target is a powerful factor in
along with strategies for attending to it. assessing ROI on any investment.19
Higher value from existing
defenses
Who among us has never let a forty-dollar hackers to size up your infrastructure for
ab roller gather dust in the corner? ASI attack?
complements and replaces other, more
expensive tools you already own but might While complementing pen tests and
not be fully leveraging. multi-colored attack team exercises as
discussed above, ASM can also help
For example, if you engage digital bounty narrow the scope or focus to speed and
hunters to discover potential bugs related increase ROI on those investments as well.
to known exploits and vulnerabilities, And if you can’t afford to do it all, ASM
you might expect to pay $10K to $20K may well represent the biggest time saver
for just one discovery. ASI automatically and broadest scope of discovery—in other
finds a whole bunch, and keeps doing so words, the greatest value—in reducing
continuously, often at a fraction of the cost. external risk exposure.
So, why invite (much less pay) even friendly
7. You just got breached
We saved the worst for last here, but at the
end of the day, this is what it’s all about.
Everything comes under the microscope
in the wake of a breach. As incident
response (IR) winds down and things inch
back to normal, it’s well worth the effort
to dissect the initial infection or attack
vector, and why and how long it existed.
Once you understand what happened, you
can take steps to keep the same exposure
from putting you at risk again.
Most attacks succeed because a public-
facing asset opportunistically gets
compromised. ASM tackles this head-on.
If you got hacked through some external
exposure you didn’t know you had, what
better time to do a fast yet thorough search20
for others and start closing doors? Aside from dealing with the low-hanging
fruit, the aftermath of a breach is an
Actionable ASM discovery not only finds obvious time to reassess normal. If
risk but ranks it in terms of criticality you don’t have continuous external risk
based on the likelihood of it being used assessment in place, this may be the
against you. In one real-world scenario, perfect time to make the case for adding
ASI discovered code that had been left ASM and other high-value, low-overhead
exposed in a Github repository for nearly techniques to your SOC best practices.
two years, with API keys embedded.
Finding something that specific is a bit The continuous nature
like finding a needle in a haystack from an
adversary’s point of view, but it happens. of ASM represents a major step
The fact that code remained exposed for in becoming more predictive and
so long is a good indication that someone
proactive, which is always front-
may have already chanced upon it and
begun capitalizing. and-center on the heels of a nasty
breach.
8. [Bonus] The cruel reality of cybersecurity lives on.
You need to see and secure everything all
It’s tomorrow
of the time because hackers need only
find one attack vector, one time, to take
you down. As shown throughout this book,
ASM needs to happen on a continuous
basis because your attack surface changes
on a continuous basis, often without you
realizing it.
When should you attack your At the end of the day, Netenrich’s ASI and
attack surface? Right now, Intelligent SOC offer a structured means
of becoming better and better—instead
tomorrow, and every day from
of more and more exposed—as things
now on. Just like exercise. change.21
The smart way
forward, and how to
head out. For free.
To sum up the potential use cases
described above, attack surface
monitoring should be done anytime your
organization:
Rolls out new infrastructure or migrates
apps and services to the cloud
Merges or integrates another company’s
systems with your own
Anticipates major spikes or deviations in ASI + Intelligent SOC =
volumes and utilization Less risk with less effort
Any business event that involves monitoring The more complex your security
for continuity should include a comprehensive operations become, the more
cybersecurity assessment featuring attack specialized tools (that don’t
surface management. Done right, ASM gets talk to each other) and types
smarter with each passing day, and every of intelligence you have to
risk vector resolved. Moreover, it eliminates manage. The real value of
manual processes preventing essential these investments comes from
investigations from taking place and avoids operationalizing the data and
wasted or duplicated efforts. insights to speed response, which
no one has time to do.
Every new workout craze or fitness innovation
has an infomercial that ends with a risk free Netenrich Resolution Intelligence
offer, so why not see the analogy through delivers the automation, context,
to the end? For a limited time, Netenrich is and expertise needed to flip the
offering free trials of ASI on its own or as part equation. Our Intelligent SOC, ASI,
of Intelligent SOC. and global threat intelligence are
all integrated to deliver actionable
data that promotes resolution
within minutes.22
Learn more and start seeing results within
days. For real.
www.netenrich.com/try-asi
Oh, and did we mention it’s continuous?You can also read