Managed Attack Surface Management

Monitor and manage your digital asset exposure surface, identify potential risks, proactively defend against attacks, and ensure secure business operations

2025
ASM
Attack Surface Management

Attack Surface Management (ASM) is a core component of exposure surface management, enhancing other components such as vulnerabilities, verification, and other IT and security functions.
The core objectives of Attack Surface Management (ASM) include: asset visibility and availability, security control compliance risks, and asset risk quantification.


—— Attack Surface Management Framework

Source: Extended based on Gartner ASM Framework

1

Pre-Planning

Scope Identification
Tool Selection and Adaptation

2

Discovery

Asset Discovery
Data Source Validation
New Asset Integration

3

Aggregation

Platform Calibration
Unique Identifier Construction
Asset Relationship Mapping

4

Risk Assessment

Compliance Auditing
Risk Quantification Modeling

5

Continuous Improvement

Exposure Surface Iterative Governance
SOC Collaborative Optimization
IT Operations Integration

Core Capabilities

Dynamic Asset Discovery & Continuous Exposure Surface Monitoring

Through active/passive scanning and intelligent crawler technology, maintain deep and real-time digital asset inventory. Automated checks ensure continuous updates to asset ledgers, helping enterprises accurately understand their exposure surface.

Comprehensive Asset Association & Supply Chain Mapping

Through automated tagging and risk classification, construct clear digital ecosystem mapping. Combined with risk tags to achieve asset priority management, providing actionable insights into key vulnerability points.

Multi-Format Digital Asset Mapping & Governance

Support unified management of diverse asset formats including websites, APIs, and mobile applications. Through dynamic/static crawling and third-party data integration, achieve continuous security assessment throughout the lifecycle.

Automated Penetration Testing & Security Patrol

Modular security tasks support on-demand customization, combined with advanced defense tools to achieve efficient security assessment. Automated processes ensure comprehensive detection, significantly reducing manual intervention requirements.

Advanced Threat Intelligence Integration

Through AI-driven data analysis, intelligently correlate threat intelligence in attack vectors. Effectively reduce false positive rates, improve vulnerability detection accuracy, and optimize protection measures across attack surfaces.

Scalable Cloud-Native Architecture

Based on Kubernetes elastic architecture, dynamically scale scanning, analysis, and penetration capabilities. Dynamic resource allocation ensures system high availability, flexibly responding to load changes.

Attack Surface Classification Matrix

Comprehensively organize enterprise digital asset exposure surfaces, establish systematic classification systems, and provide clear frameworks for security protection

Product Classification

Digital Risk Protection Service
(DRPS)
External Attack Surface Management
(EASM)
Cyber Asset Attack Surface Management
(CAASM)

Data Sources

Threat Intelligence
DRPS
Domain System
Confirm Registrants
Internet Scanning
Cloud Provider
Management Console (API)
SSPM/CSPM/CNAPP
Virtual Machine Data
Configuration Management Database
Firewall
SCCM
NDR
SCCM
EDR
Segmentation Tools

Attack Surface

Digital
External
Cloud
Internal
End User

Applicable Scenarios

Proactive Exposure Surface Reduction

Continuously monitor and manage exposure surfaces from an attacker's perspective, identify and mitigate risks related to shadow assets and unknown assets.

Unified Security Auditing

Conduct continuous security audits on diverse digital formats including websites, APIs, and mobile applications, ensuring the overall security of digital assets.

Data Leakage Prevention

Monitor key data storage and transmission channels, quickly detect leakage risks in unauthorized areas (such as dark web data).

Attack Path Prediction

Simulate potential attack chains and visualize infrastructure vulnerabilities, proactively blocking possible threat paths.

Lightweight Penetration Testing Process

Aimed at identifying exposed asset risks and strengthening information security protection systems, we conduct self-limiting, lightweight penetration testing services based on specific testing objectives, scopes, and methods established by both parties in the service agreement.

1

Client Communication, Scope Definition

Engage in in-depth communication with clients to clarify testing objectives, scope, and constraints, determine testing methods, and execute service agreements and authorization documents.

2

Information Gathering

Use a combination of automated tools and manual methods to collect available information about the target system, including network architecture, application information, and personnel information.

3

Vulnerability Scanning, Manual Verification

Use professional scanning tools to detect potential vulnerabilities, confirm the authenticity and exploitability of vulnerabilities through manual verification, avoiding false positives and negatives.

4

Reporting and Presentation

Generate detailed reports including vulnerability descriptions, risk levels, exploitation methods, and remediation recommendations, and provide professional interpretation to clients.

5

Follow-up Support

Assist clients in verifying vulnerability remediation effectiveness, provide technical consulting, conduct retesting based on client needs, and ensure effective resolution of issues.

配图