Optimizing ASM begins with defining “discovery.” Until recently, “discovery” focused on understanding VMs and devices in your own subnet. But the attack surface has evolved to include domains and subdomains; your organization’s APIs for building corporate applications and integrating third-party resources; and the data, systems, and users that connect to your corporate systems via the Internet.
Any of these portals can be exposed to the dark web, a source for capturing credentials and other information about users and assets. Today, “discovery” means systematically probing for potential vulnerabilities across the attack surface.
When it comes to ASM, there is no silver bullet for discovery. A thorough approach requires a mix of tools that access and aggregate the right data for your organization.1 One expert described this process as “understanding your ‘onion’—how your tooling is built out to protect your organization.”