Cyber Asset 攻击面管理 (CAASM)

Identify 曝光 和 vulnerabilities throughout your physical 和 digital 攻击表面.

Rapid7攻击面安全

What is Cyber Asset 攻击面管理 (CAASM)?

Cyber asset 攻击表面 management (CAASM) is a platform tool that leverages data integration, 转换, 和 analytics to provide a unified view of all physical 和 digital cyber assets that comprise an enterprise 网络.

CAASM政策有助于识别 曝光 和 potential security gaps along the 网络 攻击表面. They are intended to act as authoritative sources of asset information complete with ownership, 网络, 和 business context for IT 和 security teams, furthering the knowledge of the security organization at large.

CAASM can be integrated with existing 工作流 to automate security control gap analysis, 优先级, 和修复, thereby boosting efficiency 和 breaking down operational silos between teams 和 their tools. 记住这一点很重要, 然而, that the assets these tools are meant to protect are more than just devices 和 infrastructure.

A 安全运营中心(SOC) typically tags “assets” as users, applications, 和 even application code. The key is for the security practitioners within a SOC to recognize the interconnectedness of these assets.

Consider a scenario where more than 1,000 servers have the same vulnerability. Assessing each one quickly becomes time 和 cost-prohibitive, thus CAASM capabilities can step in to speed up the process by enriching cyber asset data to then automate the majority of analysis.

CAASM是如何工作的? 

CAASM works by considering the interconnectedness 和 totality of 网络 assets, 分析他们的弱点, 和 then enacting risk-reduction policies. Common key performance indicators (KPIs) of CAASM include: 

  • 资产可见性 
  • 端点 代理保险
  • 服务水平协议(sla)
  • Mean-time-to-respond (MTTR)

如上所述, assessing each vulnerability can become cost 和 time-prohibitive when there is such a multitude of assets to consider on one 网络. Automation helps by analyzing vulnerabilities faster as well as prioritizing them for remediation.

CAASM enables organizations to leverage analytics with the goal of refining search results, 识别趋势, or disseminating specific information to defined groups or individuals. This integrated approach delivers comprehensive 攻击表面 visibility 和 mapping so a SOC can address risks 和 manage vulnerabilities more efficiently.

Perhaps the most critical function of CAASM is the identification 和 mapping of new assets as they plug into 和 out of a 网络. It’s important to leverage comprehensive asset discovery tools to gain a true picture of what a changing 攻击表面 looks like as those new assets appear. 网络访问控制(NAC) capabilities can also aid in the creation of policies to cut down on unauthorized access attempts, should a bad actor exploit an asset vulnerability that has yet to be identified.

From there, security personnel can more easily define specific outcomes for assets or asset groups. Once these outcomes are established, it’s simply a matter of running searches for all assets that do not meet these security criteria 和 subsequently prioritizing them for remediation. 以这种方式, CAASM helps a SOC streamline inventory 和修复 practices to help it gain greater efficiencies.

How Does CAASM Differ from 其他 Technologies?

CAASM differs from other technologies in many ways, but is also similar in others. There are so very many platforms 和 methodologies out there to help security practitioners ensure their 攻击表面s are as protected as they can possibly be. When looking at 攻击表面 protection solutions, what are some key differences a buyer might consider before purchasing the right solution for their organization?

CAASM vs. 攻击面管理(ASM)

连续 攻击面管理(ASM) is the overarching concept of the always-on monitoring of an organization’s digital footprint, with the goal of shrinking the 攻击表面 和 strengthening the company’s security posture. ASM encompasses all of the methodologies we’ll discuss here. CAASM is essentially ASM through the filter of all of an organization's cyber assets on its 网络 or that are attempting to access its 网络, 对内对外.

CAASM vs. External 攻击面管理 (EASM)

两者的主要区别 EASM 和 CAASM security is that the former typically focuses solely on external-facing assets while the latter focuses on both external 和 internal 网络 assets, therefore granting a more complete picture of the 攻击表面 at any given time. Because of its more simplistic nature as compared to CAASM, EASM solutions tend to be easier to set up 和 therefore more widely adopted.

CAASM vs. 数字风险保护(组成)

While CAASM solutions tend to focus on internal 和 external 网络 assets – 和 therefore the data they share with the 网络 和 take off of it – a 组成 solution typically aims its focus on an organization’s sensitive digital assets 和 their exposure to the internet 和 potential attackers as well as vulnerabilities that could result from that exposure.

CAASM用例

Let's take a look at the situations that would most call for implementation of a CAASM solution to help protect an enterprise 网络 as the proliferation of cyber assets creates more vulnerability.

  • 库存和绘图: Maintaining visibility over a detailed – 和 automated – inventory of the cyber assets growing a 网络’s 攻击表面 is the overarching mission of a CAASM solution.
  • 优化 漏洞管理(VM) 工作流: By defining asset outcomes 和 refining processes to be more automated, 漏洞可以被发现, 优先, 而且补救的速度比以往任何时候都快. This means a stronger security posture for the 攻击表面 as well as the ability to take more proactive measures as telemetry dictates.
  • Maintain 合规 需求: Complete asset inventories are critical in maintaining regulatory 和 internal 合规 需求. 通常, CAASM solutions will come with built-in 合规 frameworks that help an organization adhere to the likes of NIST、SOC2等.
  • Identify vulnerable application servers: A CAASM tool can help to find application servers that are contextually exposed for exploitation as well as identify owners based on login telemetry. From there, the server owner 和 security team can be notified. This integrated approach delivers comprehensive 攻击表面 visibility 和 mapping.
  • 确保访问管理如上所述, NAC controls can accentuate CAASM tools so that authentication protocols are aiding in the effort to verify assets that have a right to be on the 网络. With CAASM, security personnel can leverage identity 和 access management (IAM) policies to quickly remediate incorrectly escalated privileges as well as better underst和 who 和 what are on the 网络.

CAASM的好处

The purpose of ASM is to shrink the so-called 攻击表面, so that there are fewer potential access points for a threat actor to breach the 网络. 但正如我们在这里讨论过的, more assets interacting with an enterprise 网络 means a greater proliferation of access points.

Implementing an effective CAASM solution can help to mitigate these concerns as more assets come onto the 网络. Let’s take a look at some of the benefits of such a solution:

  • 更低的风险关于… 安全自动化, IDC注意到, “using continuous automation tools to discover externally exposed assets helps an organization address risk in previously unknown assets with both a frequency 和 breadth that are possible only with automation.”
  • Reduce the size of the 攻击表面: It bears repeating: A shrunken 攻击表面 is a smaller target for threat actors 和 potential breaches. Leveraging automation to plug vulnerabilities quickly as well as employing 网络 access authentication tools can help a security organization achieve its goals as relates to shrinking its 网络 攻击表面.
  • 加强伙伴关系: As IT teams make it a habit of sharing data from assets hopping onto 和 off of the 网络, security teams can leverage the automation native to CAASM tools to sift through that data faster. This helps to create efficiencies in discovery of both vulnerabilities 和 any active exploitations.

A CAASM platform isn’t a plug-和-play solution to cyber asset management. 事实上, it will take the skill of experienced security practitioners to properly implement such a solution. But the value derived from a well-maintained 和 effective CAASM tool will mean a stronger 和 more secure 网络.