Why organizations need cloud attack surface management

<div>
<div>
<p paraeid=”{391f7bcb-7164-4bda-b387-679b7c275a0e}{29}” paraid=”781871645″><span xml:lang=”EN-US” data-contrast=”auto”>As more organizations move to public cloud environments, they’re finding that their attack surfaces are no longer fixed perimeters but instead a constantly shifting collection of services, identities, APIs and configurations. Traditional security tools, built for more static environments, are ill-equipped to manage that level of dynamic change across products and platforms. For security teams, it’s a serious problem that can leave them without the resources they need to identify, prevent and mitigate threats from actors who are more than ready to exploit any vulnerability.</span><span data-ccp-props=”{}”>&nbsp;</span></p>
</div>
<div>
<p paraeid=”{391f7bcb-7164-4bda-b387-679b7c275a0e}{157}” paraid=”348131403″><span xml:lang=”EN-US” data-contrast=”auto”>Many enterprise security teams are looking to cloud attack surface management as a more appealing alternative to their traditional or legacy tools. Cloud ASM extends the principles of traditional </span><a rel=”noreferrer noopener” target=”_blank” href=”https://www.techtarget.com/searchsecurity/tip/What-is-attack-surface-management-and-why-is-it-necessary”><span xml:lang=”EN-US” data-contrast=”none”><span data-ccp-charstyle=”Hyperlink”>attack surface management</span></span></a><span xml:lang=”EN-US” data-contrast=”auto”> to cloud-native environments, helping security teams discover, monitor and secure everything exposed — intentionally or otherwise — across SaaS and IaaS environments.</span><span data-ccp-props=”{}”>&nbsp;</span></p>
</div>
<div>
<h2 paraeid=”{7d217d4a-89cb-4fd8-a54f-9058a33826bf}{48}” paraid=”1037967307″ aria-level=”2″ role=”heading”><span xml:lang=”EN-US” data-contrast=”none”><span data-ccp-parastyle=”heading 2″>The nuts and bolts</span><span data-ccp-parastyle=”heading 2″> of cloud ASM</span></span><span data-ccp-props=”{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:200,&quot;335559739&quot;:0}”>&nbsp;</span></h2>
</div>
<div>
<p paraeid=”{7d217d4a-89cb-4fd8-a54f-9058a33826bf}{59}” paraid=”224803218″><span xml:lang=”EN-US” data-contrast=”auto”>Cloud ASM platforms focus on discovering, analyzing and minimizing cloud-exposed assets accessible from the internet or other cloud tenants. Cloud ASM works by correlating cloud provider APIs, DNS records, access policies, IP ranges, SaaS integrations and identity relationships to map an organization’s cloud footprint. Unlike older external scanners that look only from the outside in, cloud ASM correlates external visibility and cloud-internal telemetry to build a full inventory of what an attacker could exploit.</span><span data-ccp-props=”{}”>&nbsp;</span></p>
</div>
<div>
<p paraeid=”{7d217d4a-89cb-4fd8-a54f-9058a33826bf}{91}” paraid=”1187590141″><span xml:lang=”EN-US” data-contrast=”auto”>Modern cloud ASM uses automation, graph-based analysis and sometimes </span><a rel=”noreferrer noopener” target=”_blank” href=”https://www.techtarget.com/searchsecurity/feature/How-AI-threat-detection-is-transforming-enterprise-cybersecurity”><span xml:lang=”EN-US” data-contrast=”none”><span data-ccp-charstyle=”Hyperlink”>AI-driven anomaly detection</span></span></a><span xml:lang=”EN-US” data-contrast=”auto”> to keep the attack surface up to date as environments grow or change.</span><span data-ccp-props=”{}”>&nbsp;</span></p>
</div>
<div>
<p paraeid=”{7d217d4a-89cb-4fd8-a54f-9058a33826bf}{121}” paraid=”879148986″><span xml:lang=”EN-US” data-contrast=”auto”>The strongest cloud ASM platforms include the following key capabilities:</span><span data-ccp-props=”{}”>&nbsp;</span></p>
</div>
<div>
<ul style=”list-style-type: disc;” role=”list” class=”default-list”>
<li role=”listitem” data-aria-level=”1″ data-aria-posinset=”1″ data-list-defn-props=”{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}” data-listid=”9″ data-font=”Symbol” data-leveltext=”” aria-setsize=”-1″> <p paraeid=”{7d217d4a-89cb-4fd8-a54f-9058a33826bf}{133}” paraid=”274468795″><strong><span xml:lang=”EN-US” data-contrast=”auto”&

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

This article has been indexed from Search Security Resources and Information from TechTarget

Read the original article: