- Attack Surface Management (ASM) is an emerging but not fully mature discipline and technical solution type within the broader field of cybersecurity.
- ASM is composed of two main branches currently, external ASM (EASM) and cyber asset ASM (CAASM). CAASM is more internally focused.
- Asset discovery, vulnerability assessment, risk scoring, and prioritization, reporting, and remediation are the primary functions of an ASM system.
- Not all ASM vendors have fully in-house developed components; many rely on third-party products for some key functionality.
- Integrations with other security and IT tools, as detailed below, are essential for enabling ASM tools to maximize their utility in customer engagements
- Dark web monitoring is a set of techniques and practices that many ASM vendors employ for threat research and discovering client specific threat information.
- Some vendors offer manual and/or automated penetration and red teaming services.
- Some vendors offer limited brand protection features.
- EASM and CAASM will merge as deploying organizations seek to combine internal and external attack surface management in a single solution.