Attack Surface Management
The continuous process of discovering, inventorying, and reducing an organization's externally exposed digital assets to minimize exploitable entry points.
Definition
Attack Surface Management (ASM) is the ongoing practice of identifying, classifying, and monitoring all internet-facing assets an organization owns or operates — including domains, subdomains, IP ranges, open ports, certificates, and third-party exposures. Unlike point-in-time assessments, ASM treats the attack surface as a living map that changes as infrastructure evolves. The goal is to eliminate unknown or unmanaged assets before adversaries discover and exploit them.
Why It Matters
Organizations routinely underestimate their external footprint: forgotten subdomains, shadow IT, misconfigured cloud storage, and expired certificates are consistent footholds for initial access. Threat actors actively scan the internet using the same tools defenders use, meaning any exposed asset is a potential target within hours of appearing online. Continuous ASM closes the visibility gap between what security teams think is exposed and what attackers actually see.
How It Works
ASM begins with passive and active discovery — enumerating subdomains via DNS brute-force, certificate transparency logs, and OSINT sources, then probing discovered hosts for open ports and running services. Each asset is fingerprinted to identify software versions, SSL/TLS configuration, and known CVEs. Risk scoring aggregates findings across multiple signal sources to prioritize remediation by exploitability and business impact. Modern ASM platforms continuously re-scan and alert on newly emerged or changed assets.
DFIR Platform
Exposure Scanner
The DFIR Platform's Exposure Scanner aggregates data from 11 intelligence providers — Shodan, Criminal IP, Netlas, SSL Labs, crt.sh (certificate transparency), BGPView, WhoisXML, SecurityTrails, OTX, HackerTarget, and IP-API — into a single risk-scored report (0-100). Run it free at dfir-lab.ch/exposure-scanner or via CLI with `dfir-cli exposure scan <domain>`.
View DocumentationRelated Concepts
Try these concepts in practice
Free tier with 100 credits/month. No credit card needed.