Cybersecurity
Nanitor Enhances Protection with External Attack Surface Management (EASM)

02.01.24
5 min read
In the ever-evolving landscape of cybersecurity threats, organizations are constantly seeking ways to fortify their defenses and safeguard their digital assets. Recognizing the importance of proactive security measures, Nanitor has taken a significant leap forward by integrating External Attack Surface Management (EAAS) into its CTEM solution – and the best part? It comes at no extra charge to users.
What is External Attack Surface Management (EASM)?
External Attack Surface Management (EASM) is a cybersecurity practice focused on identifying, monitoring, and securing an organization's external-facing assets that are susceptible to potential cyber threats. It involves comprehensive scanning and analysis of external attack surfaces, including IP addresses, domains, and services that might be accessible from the internet.
By leveraging tools like Shodan, EASM enables organizations to proactively discover and assess potential vulnerabilities in their digital infrastructure, helping to mitigate risks before they can be exploited by malicious actors. In essence, EASM provides a strategic approach to understanding and fortifying an organization's external exposure, contributing to a more resilient and secure cybersecurity posture.
Discovering the Unseen: External Asset Discovery
The introduction of External Attack Surface Management brings with it the powerful capability of external asset discovery. Leveraging Shodan, Nanitor users can now identify and analyze their external attack surfaces, including IPs, domains, and services. The process is streamlined through a user-friendly interface, allowing users to specify their owned domains under Organization Management - Asset Policy - External Attack Surface.
Once domains are confirmed, the External Attack Surface feature begins its daily checks, and identified external assets seamlessly populate the Assets Inventory. The system goes a step further by displaying open ports in Asset Details after three days of persistent detection, aiding in the identification of potential vulnerabilities.
Controlled Access for Enhanced Security: Asset-Label Based Scope Restrictions
Security is not just about identifying threats but also about controlling access and managing risks within an organization. Nanitor recognizes this by introducing Asset-Label Based Scope Restrictions, a feature that enhances security management by allowing organizations to assign user access based on asset labels.
This feature ensures a need-to-know basis for team members, project managers, and auditors. Users with scope restrictions can view aggregated information, such as overviews and summaries, but are unable to drill deeper into information outside their defined scope.
The implementation is straightforward, as organization users can be easily restricted to an asset-label-based scope. This approach provides a more controlled and tailored access mechanism, aligning with the best practice of limiting access to only essential information.
We Value Your Feedback: Help Us Improve
Nanitor is committed to continuous improvement and values user feedback. As these features are rolled out, the team encourages users to engage and provide insights into their experiences. Whether it's about the efficiency of External Attack Surface Management or the flexibility of Asset-Label Based Scope Restrictions, Nanitor wants to hear from its users.
Organizations are urged to verify the identified external assets, ensuring they should be available externally and validating that these assets are protected behind a web application firewall. The three-day persistence check for open ports provides an additional layer of security, enabling organizations to stay one step ahead of potential threats.
Conclusion: Elevating Cybersecurity with Nanitor
Incorporating External Attack Surface Management and Asset-Label Based Scope Restrictions at no extra cost is a testament to Nanitor's commitment to providing comprehensive and robust cybersecurity solutions. As organizations navigate the complex cybersecurity landscape, Nanitor stands as a reliable partner, equipping them with the tools needed to proactively manage and secure their digital assets.
For full details on release 4.6.0 - check out our release notes here.