Go to Top

Go to Top

Attack Surface Management
Attack Surface Management
Attack Surface Management
Attack Surface Management

Security Insights

Security Insights

Security Insights

Unmanaged IT assets? Importance of meticulous asset identification

Unmanaged IT assets? Importance of meticulous asset identification

Unmanaged IT assets? Importance of meticulous asset identification

EnkiWhiteHat

EnkiWhiteHat

Nov 14, 2024

Nov 14, 2024

Nov 14, 2024

Content

Content

Content

Introduction

As the scale and severity of recent security breaches increase, the importance of identifying IT assets is becoming more prominent. Non-critical and unmanaged assets, in particular, can pose significant vulnerabilities to a company's security. In this article, we will discuss the importance of continuous asset identification management and strategies to prevent security breaches.

Meticulous asset identification is becoming crucial for breach prevention

According to the recent investigation by Mandiant, there is a significant difference in the time it takes to recognize when a breach occurs (Dwell Time) depending on the importance of the service. In crucial service (Internal) areas, breaches are identified and responded to relatively quickly, whereas, for non-critical services (External) and assets, it takes a long time to recognize the breach.

The important point here is that taking a long time to recognize a breach gives the attacker more time to infiltrate, which means non-critical services should not be neglected. Therefore, it is important to perform monitoring and management of non-critical services at the same level as critical services.

Attacks using the rising open source and commercial vulnerability scans

Attackers are using open-source and commercial vulnerability scanners to randomly explore system vulnerabilities, leading to ongoing vulnerability scanning attacks on assets.

Bad Bot Traffic Levels Continue to Rise

Bad bot traffic levels rose for the fifth consecutive year, indicating an alarming trend. This increase is partly driven by the increasing popularity of Artificial Intelligence (AI) and Large Learning Models (LLMs). In 2023, bad bots accounted for 32% of all internet traffic – a 1.8% increase from 2022. The portion of good bot traffic also increased, albeit slightly less significantly, from 17.3% of all internet traffic in 2022 to 17.6% in 2023. Combined, 49.6% of all internet traffic in 2023 wasn’t human, as human traffic levels decreased to 50.4% of all traffic.

2024 Bad Bot Report, imperva

These attacks make neglected assets easy targets, and web services considered unimportant can become the starting point of breaches. Particularly, vulnerabilities in open-source software are easily disclosed and widely used, which makes random attacks using these vulnerabilities make asset identification and management more important.

In reality, many companies do not properly manage their non-essential assets. However, attackers are using these neglected web services as footholds to infiltrate, attempting to spread internally after uploading web shells. Therefore, it is essential to thoroughly manage all assets and services, regardless of their importance. To achieve this, regular vulnerability scans and patch management should be performed on all assets and services, and strong access control and monitoring should be applied even to non-essential services.

Need for Domain and Certificate Management

In the ongoing threat landscape posed by these attackers, domain and certificate management also play crucial roles as security elements. Security vulnerabilities can arise due to issues like domain ownership transfer (hijacking), domain registration expiration, DNS MX record changes, HTTPS certificate expiration, and typo squatting.

  • Domain hijacking is an act where an attacker seizes domain ownership, putting the company's website under the attacker's control, which can be exploited for malware distribution, phishing attacks, and more.

  • If the domain registration period expires, there is a possibility that attackers could take over the domain. To prevent such situations, it is crucial to regularly check the domain registration period and renew it before it expires. After expiration, re-registering the domain may be difficult, potentially causing the company's website to become inaccessible or damage the brand's value. Therefore, it is safe to set up domain registration renewal notifications.

  • HTTPS certificates (SSL certificates) play a role in encrypting communication between the website and users, securing the data. If the certificate expires, the website may be marked as insecure, leading to a loss of trust for users. Additionally, once the certificate expires, communication will not be encrypted, increasing the risk of attackers intercepting or tampering with data. Therefore, it is important to regularly check the certificate validity periods and renew them before they expire.

  • Typo Squatting is a phishing technique where attackers register similar domains by exploiting users' mistakes in typing website addresses. This method leads users to unintentionally access the attacker's site, attempting to steal personal information or download malicious software.

Regularly checking and managing these elements plays a significant role in preventing incidents. In particular, to protect domain ownership, it is recommended to apply multi-factor authentication (MFA), automate domain registration renewal reminders, and actively manage using tools like ASM (Attack Surface Management).

ASM (Attack Surface Management)

It is a process of identifying all of an organization's digital assets and continuously monitoring and managing potential security vulnerabilities on them. The attack surface refers to all exposed assets of an organization, such as systems, networks, software, and websites, where external attackers can attempt attacks.


The importance of precise asset identification and management

To respond to increasingly sophisticated and advanced cyber threats, it is essential to identify and manage the status of all assets and services connected to the network. For this purpose, it is crucial to establish an environment that enables rapid response by utilizing threat detection and threat intelligence services. If assets are not properly identified and managed, they are likely to become vulnerable targets for attackers.

To perform asset management of companies and organizations more efficiently, the introduction of automation tools is considered necessary. Asset management automation tools such as ASM (Attack Surface Management) meticulously identify all assets connected to the network and help strengthen security by pre-emptively pinpointing vulnerable areas. Through asset management automation, asset identification and management can be conducted consistently and continuously, reducing the burden on security teams while improving response times.

In summary

As mentioned above, unmanaged IT assets pose a significant threat to the security of businesses and organizations. These assets provide attackers with an easy pathway for infiltration and have the potential to undermine an organization's security framework.

Comprehensive asset identification and automated asset management through ASM implementation play a crucial role in mitigating these risks and enhancing security posture. Thorough management of all assets is no longer an option but a necessity. Through this, companies can minimize their attack surfaces and establish a more secure IT environment.

EnkiWhiteHat

EnkiWhiteHat

ENKI Whitehat
ENKI Whitehat

Offensive security experts delivering deeper security through an attacker's perspective.

Offensive security experts delivering deeper security through an attacker's perspective.

The Beginning of Flawless Security System, From the Expertise of the No.1 White Hacker

Prepare Before a Security Incident Occurs

The Beginning of Flawless Security System, From the Expertise of the No.1 White Hacker

Prepare Before a Security Incident Occurs

The Beginning of Flawless Security System, From the Expertise of the No.1 White Hacker

Prepare Before a Security Incident Occurs

Copyright © 2025. ENKI WhiteHat Co., Ltd. All rights reserved.

Copyright © 2025. ENKI WhiteHat Co., Ltd. All rights reserved.

Copyright © 2025. ENKI WhiteHat Co., Ltd. All rights reserved.