
Introduction
As the scale and severity of recent security breaches increase, the importance of identifying IT assets is becoming more prominent. Non-critical and unmanaged assets, in particular, can pose significant vulnerabilities to a company's security. In this article, we will discuss the importance of continuous asset identification management and strategies to prevent security breaches.
Meticulous asset identification is becoming crucial for breach prevention
According to the recent investigation by Mandiant, there is a significant difference in the time it takes to recognize when a breach occurs (Dwell Time) depending on the importance of the service. In crucial service (Internal) areas, breaches are identified and responded to relatively quickly, whereas, for non-critical services (External) and assets, it takes a long time to recognize the breach.

The important point here is that taking a long time to recognize a breach gives the attacker more time to infiltrate, which means non-critical services should not be neglected. Therefore, it is important to perform monitoring and management of non-critical services at the same level as critical services.
Attacks using the rising open source and commercial vulnerability scans
Attackers are using open-source and commercial vulnerability scanners to randomly explore system vulnerabilities, leading to ongoing vulnerability scanning attacks on assets.
Bad Bot Traffic Levels Continue to Rise
Bad bot traffic levels rose for the fifth consecutive year, indicating an alarming trend. This increase is partly driven by the increasing popularity of Artificial Intelligence (AI) and Large Learning Models (LLMs). In 2023, bad bots accounted for 32% of all internet traffic – a 1.8% increase from 2022. The portion of good bot traffic also increased, albeit slightly less significantly, from 17.3% of all internet traffic in 2022 to 17.6% in 2023. Combined, 49.6% of all internet traffic in 2023 wasn’t human, as human traffic levels decreased to 50.4% of all traffic.
2024 Bad Bot Report, imperva
These attacks make neglected assets easy targets, and web services considered unimportant can become the starting point of breaches. Particularly, vulnerabilities in open-source software are easily disclosed and widely used, which makes random attacks using these vulnerabilities make asset identification and management more important.
In reality, many companies do not properly manage their non-essential assets. However, attackers are using these neglected web services as footholds to infiltrate, attempting to spread internally after uploading web shells. Therefore, it is essential to thoroughly manage all assets and services, regardless of their importance. To achieve this, regular vulnerability scans and patch management should be performed on all assets and services, and strong access control and monitoring should be applied even to non-essential services.
Need for Domain and Certificate Management
In the ongoing threat landscape posed by these attackers, domain and certificate management also play crucial roles as security elements. Security vulnerabilities can arise due to issues like domain ownership transfer (hijacking), domain registration expiration, DNS MX record changes, HTTPS certificate expiration, and typo squatting.
Domain hijacking is an act where an attacker seizes domain ownership, putting the company's website under the attacker's control, which can be exploited for malware distribution, phishing attacks, and more.
If the domain registration period expires, there is a possibility that attackers could take over the domain. To prevent such situations, it is crucial to regularly check the domain registration period and renew it before it expires. After expiration, re-registering the domain may be difficult, potentially causing the company's website to become inaccessible or damage the brand's value. Therefore, it is safe to set up domain registration renewal notifications.
HTTPS certificates (SSL certificates) play a role in encrypting communication between the website and users, securing the data. If the certificate expires, the website may be marked as insecure, leading to a loss of trust for users. Additionally, once the certificate expires, communication will not be encrypted, increasing the risk of attackers intercepting or tampering with data. Therefore, it is important to regularly check the certificate validity periods and renew them before they expire.
Typo Squatting is a phishing technique where attackers register similar domains by exploiting users' mistakes in typing website addresses. This method leads users to unintentionally access the attacker's site, attempting to steal personal information or download malicious software.
Regularly checking and managing these elements plays a significant role in preventing incidents. In particular, to protect domain ownership, it is recommended to apply multi-factor authentication (MFA), automate domain registration renewal reminders, and actively manage using tools like ASM (Attack Surface Management).
ASM (Attack Surface Management)
It is a process of identifying all of an organization's digital assets and continuously monitoring and managing potential security vulnerabilities on them. The attack surface refers to all exposed assets of an organization, such as systems, networks, software, and websites, where external attackers can attempt attacks.
The importance of precise asset identification and management
To respond to increasingly sophisticated and advanced cyber threats, it is essential to identify and manage the status of all assets and services connected to the network. For this purpose, it is crucial to establish an environment that enables rapid response by utilizing threat detection and threat intelligence services. If assets are not properly identified and managed, they are likely to become vulnerable targets for attackers.

To perform asset management of companies and organizations more efficiently, the introduction of automation tools is considered necessary. Asset management automation tools such as ASM (Attack Surface Management) meticulously identify all assets connected to the network and help strengthen security by pre-emptively pinpointing vulnerable areas. Through asset management automation, asset identification and management can be conducted consistently and continuously, reducing the burden on security teams while improving response times.
In summary
As mentioned above, unmanaged IT assets pose a significant threat to the security of businesses and organizations. These assets provide attackers with an easy pathway for infiltration and have the potential to undermine an organization's security framework.
Comprehensive asset identification and automated asset management through ASM implementation play a crucial role in mitigating these risks and enhancing security posture. Thorough management of all assets is no longer an option but a necessity. Through this, companies can minimize their attack surfaces and establish a more secure IT environment.
Popular Articles