{"id":2667,"date":"2020-03-12T11:04:18","date_gmt":"2020-03-12T10:04:18","guid":{"rendered":"https:\/\/www.vaadata.com\/blog\/?p=2667"},"modified":"2020-11-10T10:49:41","modified_gmt":"2020-11-10T09:49:41","slug":"how-to-know-your-attack-surface-and-reduce-it","status":"publish","type":"post","link":"https:\/\/www.vaadata.com\/blog\/how-to-know-your-attack-surface-and-reduce-it\/","title":{"rendered":"How to Know Your Attack Surface (And to Reduce it)"},"content":{"rendered":"\n<p>Abraham Lincoln (repeating a woodsman) would have answered the question: what would you do if you had just six hours to chop down a tree? I would spend the first four hours sharpening my axe.&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignright size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/www.vaadata.com\/blog\/wp-content\/uploads\/2020\/03\/Attack-Surface-1024x512.jpg\" alt=\"Knowing its attack surface\" class=\"wp-image-2673\" width=\"382\" height=\"191\" srcset=\"https:\/\/www.vaadata.com\/blog\/wp-content\/uploads\/2020\/03\/Attack-Surface-1024x512.jpg 1024w, https:\/\/www.vaadata.com\/blog\/wp-content\/uploads\/2020\/03\/Attack-Surface-300x150.jpg 300w, https:\/\/www.vaadata.com\/blog\/wp-content\/uploads\/2020\/03\/Attack-Surface-768x384.jpg 768w, https:\/\/www.vaadata.com\/blog\/wp-content\/uploads\/2020\/03\/Attack-Surface-1536x768.jpg 1536w\" sizes=\"(max-width: 382px) 100vw, 382px\" \/><\/figure><\/div>\n\n\n\n<p>What does it tell us? That preparation is key.\u00a0<br>You cannot protect what you don\u2019t know, therefore <strong>knowing your attack surface<\/strong> is the first essential step to protect it efficiently.\u00a0<\/p>\n\n\n\n<!--more-->\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"has-text-color wp-block-heading\" style=\"color:#d6e322\"><strong>What is an Attack Surface?<\/strong><\/h2>\n\n\n\n<p>An attack surface consists of all elements that might be attacked to cause a security incident.&nbsp;<\/p>\n\n\n\n<p>There are generally two types of attack surface considered: <strong>the digital and the physical attack surface.<\/strong><br>While the digital attack surface comprises, for example, web services, network, communication protocols, domain names\u2026 the physical attack surface involves the physical points of attacks against a company, such as the windows of buildings, production facilities, or even a fire\u2026<br>These two attack surfaces are overlapping and interconnected; it is equally important to secure both of them.<\/p>\n\n\n\n<p>In this article, we focus on the attack surface of an information system. <br>It can be divided in two:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>the external attack surface, which includes all points accessible remotely from the internet,&nbsp;<\/li><li>the internal attack surface, which includes all points accessible from inside the company.<\/li><\/ul>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"has-text-color wp-block-heading\" style=\"color:#d6e322\"><strong>How to Know Your Attack Surface?<\/strong><\/h2>\n\n\n\n<p>Mapping the attack surface of your information system is a task that requires to think about all your different assets and about the value they have or they can enable to access to.<\/p>\n\n\n\n<p>To create a global mapping, it involves to:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>List<ul><li>your DNS records (domains, sub-domains),<\/li><\/ul><ul><li>your exposed servers and services (SSH, FTP\u2026)<\/li><\/ul><ul><li>applications used and their versions (this encompasses your own applications and third-party ones).<\/li><\/ul><\/li><li>Take into consideration the physical access to the company\u2019s assets (buildings, theft of devices, production line\u2026),<\/li><li>And other elements depending on your specific situation.<\/li><\/ul>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-image is-style-default\"><figure class=\"alignright size-medium\"><a href=\"https:\/\/www.vaadata.com\/blog\/wp-content\/uploads\/2020\/11\/Mapping-Attack-Surface-scaled.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"300\" height=\"212\" src=\"https:\/\/www.vaadata.com\/blog\/wp-content\/uploads\/2020\/11\/Mapping-Attack-Surface-300x212.jpg\" alt=\"Mapping Attack Surface\" class=\"wp-image-3292\" srcset=\"https:\/\/www.vaadata.com\/blog\/wp-content\/uploads\/2020\/11\/Mapping-Attack-Surface-300x212.jpg 300w, https:\/\/www.vaadata.com\/blog\/wp-content\/uploads\/2020\/11\/Mapping-Attack-Surface-1024x724.jpg 1024w, https:\/\/www.vaadata.com\/blog\/wp-content\/uploads\/2020\/11\/Mapping-Attack-Surface-768x543.jpg 768w, https:\/\/www.vaadata.com\/blog\/wp-content\/uploads\/2020\/11\/Mapping-Attack-Surface-1536x1086.jpg 1536w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/figure><\/div>\n\n\n\n<p>You can download this <a href=\"https:\/\/www.vaadata.com\/blog\/wp-content\/uploads\/2020\/11\/Mapping-Attack-Surface-scaled.jpg\" target=\"_blank\" rel=\"noreferrer noopener\">overview of the main elements to list and to secure<\/a> when you\u2019re mapping your attack surface. This overview is only a non-exhaustive base, as each context has specific elements to take into account.<\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>There are various tools and search engines that exist to help you with the mapping: <a href=\"https:\/\/www.shodan.io\">shodan.io<\/a>, <a href=\"https:\/\/censys.io\">censys.io<\/a>, <a href=\"https:\/\/crt.sh\">crt.sh<\/a>\u2026<br>For example, shodan.io enables to verify which of your devices of your network are available from the internet (servers, routers, printers\u2026), whereas crt.sh can find from a url all certificates related to a name or a brand.<\/p>\n\n\n\n<p>Knowing its attack surface is sometimes more complicated than expected because of shadow IT. <strong>Shadow IT<\/strong> refers to the IT devices and tools used by employees without the knowledge and approval of the IT department. These solutions are therefore not controlled, in particular, regarding their security, and can bring vulnerabilities to the information system or cause a data breach.<br>Some shadow IT elements can be traced back during the mapping of the attack surface (connected devices connected to the network without authorisation for example), but other elements, such as web services, are harder to detect.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"has-text-color wp-block-heading\" style=\"color:#d6e322\"><strong>How to Reduce your Attack Surface?<\/strong><\/h2>\n\n\n\n<p>Once you know your attack surface, you can manage it and assess the associated risks. When the attack surface is important, the inventory also helps you to prioritise the elements to protect.<\/p>\n\n\n\n<p>The aim of knowing your attack surface is to then be able to reduce it (when possible) and put in place relevant protection.<br>Having the less possible attack points allows focusing the protection efforts and therefore strengthening their security.<\/p>\n\n\n\n<p>To reduce your attack surface, general advice is:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>to clean or delete all elements that are not used any more,<\/li><li>to segment the network,<\/li><li>to monitor network and <a href=\"https:\/\/www.vaadata.com\/blog\/logging-monitoring-definitions-and-best-practices\/\">logs<\/a>,<\/li><li>to make some tools and services only available through VPN or through authentication,<\/li><li>to follow the principle of least privilege,<\/li><li>to raise awareness of the staff about risks they are facing (including <a href=\"https:\/\/www.vaadata.com\/en\/social-engineering-pentest\/\">social engineering<\/a>)<\/li><\/ul>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"has-text-color wp-block-heading\" style=\"color:#d6e322\"><strong>Keeping the Attack Surface Up To Date<\/strong><\/h2>\n\n\n\n<p>Once the mapping and reduction of the attack surface have been done, the following step, as important as the previous ones, is to keep it up to date, in order to continue to monitor and to protect it.<\/p>\n\n\n\n<p>In order to do this, it is necessary to follow the new services implemented, the evolution of the infrastructure, but also to monitor the release of vulnerabilities, patches, fixes\u2026 in order to apply them when changes concerning your assets are required.<br>An IT Asset Management tool can help you to centralise and monitor information about your attack surface.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Abraham Lincoln (repeating a woodsman) would have answered the question: what would you do if you had just six hours to chop down a tree? I would spend the first four hours sharpening my axe.&nbsp; What does it tell us? That preparation is key.\u00a0You cannot protect what you don\u2019t know, therefore knowing your attack surface<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8,13],"tags":[],"class_list":{"0":"post-2667","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-solutions","7":"category-solutions-fr"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.vaadata.com\/blog\/wp-json\/wp\/v2\/posts\/2667","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.vaadata.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.vaadata.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.vaadata.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.vaadata.com\/blog\/wp-json\/wp\/v2\/comments?post=2667"}],"version-history":[{"count":10,"href":"https:\/\/www.vaadata.com\/blog\/wp-json\/wp\/v2\/posts\/2667\/revisions"}],"predecessor-version":[{"id":3297,"href":"https:\/\/www.vaadata.com\/blog\/wp-json\/wp\/v2\/posts\/2667\/revisions\/3297"}],"wp:attachment":[{"href":"https:\/\/www.vaadata.com\/blog\/wp-json\/wp\/v2\/media?parent=2667"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.vaadata.com\/blog\/wp-json\/wp\/v2\/categories?post=2667"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.vaadata.com\/blog\/wp-json\/wp\/v2\/tags?post=2667"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}