- Blog
#Data&AI #Security
AI Security Posture Management (AI-SPM): What is it all about and considerations for it
- 05/11/2024
Reading time 2 minutes
In cybersecurity it helps to think like a hacker. To celebrate European Cyber Security Month we sit down and think for a moment about what the attacker can see.
Open Source Intelligence (OSINT) is using publicly available information to address intelligence requirements. Amount of information that is publicly available is of course a lot of information, even when we narrow it down to what is related to our company. This information can be used by cybersecurity professionals but also by threat actors. I this article we focus on digital assets but there is of course numerous amount of other information that might be interesting, too, like names of personnel to guess user credentials, or job openings to learn technology stack that the company is using.
There is one tool in Azure that tries to map digital attack surface of a company. It is called Defender External Attack Surface Management (EASM). EASM feels a bit out of place in Azure. It is not tightly coupled with other Azure resources and it seems a bit external piece of software by itself. It belongs to Defender family but you can’t easily find it from the list of Defender products. It also is missing from the Microsoft Cybersecurity Reference Architecture.
EASM is a Software-as-a-Service (SaaS) that is quite a black box. Using it starts from filling something that you already know like Business Identity Code of a company, or a domain name. The tool then tries to identify digital assets related to the company. Digital asset can be:
It doesn’t do anything super magical that you couldn’t do with other tools. It does DNS queries, grabs information from Certification Transparency logs, checks open ports and analyzes the contents of web pages. It also tries to combine this information to threat intelligence of its own (or likely, somehow related to XDR). As the end result you get interactive content and bunch of reports that try to tell you what assets were found and what is their security posture when looking from an external perspective. Reports that you get out-of-box (no tools to create your own) are:
To get EASM running you can use following Bicep:
resources": [
{
"type": "Microsoft.Easm/workspaces",
"apiVersion": "2023-04-01-preview",
"name": "[parameters('easm_name')]",
"location": "[parameters('easm_location')]",
"properties": {}
}
]
EASM makes the process really simple and fast. The tool has a 30-day free trial, too, which is super nice. So if I would be a CISO of a company, I would definitely check if this tool gives us information that we weren’t aware of like new assets to protect or if the digital attack surface differs somehow from our current knowledge. For me, the setup took literally 5 minutes where AMASS that I used as a benchmark took hours to setup. Initial scans for both took some time (prepare for hours).
Cost of the tool is hard to forecast. It is directly related to size of the attack surface of a company. It costs 0.011€/day per asset where billable assets are:
Also the black box nature of the tool might be annoying. It scans once a week and there is not much you can tweak in terms of technical performance. You have REST API, SDKs and Log Analytics Workspace options in pulling the data out of the tool and using at elsewhere but beside that you are pretty limited.
When trying out the tool with the company that I know well – Zure, I found something interesting on the way:
Although the tool gives you information about the possible vulnerabilities in the website it is not a substitute for a vulnerability management solutions. It looks from outside and can’t exactly tell if certain patches are installed or not. It tries to hint you about cookie problems and GDPR issues but it should not be the thing you rely on your company about those topics.
The best would be to think about it as an external attack surface check tool or as a first step for a threat hunting activities. It can also tell you something about brand exposure. In best scenarios it finds assets that you did not know about or cloud services that somebody had just left dormant. It would be useful to compare the results to your digital asset inventory and see if they match.
Our newsletters contain stuff our crew is interested in: the articles we read, Azure news, Zure job opportunities, and so forth.
Please let us know what kind of content you are most interested about. Thank you!