How-To Guides
How to Build an Attack Surface Management Program
Building an effective attack surface management program isn’t just about buying a tool and turning it on. It’s a strategic initiative that requires careful planning, cross-functional collaboration, and a clear understanding of what you’re trying to protect. Most organizations discover their attack surface is 3-5 times larger than they initially estimated, with forgotten assets, shadow IT, and third-party integrations creating blind spots that attackers eagerly exploit. This guide walks you through the practical steps to build a mature ASM program that actually reduces risk, from initial asset discovery through continuous monitoring and remediation.
Why Your Organization Needs an Attack Surface Management Program
Traditional vulnerability management assumes you know what assets you have. That assumption breaks down quickly in modern enterprises. Cloud environments spin up and tear down infrastructure in minutes. Developers deploy containers without notifying security. Marketing launches landing pages on third-party platforms. Acquisitions bring entire networks into your environment overnight.
An attack surface management program solves the fundamental problem that you can’t protect what you don’t know exists. It continuously discovers internet-facing assets, identifies what services they’re running, assesses their risk, and feeds that intelligence into your security operations. Without ASM, you’re essentially hoping attackers don’t find your assets before you do.
The business case typically centers on three outcomes. First, reducing the window of opportunity for attackers by discovering and securing assets before they’re exploited. Second, meeting compliance requirements that increasingly mandate continuous asset discovery and risk assessment. Third, improving security team efficiency by automating discovery and classification tasks that traditionally consumed dozens of hours per week.
Organizations that implement ASM programs typically discover 40-60% more internet-facing assets than their CMDB or asset inventory tools show. More importantly, they find high-risk exposures (exposed databases, administrative panels, sensitive documents) that would have remained invisible to traditional scanning approaches.
Prerequisites and Stakeholder Alignment
Before you start building, you need executive sponsorship and cross-functional buy-in. ASM programs touch multiple domains: IT operations, security operations, cloud engineering, development, and often legal and compliance. The program will discover assets that teams didn’t realize were exposed, which can create uncomfortable conversations if stakeholders aren’t aligned from the start.
Your executive sponsor (typically the CISO or VP of Security) needs to communicate that ASM is about visibility and risk reduction, not blame. The goal is discovering and securing assets, not punishing teams for shadow IT. This framing is critical because you’ll need cooperation from engineering teams who may have deployed infrastructure outside normal approval processes.
From a technical perspective, you need a clear understanding of your organizational boundaries. What domains do you own? What cloud accounts? What subsidiary companies? What IP ranges? You’ll also need to identify sensitive assets that require special handling, like PCI environments, HIPAA-covered systems, or classified networks.
Budget planning should account for both platform costs and personnel time. A mature ASM program typically requires 1-2 dedicated FTEs for organizations with 1,000-5,000 employees, though this varies significantly based on environment complexity. You’ll also need to factor in remediation costs, since discovering vulnerabilities means nothing if you can’t fix them.
Step 1: Comprehensive Asset Discovery
Asset discovery forms the foundation of your ASM program. The challenge is that different discovery methods find different assets, so comprehensive coverage requires multiple approaches working in concert.
Start with seed-based discovery by feeding your ASM platform every domain, subdomain, IP range, and cloud account you know about. This includes corporate domains, product domains, subsidiary domains, and any vanity domains used for marketing campaigns. Don’t forget wildcard DNS records, which often hide development or staging environments.
Praetorian Guard takes a multi-vector approach to discovery, combining passive DNS intelligence, certificate transparency logs, cloud provider APIs, and active scanning to build a comprehensive asset inventory. The platform continuously monitors for new assets appearing across your digital footprint, catching infrastructure that appears between scheduled scans.
Cloud discovery requires API integration with AWS, Azure, GCP, and any other cloud providers you use. This discovers not just compute instances, but also storage buckets, databases, load balancers, and serverless functions that may be exposed to the internet. Many organizations discover publicly accessible S3 buckets or Azure blobs they didn’t know existed during initial cloud enumeration.
Certificate transparency logs provide another valuable discovery vector. Every SSL/TLS certificate issued for your domains appears in public CT logs, revealing subdomains and services that may not be linked from your main websites. Attackers routinely mine CT logs for targets, so your ASM program should do the same.
Don’t overlook third-party and subsidiary assets. Acquisitions often come with entire IT infrastructures that remain independently managed for months or years. Marketing teams frequently deploy landing pages, webinars, and lead generation tools on third-party platforms that still carry your brand and create risk if compromised.
The initial discovery phase typically takes 1-2 weeks for mid-sized organizations and surfaces thousands to tens of thousands of assets. Expect to find significant numbers of forgotten or unmanaged assets, especially in the first pass.
Step 2: Asset Classification and Ownership
Once you’ve discovered your assets, you need to classify them by criticality, sensitivity, and ownership. Raw asset lists are overwhelming and don’t guide remediation priorities effectively. Classification transforms inventory data into actionable intelligence.
Create a classification schema that reflects your business reality. A typical framework might include categories like: production vs. non-production, customer-facing vs. internal, PCI/HIPAA/regulated vs. non-regulated, and critical vs. standard vs. low priority. The key is making classifications simple enough to apply consistently while granular enough to drive meaningful prioritization.
Asset ownership assignment is often the most challenging part of classification. Many organizations discover assets where no one remembers who deployed them or who’s responsible for maintenance. These orphaned assets represent significant risk because no team is monitoring them for vulnerabilities or ensuring patches are applied.
Establish a clear ownership assignment process. For cloud assets, ownership typically derives from the account or project. For on-premises infrastructure, ownership might come from IP address allocation or DNS naming conventions. For web applications, you may need to inspect content or contact information to determine ownership.
Use tagging extensively to capture context that influences risk and remediation. Tags might include: business unit, application name, environment (production/staging/development), technology stack, compliance scope, and deployment method (containerized, serverless, traditional VM). Good tagging enables powerful filtering and reporting later in the program.
Praetorian Guard’s classification engine combines automated discovery with human verification, using security analysts to investigate ambiguous assets and validate ownership. This hybrid approach delivers higher accuracy than pure automation while scaling more effectively than manual classification processes.
Step 3: Risk Scoring and Prioritization
Not all vulnerabilities deserve equal attention. Effective ASM programs implement risk scoring that considers vulnerability severity, asset criticality, exposure level, and exploit availability to prioritize remediation efforts.
Start with standard vulnerability severity ratings (CVSS scores) as a baseline, but enhance them with context about asset criticality and internet accessibility. A critical vulnerability on an internet-facing production database demands immediate attention. The same vulnerability on an isolated development VM might wait for the next patch cycle.
Consider exposure level in your risk scoring. An asset that’s directly internet-accessible carries higher risk than one behind multiple layers of security controls. Assets with administrative interfaces exposed (SSH, RDP, database ports) typically warrant elevated priority regardless of whether vulnerabilities are currently known.
Attack surface risk extends beyond traditional CVEs. Misconfigurations often create more immediate risk than known vulnerabilities. Exposed administrative panels, default credentials, misconfigured cloud storage, leaked API keys, and weak TLS configurations all represent attack vectors that may not have CVE numbers but definitely need remediation.
Build your risk scoring model to surface the exposure types most relevant to your threat landscape. If you’re in financial services, focus heavily on data exposure and compliance violations. If you’re a SaaS provider, prioritize authentication bypasses and API security issues. If you operate critical infrastructure, emphasize availability and operational technology security.
Establish clear SLA tiers for remediation based on risk scores. A common framework might be: critical exposures remediated within 24-48 hours, high risks within 7 days, medium risks within 30 days, and low risks addressed in regular maintenance cycles. These SLAs need to be realistic for your organization’s change management and deployment velocity.
Step 4: Continuous Monitoring and Change Detection
Attack surfaces are dynamic. Assets appear and disappear constantly in modern IT environments. An ASM program that only scans weekly or monthly will miss ephemeral infrastructure and temporary exposures that attackers can exploit in hours.
Implement continuous monitoring that tracks changes to your attack surface in near real-time. This includes new assets appearing, services starting or stopping, certificates being issued, DNS records changing, and cloud resources being deployed. The goal is detecting meaningful changes within hours rather than discovering them weeks later in the next scheduled scan.
Configure alerting for high-risk changes. New database ports opening to the internet, SSL certificates issued for unexpected subdomains, administrative interfaces becoming publicly accessible, and new cloud storage buckets created should all trigger immediate notifications to security teams.
Change detection also provides valuable security intelligence beyond vulnerability management. Understanding deployment velocity, infrastructure growth patterns, and which teams are most active helps security teams engage proactively rather than reactively discovering issues after they’ve been exploited.
Guard’s continuous monitoring operates 24/7, with human analysts reviewing anomalies and high-risk changes to filter out false positives before alerting your team. This managed service approach ensures you get actionable intelligence rather than notification fatigue from automated systems that lack context.
Baseline your normal change patterns so you can detect anomalies effectively. If your organization typically deploys 20-30 new assets per week, a sudden spike to 200 might indicate a compromised account deploying cryptomining infrastructure or a large project launching without security review.
Step 5: Integration with Vulnerability Management
ASM discovers assets, but vulnerability management secures them. These programs must work together seamlessly, with ASM feeding comprehensive asset inventories into VM tools and VM findings informing ASM risk scoring and prioritization.
The integration typically works through API connections or shared databases. Your ASM platform should automatically add newly discovered assets to your vulnerability scanner’s scope. This ensures that new infrastructure gets scanned for vulnerabilities shortly after deployment rather than remaining unassessed until someone manually updates scanner configurations.
Bidirectional integration provides the most value. ASM tells VM what to scan, while VM tells ASM about vulnerabilities discovered on those assets. This combined intelligence enables sophisticated risk prioritization that considers both asset context and technical vulnerability details.
Handle scope boundaries carefully. Some assets discovered by ASM may not be appropriate for active vulnerability scanning (third-party services, partner integrations, shared infrastructure). Your integration should include logic to determine which assets get automatically added to VM scope versus which require manual review.
Consider using your ASM platform as the source of truth for external asset inventory, with your CMDB or configuration management tools handling internal asset tracking. This division of responsibility leverages each tool’s strengths and avoids duplicating effort maintaining parallel inventories.
Step 6: Remediation Workflows and Accountability
Discovery without remediation is just expensive reconnaissance. Your ASM program needs clear workflows that move findings from identification through triage, assignment, remediation, and verification.
Design remediation workflows that match your organization’s change management processes. Some organizations can deploy emergency fixes within hours through automated deployment pipelines. Others require change approval boards and scheduled maintenance windows. Your ASM workflows need to accommodate these realities while still meeting security SLAs.
Ticket integration is essential for tracking remediation at scale. ASM platforms should automatically create tickets in your ITSM system (ServiceNow, Jira, etc.) for findings that require remediation, with appropriate severity, ownership, and context to enable quick action. Avoid manual ticket creation, which becomes unsustainable as finding volumes grow.
Establish clear ownership and accountability. When your ASM platform discovers a vulnerable asset, someone specific needs to be responsible for fixing it. This might be determined by asset tags, organizational hierarchy, or explicit assignment rules. Ambiguous ownership leads to findings languishing unaddressed because everyone assumes someone else will handle them.
Implement verification scanning to confirm remediation effectiveness. After a team reports fixing a vulnerability, your ASM platform should re-scan the asset to verify the issue is actually resolved. This closes the loop and prevents findings from being marked resolved when vulnerabilities remain exploitable.
Track remediation metrics to identify systemic issues. If certain teams consistently miss SLAs, they may need more resources or training. If certain vulnerability types persistently reappear, you may need to address root causes through secure configuration baselines or improved deployment practices.
Choosing an Attack Surface Management Platform
Platform selection significantly impacts program success. The right tool accelerates your program while the wrong one creates friction that undermines adoption.
Evaluate discovery breadth and depth carefully. Can the platform find assets across cloud providers, on-premises infrastructure, SaaS applications, and third-party services? Does it discover just IP addresses and domains, or does it also identify services, technologies, certificates, and misconfigurations? Comprehensive discovery reduces blind spots that attackers exploit.
Consider whether you want fully automated scanning or a managed service approach. Automated tools provide continuous coverage but generate high false positive rates and lack context about your specific environment. Managed services like Praetorian Guard combine automated discovery with human analysis, delivering actionable findings with zero false positives.
Guard stands out by integrating ASM with vulnerability management, breach and attack simulation, continuous penetration testing, cyber threat intelligence, and attack path mapping in a single unified platform. This eliminates the integration overhead of stitching together multiple point solutions and provides holistic security visibility.
Assess integration capabilities thoroughly. Your ASM platform needs to connect with vulnerability scanners, ITSM systems, SIEMs, SOAR platforms, and potentially cloud security tools. Strong APIs and pre-built integrations accelerate deployment and reduce maintenance overhead.
For organizations just starting their ASM journey, Praetorian offers a free ASM tier that provides continuous monitoring of external attack surface with no time limits. This allows you to demonstrate value and build stakeholder support before committing to a full program.
Evaluate the vendor’s threat intelligence capabilities. The best ASM platforms incorporate intelligence about active exploit campaigns, trending vulnerabilities, and attacker techniques to help you prioritize remediations based on real-world threat activity rather than just theoretical risk scores.
Measuring Program Success
Effective ASM programs track metrics that demonstrate security improvement and business value, not just activity metrics that measure scanning volume.
Mean time to discovery (MTTD) measures how quickly your program identifies new assets after they’re deployed. Leading organizations achieve MTTD under 24 hours through continuous monitoring and cloud API integrations. Lagging organizations might not discover assets for weeks or months if they rely on periodic scans.
Mean time to remediation (MTTR) tracks how long vulnerabilities remain exploitable after discovery. Break this down by severity to focus attention where it matters most. Critical findings might have an MTTR target of 48 hours while medium findings allow 30 days.
Attack surface growth rate helps you understand whether your security efforts are keeping pace with business expansion. If your attack surface grows 50% annually but your security team doesn’t scale proportionally, you’re falling behind. This metric supports resource allocation discussions with leadership.
Coverage metrics measure what percentage of your assets are actively monitored and assessed. Aim for 95%+ coverage of internet-facing assets. Gaps in coverage represent potential blind spots that attackers can exploit.
Track high-risk exposure reduction over time. How many exposed databases did you find and secure? How many administrative interfaces did you lock down? How many leaked credentials did you rotate? These concrete security improvements demonstrate program value more effectively than vulnerability counts.
Monitor false positive rates if you’re using automated tools. High false positive rates waste remediation team time and erode trust in the program. Praetorian Guard’s managed service approach with human verification delivers zero false positives, ensuring every finding your teams work represents genuine risk.
Common Mistakes to Avoid
Many ASM programs fail or underdeliver because of predictable mistakes. Learning from others’ experiences can help you avoid these pitfalls.
Don’t treat ASM as a one-time project. Attack surface management is a continuous program, not a point-in-time assessment. Organizations that scan once per quarter or only during annual pen tests will miss most of their dynamic attack surface changes.
Avoid siloing ASM within the security team. Effective programs require collaboration with IT operations, cloud engineering, and development teams who have context about assets and can implement remediations. Security-only programs struggle with ownership, access, and remediation velocity.
Don’t ignore non-technical exposures. Your attack surface includes exposed credentials in code repositories, leaked API keys in mobile apps, sensitive data in public cloud storage, and your organization’s footprint in breach databases. Focus exclusively on vulnerability scanning misses significant risk vectors.
Resist the temptation to assess everything immediately. Start with your crown jewels and internet-facing production assets. Build operational maturity with manageable scope before expanding to development environments, internal tools, and edge cases. Programs that try to boil the ocean upfront typically collapse under their own weight.
Don’t underestimate change management challenges. Discovering vulnerabilities is easy. Getting them fixed within security SLAs while respecting operational constraints requires process design, stakeholder alignment, and often difficult conversations about risk acceptance.
Avoid static classifications and risk scores. Assets change roles, move environments, and shift in criticality as business needs evolve. Your classification and scoring models need regular review to remain aligned with actual business risk.
Many ASM programs fail or underdeliver because of predictable mistakes. Learning from others’ experiences can help you avoid these pitfalls.
Don’t treat ASM as a one-time project. Attack surface management is a continuous program, not a point-in-time assessment. Organizations that scan once per quarter or only during annual pen tests will miss most of their dynamic attack surface changes.
Avoid siloing ASM within the security team. Effective programs require collaboration with IT operations, cloud engineering, and development teams who have context about assets and can implement remediations. Security-only programs struggle with ownership, access, and remediation velocity.
Don’t ignore non-technical exposures. Your attack surface includes exposed credentials in code repositories, leaked API keys in mobile apps, sensitive data in public cloud storage, and your organization’s footprint in breach databases. Focus exclusively on vulnerability scanning misses significant risk vectors.
Resist the temptation to assess everything immediately. Start with your crown jewels and internet-facing production assets. Build operational maturity with manageable scope before expanding to development environments, internal tools, and edge cases. Programs that try to boil the ocean upfront typically collapse under their own weight.
Don’t underestimate change management challenges. Discovering vulnerabilities is easy. Getting them fixed within security SLAs while respecting operational constraints requires process design, stakeholder alignment, and often difficult conversations about risk acceptance.
Avoid static classifications and risk scores. Assets change roles, move environments, and shift in criticality as business needs evolve. Your classification and scoring models need regular review to remain aligned with actual business risk.
Scaling Your Program
As your ASM program matures, focus shifts from initial discovery to optimization, automation, and expanding coverage to more complex environments.
Automate remediation for common exposure types. If you repeatedly discover the same misconfigurations (like public cloud storage buckets or default credentials), build automated remediation workflows that fix these issues without human intervention. This frees your security team to focus on complex vulnerabilities that require manual analysis.
Expand coverage to include supply chain and third-party risk. Modern applications incorporate dozens or hundreds of third-party dependencies, APIs, and services. Your ASM program should monitor these dependencies for vulnerabilities and exposures that could compromise your applications even if your own code is secure.
Integrate ASM intelligence into your threat modeling and red team exercises. Understanding your attack surface helps you identify likely attack paths and validate that security controls are effective against realistic threats. Guard’s attack path mapping capabilities connect attack surface visibility with breach and attack simulation to show exactly how attackers could exploit discovered weaknesses.
Build security champions within engineering teams who understand ASM findings and can implement remediations faster than centralized security teams working through tickets. This distributed model scales more effectively as your organization and attack surface grow.
Consider expanding into offensive security testing. Once you have comprehensive attack surface visibility, use that intelligence to guide continuous penetration testing that validates whether discovered exposures are actually exploitable. Praetorian combines ASM with continuous pen testing delivered by experienced security engineers who simulate real attacker techniques.
How Praetorian Guard Powers Modern ASM Programs
Praetorian Guard delivers the most comprehensive attack surface management solution on the market by combining breadth of coverage, depth of analysis, and managed service quality that eliminates false positives.
Guard discovers assets across every attack vector: external perimeter, internal networks, cloud infrastructure (AWS, Azure, GCP), web applications, mobile apps, exposed secrets, third-party integrations, and even phishing susceptibility through social engineering testing. This holistic approach ensures you’re not blind to entire categories of risk.
The platform goes beyond basic ASM by integrating vulnerability management, breach and attack simulation, continuous penetration testing, cyber threat intelligence, and attack path mapping in a unified service. You get not just a list of assets and vulnerabilities, but verified exploit paths showing exactly how attackers could compromise your critical systems.
What separates Guard from automated tools is the managed service delivery model. Every finding is verified by Praetorian’s security analysts before reaching your team. This human-in-the-loop approach eliminates the false positive noise that plagues automated scanners while providing context and remediation guidance that accelerates fixes.
Guard scales from startups to enterprises without requiring dedicated personnel to operate the platform. Praetorian’s team handles discovery, scanning, analysis, and reporting while your team focuses on remediation. For organizations without mature security operations, this managed approach delivers immediate value without the ramp-up time of building internal expertise.
The platform provides executive-friendly reporting that connects technical findings to business risk, helping you secure resources and demonstrate security program value to leadership. You’re not just reporting vulnerability counts, you’re showing reduction in exploitable attack paths and time-to-compromise metrics that resonate with business stakeholders.
Organizations building ASM programs can start with Praetorian’s free tier to experience the platform’s capabilities before expanding to comprehensive coverage. This risk-free approach helps you build stakeholder support by demonstrating concrete value through discovered exposures and verified vulnerabilities.