Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable 블로그

구독

Exposure Management: Our Vision for Securing the Modern Attack Surface

how to use exposure management to secure the modern attack surface

Securing today’s complex and dynamic IT environments requires bringing together vulnerability management, web application security, cloud security, identity security, attack path analysis and external attack surface management to help you understand the full breadth and depth of your exposures.

My role as Tenable’s chief technology officer affords me a front-row seat to the very real challenges facing cybersecurity professionals worldwide as they strive to reduce cyber risk and improve their cybersecurity posture. Insights from our customers inform every technology decision we make here at Tenable. And these insights inspire us to envision a future in which vulnerability management and other preventive cybersecurity tools come together in a new paradigm we call exposure management.

Securing the modern attack surface depends on understanding all of the conditions that matter in today’s complex and dynamic environments. An exposure management program brings together technologies such as vulnerability management, Web application security, cloud security, identity security, attack path analysis and external attack surface management to help your organization understand the full breadth and depth of its exposures and take the actions needed to reduce them through remediation and incident response workflows.

Why is exposure management so important? Because when a threat actor looks at your attack surface, they’re not thinking in terms of organizational silos. They’re looking for the right combination of vulnerabilities, misconfigurations and identities that will give them the access they need to meet their objectives.

The question to ask yourself is this: If your attack surface isn’t a bunch of silos, why is your security program set up that way? In part, it’s because the security industry as a whole has focused on creating point solutions tailored to address very specific aspects of cybersecurity. The result? A hodgepodge of technologies that all serve a bespoke function but don’t allow organizations to see the full scope of their cyber risk.

An effective exposure management program requires dismantling silos. The Tenable One Exposure Management Platform, launched earlier this month, is designed to give you a holistic view of your attack surface, so you can see what an attacker sees. In this blog, we’ll discuss the current capabilities of Tenable One as well as the vision for how we believe a platform-based approach to exposure management can transform the way organizations practice preventive cybersecurity.

Tenable One: 최신 공격 표면에 대한 위험 노출 관리

Historically, there have been products created to try to tie together all the disparate technology in use in your cybersecurity environment. Extended detection and response (XDR) is an example: it takes data from point products in an effort to identify attacks as they’re happening. While this approach is great for activity-driven security, it does not lend itself to the practice of preventive cybersecurity. Nor will focusing solely on activity data give organizations a complete picture of their security posture.

I see so many organizations today attempting to quantify risk by measuring how their security operations center (SOC) teams are responding to activity-driven data alone. You need a way to assess the efficacy of your preventive programs as well in order to have a complete picture of your exposure — essentially the inverse of XDR.

There is no question that the data generated by preventive security tools is by far the best for attempting to measure exposure. The problem has always been that preventive security tools provide tons of information highlighting everything wrong within the silo they are assessing. There is too much information for your organization to address. Because there’s so much data being generated by these various tools, you typically have little option but to dump the data into spreadsheets, validating the old joke that Excel is the most widely used security tool in the world.

In recent years, there have been tools that have aggregated data in an attempt to prioritize what work you should focus on to be more secure. Are any of these tools successful in helping organizations actively reduce risk? Not really. The reason, again, is that these tools offer only a limited scope of the problem. For example, they may only aggregate software vulnerability data from a number of different tools with no other context and come up with a formula to tell people which software to patch first. While identifying and patching software vulnerabilities is critical to good cyber hygiene, it cannot be the only way you measure and remediate risk.

Effectively measuring security posture doesn’t happen in a vacuum. It would be disingenuous of us — or any vendor — to suggest that an exposure management program can be built on a limited set of inputs. It requires collecting data — drawn from a range of tools — to be able to apply the necessary depth of analytics to the full breadth of an organization’s environment.

Here is the truth of the matter: Looking at your software vulnerabilities alone doesn’t give you a complete picture of your cyber risk. Just as you can’t look at your attack surface in a vacuum, you can’t look at vulnerabilities, misconfigurations, etc., in a vacuum. Context counts. You need the ability to see your entire attack surface holistically. You need to see all of your software vulnerabilities, misconfigurations, who is using what systems and what level of access they have all correlated together, regardless of whether it’s happening on a laptop, a container, an application or a programmable logic controller (PLC).

For example, let’s say your organization has two laptops that have the worst possible vulnerability in the world on them. Viewed through siloed tools, you’d reasonably assume both are equally bad and equally putting your organization at risk and that you need to fix both of them ASAP.

In this example, how would you know whether the organization is really at risk and which laptop to fix first? Well, what if you could see that one of those laptops is being used by the company’s Salesforce admin, and she is also not using multi-factor authentication (MFA)? And that the other laptop is used by the guy who works at the front desk, checks IDs and has access to nothing else. Suddenly, with added context, you can make informed decisions about what to prioritize.

This is a very basic example of the difference between exposure management and vulnerability management and serves to show what’s possible when your organization can start to bring together, correlate, measure and prioritize data that comes from preventive security tools.

위험 노출 관리는 보안에 대한 접근 방식에 패러다임의 변화입니다

When you consider your own massive and complex attack surface — and the thousands of issues and alerts coming at you every day, requiring you to make constant decisions on prioritization — it becomes clear that concise, meaningful and impactful output is what you need in order to perform to the best of your abilities. You need data that shows you the full breadth of your attack surface and the full depth of analytics.

Understanding the full breadth of the attack surface requires visibility and insights into:

Understanding the full depth of the attack surface requires visibility and insights into:

All of the above was factored into the thinking behind the acquisitions Tenable has made to date and, we believe, it’s the kind of thinking that will ultimately transform how organizations of all sizes approach cybersecurity. There’s more to the attack surface, though, and to perform exposure management effectively you need to be able to ingest data from other security solutions. We at Tenable recognize that and we welcome the opportunity to work with other vendors on making this vision a reality.

Tenable One - 위험 노출 관리 플랫폼은 Tenable 비전의 자연스러운 진화를 보여줍니다.이것은 전략적이고 장기적인 사이버 보안 접근 방식으로, 전 세계 조직의 위험 관리 방식을 변화시킬 준비가 되어 있습니다.

자세히 알아보기

관련 기사

도움이 되는 사이버 보안 뉴스

이메일을 입력하여 Tenable 전문가에게서 적시에 알림을 받고 보안 참고 자료를 놓치지 마십시오.

Tenable Vulnerability Management

비교할 수 없는 정확도로 모든 자산을 확인하고 추적할 수 있는 최신 클라우드 기반 취약성 관리 플랫폼 전체에 액세스하십시오.

Tenable Vulnerability Management 평가판은 Tenable Lumin 및 Tenable Web App Scanning을 포함합니다.

Tenable Vulnerability Management

비교할 수 없는 정확도로 모든 자산을 확인하고 추적할 수 있는 최신 클라우드 기반 취약성 관리 플랫폼 전체에 액세스하십시오. 지금 연간 구독을 구매하십시오.

100 자산

구독 옵션 선택:

지금 구매

Tenable Vulnerability Management

비교할 수 없는 정확도로 모든 자산을 확인하고 추적할 수 있는 최신 클라우드 기반 취약성 관리 플랫폼 전체에 액세스하십시오.

Tenable Vulnerability Management 평가판은 Tenable Lumin 및 Tenable Web App Scanning을 포함합니다.

Tenable Vulnerability Management

비교할 수 없는 정확도로 모든 자산을 확인하고 추적할 수 있는 최신 클라우드 기반 취약성 관리 플랫폼 전체에 액세스하십시오. 지금 연간 구독을 구매하십시오.

100 자산

구독 옵션 선택:

지금 구매

Tenable Vulnerability Management

비교할 수 없는 정확도로 모든 자산을 확인하고 추적할 수 있는 최신 클라우드 기반 취약성 관리 플랫폼 전체에 액세스하십시오.

Tenable Vulnerability Management 평가판은 Tenable Lumin 및 Tenable Web App Scanning을 포함합니다.

Tenable Vulnerability Management

비교할 수 없는 정확도로 모든 자산을 확인하고 추적할 수 있는 최신 클라우드 기반 취약성 관리 플랫폼 전체에 액세스하십시오. 지금 연간 구독을 구매하십시오.

100 자산

구독 옵션 선택:

지금 구매

Tenable Web App Scanning 사용해보기

Tenable One - 위험 노출 관리 플랫폼의 일부분으로 최근의 애플리케이션을 위해 설계한 최신 웹 애플리케이션 제공 전체 기능에 액세스하십시오. 많은 수작업이나 중요한 웹 애플리케이션 중단 없이, 높은 정확도로 전체 온라인 포트폴리오의 취약성을 안전하게 스캔합니다. 지금 등록하십시오.

Tenable Tenable Web App Scanning 평가판은 Tenable Lumin 및 Tenable Web App Scanning을 포함합니다.

Tenable Web App Scanning 구입

비교할 수 없는 정확도로 모든 자산을 확인하고 추적할 수 있는 최신 클라우드 기반 취약성 관리 플랫폼 전체에 액세스하십시오. 지금 연간 구독을 구매하십시오.

5 FQDN

$3,578

지금 구매

Tenable Lumin 사용해 보기

Tenable Lumin으로 위험 노출 관리를 시각화하여 파악하고 시간에 걸쳐 위험 감소를 추적하고 유사한 조직과 대비하여 벤치마킹하십시오.

Tenable Lumin 평가판은 Tenable Lumin 및 Tenable Web App Scanning을 포함합니다.

Tenable Lumin 구매

영업 담당자에게 문의하여 어떻게 Tenable Lumin이 전체 조직에 대한 통찰을 얻고 사이버 위험을 관리하는 도움이 되는지 알아보십시오.

무료로 Tenable Nessus Professional 사용해보기

7일 동안 무료

Tenable Nessus는 현재 구입 가능한 가장 종합적인 취약성 스캐너입니다.

신규 - Tenable Nessus Expert
지금 사용 가능

Nessus Expert는 외부 공격 표면 스캔닝과 같은 더 많은 기능 및 도메인을 추가하고 클라우드 인프라를 스캔하는 기능을 추가합니다. 여기를 클릭하여 Nessus Expert를 사용해보십시오.

아래 양식을 작성하여 Nessus Pro 평가판을 사용해보십시오.

Tenable Nessus Professional 구입

Tenable Nessus는 현재 구입 가능한 가장 종합적인 취약성 스캐너입니다. Tenable Nessus Professional은 취약성 스캔 절차를 자동화하고 컴플라이언스 주기의 시간을 절감하고 IT 팀과 참여할 수 있도록 합니다.

여러 해 라이선스를 구매하여 절감하십시오. 연중무휴 전화, 커뮤니티 및 채팅 지원에 액세스하려면 Advanced 지원을 추가하십시오.

라이선스 선택

여러 해 라이선스를 구매하여 절감하십시오.

지원 및 교육 추가

무료로 Tenable Nessus Expert 사용해보기

7일간 무료

최신 공격 표면을 방어하기 위해 구축된 Nessus Expert를 사용하면 IT부터 클라우드까지, 더 많은 것을 모니터링하고 조직을 취약성으로부터 보호할 수 있습니다.

이미 Tenable Nessus Professional을 보유하고 계십니까?
7일간 Nessus Expert로 무료 업그레이드하십시오.

Tenable Nessus Expert 구입

최신 공격 표면을 방어하기 위해 구축된 Nessus Expert를 사용하면 IT부터 클라우드까지, 더 많은 것을 모니터링하고 조직을 취약성으로부터 보호할 수 있습니다.

라이선스 선택

여러 해 라이선스를 구매하여 비용을 더 절감하십시오.

지원 및 교육 추가