By Tom McNichol, Workflow contributor
One way to secure an organization is to defend and manage the attack surface: the sum of all points where an intruder can enter an organization’s network. The attack surface includes every digital asset that has to be defended—software, servers, routers, switches, network connections, desktops, laptops, mobile devices, and all points of interaction with users.
“The better you get as an organization at reducing your attack surface, the more you lower your risk of attack,” says Sean Convery, VP and GM, Security & Risk Business Unit at ServiceNow. “The question organizations have to answer is: What does it take to launch that virtuous cycle and keep the attack surface under control?”
The job has grown more challenging in recent years, in large part because for many companies the attack surface has exploded in size. New technologies such as cloud computing, mobile devices, and the Internet of Things have dissolved the perimeter that used to separate an organization’s digital assets from the outside world. As a result, the typical company’s attack surface now extends to the outer reaches of the internet.
In a large organization, there can be tens of millions of different digital assets. Every time a company deploys or modifies an application, adds or removes servers, connects or disconnects new mobile devices, or reconfigures networks, the size and complexity of the attack surface increases.
“Each new widget, from the smart thermostat to the networked DVR to a security camera, represents a potential target and attack vector for hackers to exploit,” says Steve Ginty, a senior product manager at RiskIQ, a San Francisco–based cybersecurity firm. A 2018 Study by the firm recorded nearly 250,000 new domains and 5.5 million new hosts per day across the internet over a two‑week period.
At the same time, many IT and security teams are losing control over the attack surface. “With everyone bringing their own device and the proliferation of cloud services, IT no longer completely controls the security environment,” says John Pescatore, a director at SANS Institute who has more than three decades of experience in network and data security.
The problem will only get worse as the Internet of Things goes mainstream. Already 127 new IoT devices are being connected every second, according to a 2018 McKinsey study. Many of those newly connected devices aren’t designed with strong security in mind. They run a wide range of operating systems and applications, making the attack surface even harder to defend.
So how are smart organizations meeting this challenge? One long‑standing security strategy still holds true: wherever possible, shrink the attack surface.
Related