Attack Surface Management: Why You Can't Secure What You Can't See | Lorikeet Security Skip to main content
Back to Blog

Attack Surface Management: Why You Can't Secure What You Can't See

Lorikeet Security Team March 8, 2026 11 min read

Ask any IT team how many internet-facing assets their company has, and they will give you a number. Run an attack surface management scan, and you will get a different, larger number. The gap between what organizations think is exposed and what is actually exposed is where breaches happen.

This is not a theoretical problem. Forgotten subdomains running outdated software, staging environments with production database connections, APIs that were supposed to be internal-only, cloud storage buckets with public access -- these are the assets that attackers find and exploit while your security team focuses on protecting the front door.


What Attack Surface Management Actually Does

Attack surface management is the continuous process of discovering, inventorying, classifying, and monitoring all externally-facing assets associated with your organization. The emphasis is on "continuous" and "all." Traditional asset management relies on teams to register what they deploy. ASM works in the opposite direction -- it starts from the outside and discovers everything connected to your organization, regardless of whether anyone documented it.

The ASM Process

  1. Discovery. Starting from your known domains, IP ranges, and cloud accounts, ASM tools enumerate subdomains, resolve DNS records, scan IP ranges, identify web applications, detect open ports and services, and map relationships between assets. This process discovers assets that no one on your team may know exist
  2. Inventory and classification. Each discovered asset is cataloged with metadata: technology stack, open ports, SSL certificate status, web application frameworks, hosting provider, and association with your organization. Assets are classified by type (web application, API endpoint, mail server, etc.) and business criticality
  3. Vulnerability assessment. Discovered assets are scanned for known vulnerabilities, misconfigurations, expired certificates, exposed sensitive data, and other security issues. This is not the same as a penetration test -- it is automated reconnaissance that identifies the low-hanging fruit attackers look for first
  4. Continuous monitoring. The discovery and assessment cycle runs continuously, detecting new assets as they appear, identifying changes to existing assets, and alerting when new vulnerabilities affect your infrastructure. This catches the staging server that an engineer spun up on Friday and forgot about by Monday

Why Traditional Asset Inventories Fail

Most organizations maintain some form of asset inventory -- a spreadsheet, a CMDB, an entry in their cloud console. The problem is that these inventories are only as complete as the humans maintaining them, and humans are inconsistent about documentation.

The Sources of Unknown Assets

The discovery gap: Research consistently shows that organizations underestimate their external attack surface by 30-40%. For a company that believes it has 200 internet-facing assets, ASM typically discovers 260-280. Those 60-80 unknown assets represent unpatched, unmonitored, and unprotected entry points that attackers can exploit.


What ASM Typically Finds

After running thousands of ASM scans across organizations of varying sizes and industries, certain patterns emerge consistently. Here are the most common categories of findings.

Finding Category Frequency Risk Level
Forgotten subdomains Found in 85%+ of scans High -- often running outdated software
Exposed admin panels Found in 60%+ of scans Critical -- direct path to compromise
Expired SSL certificates Found in 70%+ of scans Medium -- enables MitM attacks
Exposed development environments Found in 45%+ of scans Critical -- often have weaker controls
Dangling DNS records Found in 50%+ of scans High -- subdomain takeover risk
Exposed API endpoints Found in 55%+ of scans High -- often lack authentication
Open database ports Found in 20%+ of scans Critical -- direct data access

Real-World Discovery Examples

A SaaS company with 150 employees believed they had 47 internet-facing assets. An ASM scan discovered 83. The additional assets included a forgotten WordPress blog on a subdomain running a three-year-old PHP version, a Jenkins server accessible from the internet with default credentials, four staging environments with database connections to production replicas, and a decommissioned marketing microsite still serving pages with an outdated JavaScript framework containing known XSS vulnerabilities.

None of these appeared in the company's asset inventory. All of them represented viable attack paths.


ASM and Compliance: A Natural Fit

Attack surface management directly supports multiple compliance framework requirements, making it valuable beyond pure security posture improvement.

SOC 2

SOC 2 CC3.2 requires organizations to identify and assess risks, including risks from external threats. CC6.1 requires logical access security over all information assets. ASM provides evidence that you have identified all external assets and are monitoring them for security issues, directly supporting these control requirements.

PCI DSS

PCI DSS Requirement 11 requires regular vulnerability scanning of all in-scope systems. ASM ensures your vulnerability scanning program covers all assets that are actually in scope, not just the ones you know about. It also supports Requirement 2 (not using vendor-supplied defaults) by identifying systems with default configurations.

ISO 27001

ISO 27001 Annex A 5.9 requires an inventory of information and other associated assets. Annex A 8.8 requires management of technical vulnerabilities. ASM provides the asset discovery foundation that makes both controls effective rather than aspirational.

Cloud Security

For organizations operating in multi-cloud environments, ASM provides visibility that no single cloud provider's native tools can offer. A cloud security assessment identifies misconfigurations within your cloud accounts, while ASM identifies what those cloud resources look like from the outside.


How ASM Integrates with Penetration Testing

ASM and penetration testing serve complementary purposes. ASM provides breadth -- continuous visibility across your entire external attack surface. Penetration testing provides depth -- expert-driven exploitation of specific systems to identify vulnerabilities that automated scanning cannot detect.

The Combined Approach

  1. ASM discovers the full scope. Before a penetration test, ASM identifies all assets that should be in scope, preventing the common problem of testing only known systems while unknown assets remain vulnerable
  2. Pentest findings inform ASM monitoring. When a penetration test identifies a vulnerability class (e.g., misconfigured CORS policies), ASM monitoring rules can be updated to detect similar issues across all assets continuously
  3. ASM validates remediation. After a penetration test, ASM continuously monitors remediated findings to ensure they do not regress. A patched vulnerability that reappears after a deployment is caught immediately rather than waiting for the next annual pentest
  4. ASM provides ongoing coverage between tests. Annual penetration tests are snapshots. ASM provides the continuous monitoring between those snapshots, catching new exposures as they emerge

Lorikeet Security's Offensive Security Bundle at $37,500 per year includes both ASM and penetration testing: two web application pentests, one network penetration test, one API assessment, quarterly vulnerability scanning, and continuous attack surface management through the client portal. This combination ensures you have both the breadth of continuous monitoring and the depth of expert-driven testing.


Choosing an ASM Solution

The ASM market ranges from enterprise platforms costing $100K+ per year to lightweight monitoring tools for smaller organizations. The right choice depends on your organization's size, complexity, and security maturity.

Factor Entry-Level ASM Professional ASM Enterprise ASM
Typical cost $30 - $100/mo $200 - $500/mo $50K - $200K+/yr
Best for Startups, small teams Mid-market companies Large enterprises
Discovery depth Subdomain + port scanning Full reconnaissance Full recon + dark web
Reporting Basic alerts Executive reports Custom dashboards
Integration Email/webhook alerts SIEM, ticketing, Slack Full API, custom workflows

Lorikeet Security offers ASM at two tiers designed for organizations that want real security value without enterprise pricing:

Both tiers are included in the Offensive Security Bundle and the Full Stack Bundle, so organizations that purchase those packages get ASM as part of their comprehensive security program.


Getting Started: Your First ASM Assessment

You do not need to deploy a full ASM platform to understand your attack surface. A one-time assessment can reveal the scope of your exposure and inform decisions about ongoing monitoring.

What to Expect from an Initial Assessment

This initial assessment typically takes one to two weeks and provides the baseline that continuous monitoring builds upon. For many organizations, the initial assessment alone justifies the investment by identifying critical exposures that would otherwise remain invisible until an attacker finds them.

Discover Your Real Attack Surface

Start with ASM Personal at $29.99 per month for continuous asset discovery and vulnerability monitoring, or talk to us about a comprehensive attack surface assessment.

-- views
Link copied!
Lorikeet Security

Lorikeet Security Team

Penetration Testing & Cybersecurity Consulting

We've completed 170+ security engagements across web apps, APIs, cloud infrastructure, and AI-generated codebases. Everything we publish here comes from patterns we see in real client work.

Lory waving

Hi, I'm Lory! Need help finding the right service? Click to chat!