Here is a number that should concern every security leader: one in two vulnerabilities found in production environments today did not exist twelve months ago. The attack surface is not static. It is a living, shifting landscape of new services, fresh code deployments, third-party integrations, and shadow IT that appears faster than any quarterly scan cycle can track. Point-in-time security testing, the annual pentest followed by months of assumed safety, was designed for a world that no longer exists.
Gartner recognized this gap and introduced Continuous Threat Exposure Management (CTEM) as a strategic framework to replace the outdated assess-and-patch model. Their prediction is bold: by 2026, organizations that prioritize security investments based on a CTEM program will be three times less likely to suffer a breach. That prediction is now due, and the data is proving Gartner right.
This article breaks down the CTEM framework, explains why it matters more than traditional vulnerability management, walks through each of the five stages with practical implementation guidance, and shows how to start building a CTEM program with the tools you likely already have.
What Is Continuous Threat Exposure Management?
CTEM is a five-stage cyclical framework that Gartner first described in their July 2022 report, "Implement a Continuous Threat Exposure Management (CTEM) Program." Unlike traditional vulnerability management, which focuses on finding and patching known CVEs, CTEM takes a broader view of exposure. It asks: what can an attacker actually reach, exploit, and leverage to damage this organization?
The distinction matters. A vulnerability scanner finds a missing patch. A CTEM program finds that the missing patch exists on an internet-facing server that handles customer payment data, that the server has network paths to your internal Active Directory, and that exploiting the vulnerability would give an attacker domain admin credentials within three lateral moves. One is a finding. The other is a business risk that demands immediate action.
Gartner's definition: "CTEM is a pragmatic and systemic approach to continuously refine security optimization priorities. It involves scoping the attack surface, validating how it can be exploited, and mobilizing teams to address the most critical exposures. CTEM moves beyond periodic assessments toward a continuous cycle of improvement."
The framework is intentionally vendor-agnostic. It does not prescribe specific tools. Instead, it describes a process that organizations can implement using combinations of existing security technologies, new purpose-built platforms, and operational workflows. The five stages, Scoping, Discovery, Prioritization, Validation, and Mobilization, form a continuous loop that repeats and refines over time.
Why Point-in-Time Testing Is Dying
The traditional model of annual penetration testing served organizations well for decades. You hired a firm, they tested for two weeks, delivered a report, and you spent the next few months remediating findings. Then you waited until next year and repeated the cycle. The problem is that this model assumes your environment stays roughly the same between tests. That assumption has been demolished.
The Velocity Problem
Modern development teams deploy code multiple times per day. Cloud infrastructure scales up and down automatically. New SaaS applications are adopted by business units without security review. APIs are published, modified, and deprecated on weekly cycles. Mergers and acquisitions bring entire unknown technology stacks into your environment overnight. In this reality, a security assessment conducted in January tells you almost nothing about your exposure in July.
Consider the math. If your organization deploys code 200 times per month and each deployment has even a small probability of introducing a security issue, the cumulative risk between annual assessments is enormous. You are not testing your actual environment. You are testing a historical snapshot that ceased to exist the moment the pentest ended.
The Coverage Problem
Point-in-time testing has inherent scope limitations. A two-week penetration test cannot cover every application, every API endpoint, every network segment, and every cloud configuration in a modern enterprise. Testers focus on the highest-risk areas, which means significant portions of the attack surface go unexamined. Shadow IT, third-party integrations, and newly deployed services are often excluded entirely because nobody knows they exist at scoping time.
The Prioritization Problem
Traditional vulnerability management relies heavily on CVSS scores to prioritize remediation. A critical CVSS score triggers an urgent response. A medium score goes into the backlog. But CVSS measures theoretical severity in isolation. It does not consider whether the vulnerability is actually reachable from the internet, whether compensating controls mitigate the risk, or whether the affected system contains data worth stealing. The result is security teams burning cycles on high-CVSS vulnerabilities that pose minimal real risk while ignoring medium-CVSS issues that represent actual attack paths to critical assets.
The gap in numbers: Research from Mandiant shows that the average time from vulnerability disclosure to exploitation by threat actors has dropped to under 5 days. Annual testing cycles leave 360 days of exposure. Even quarterly testing leaves organizations blind for roughly 80 days between assessments, an eternity in the current threat landscape.
CTEM vs Traditional Vulnerability Management
The shift from traditional vulnerability management to CTEM is not just a process upgrade. It is a philosophical change in how organizations think about security risk.
Traditional vulnerability management is reactive. It waits for scanners to find known vulnerabilities, assigns CVSS-based severity, and creates tickets for IT teams to patch. The focus is on the vulnerability itself: what is the CVE, what is the score, which patch fixes it. Success is measured by the number of vulnerabilities remediated and the average time to patch.
CTEM is proactive and business-aligned. It starts by asking what the organization needs to protect, discovers all the ways those assets are exposed, prioritizes based on actual business impact and exploitability, validates that the exposures are real through offensive testing, and then mobilizes cross-functional teams to reduce exposure. Success is measured by actual risk reduction, not patch counts.
The differences are concrete:
- Scope: Vulnerability management covers known IT assets. CTEM covers everything an attacker could target, including SaaS applications, supply chain dependencies, brand impersonation, and human attack surfaces like social engineering.
- Discovery: Vulnerability management scans known IP ranges. CTEM uses attack surface management to continuously discover assets the organization does not know about.
- Prioritization: Vulnerability management ranks by CVSS. CTEM ranks by business context, exploitability, and attacker perspective.
- Validation: Vulnerability management assumes scanner findings are accurate. CTEM validates findings through penetration testing, red teaming, and breach simulation to confirm what is actually exploitable.
- Remediation: Vulnerability management creates tickets. CTEM mobilizes cross-team workflows with clear ownership, deadlines, and verification.
The 5 Stages of CTEM Explained
Each stage of the CTEM framework addresses a specific gap in how organizations traditionally manage security risk. Understanding each stage is essential to implementing the framework effectively.
Stage 1: Scoping
Scoping is where most organizations get CTEM wrong, because they default to what they already know. Traditional scoping starts with the asset inventory: servers, applications, network segments. CTEM scoping starts with the business: what does the organization need to protect, and what would an attacker target?
Effective CTEM scoping includes asset categories that traditional programs miss:
- SaaS applications: Your organization probably uses 200+ SaaS tools. Each one contains company data, has its own authentication model, and represents a potential entry point. Most are adopted without security review.
- Supply chain and third parties: Your vendors have access to your data, your networks, and your customers. A breach at a critical supplier is effectively a breach at your organization. Scoping must include the third-party attack surface.
- Brand and digital presence: Attackers create lookalike domains, fake social media profiles, and counterfeit mobile apps to phish your customers and employees. Brand impersonation is an exposure that traditional vulnerability management ignores entirely.
- Human attack surface: Employees with excessive access, weak authentication, or susceptibility to social engineering are exposures. Scoping should consider role-based risk, not just technical assets.
- Code repositories and CI/CD: Source code, build pipelines, and deployment configurations are high-value targets. Exposed secrets in repositories, misconfigured pipelines, and insufficient access controls represent significant exposure.
The scoping exercise should produce a prioritized list of exposure surfaces aligned to business risk. Not everything can be monitored continuously from day one. Start with the surfaces that would cause the most damage if compromised and expand from there.
Stage 2: Discovery
Discovery answers a deceptively simple question: what do we actually have? The gap between what organizations think they have and what actually exists on the internet is consistently alarming. In our experience running attack surface management programs, clients typically discover 30-40% more internet-facing assets than their internal inventories account for.
Effective discovery combines multiple techniques:
- External attack surface management (EASM): Automated, continuous discovery of all internet-facing assets associated with your organization, including subdomains, IP ranges, cloud services, and exposed APIs. This is the foundation of CTEM discovery.
- Shadow IT detection: Identifying SaaS applications, cloud accounts, and services that business units have adopted without IT or security approval. CASB tools and network traffic analysis help, but employee surveys and department audits are equally valuable.
- API discovery: Finding all APIs your organization exposes, including undocumented, deprecated, and test APIs that were never intended for production use. API security starts with knowing what APIs exist.
- Cloud asset inventory: Enumerating resources across all cloud providers and accounts, including those created by development teams for testing. Orphaned cloud resources with default configurations are a common exposure.
- Credential exposure monitoring: Checking dark web marketplaces, paste sites, and breach databases for leaked credentials belonging to your employees. Exposed credentials are the most direct path into your environment.
Discovery is not a one-time activity. It must run continuously because the attack surface changes daily. New assets appear, old ones are decommissioned (or forgotten), and configurations drift over time.
Stage 3: Prioritization
Discovery will produce an overwhelming number of findings. A typical mid-size organization might surface thousands of potential exposures across their entire attack surface. Attempting to fix everything simultaneously is impossible. Prioritization determines what gets addressed first.
CTEM prioritization diverges from traditional approaches by incorporating business context:
- Exploitability: Is there a known exploit? Is it being actively exploited in the wild? Can it be exploited remotely without authentication? A theoretical vulnerability with no known exploit is lower priority than one with a Metasploit module.
- Asset value: What data does the affected system process? Is it customer PII, payment card data, intellectual property, or internal documentation? The same vulnerability on a marketing blog and a payment processing server represents vastly different risk levels.
- Attack path analysis: Does exploiting this vulnerability lead anywhere useful for an attacker? A vulnerability on an isolated system with no network connectivity to sensitive assets is lower priority than one that provides a stepping stone to the crown jewels.
- Compensating controls: Are there existing controls that mitigate the risk? Web application firewalls, network segmentation, monitoring, and access controls all affect the real-world exploitability of a finding.
- Threat intelligence: Are threat actors actively targeting this type of vulnerability in your industry? A vulnerability being exploited in campaigns targeting healthcare organizations is higher priority for a hospital than for a retail company.
Prioritization in practice: CVSS gives a Log4Shell vulnerability a 10.0 on every system it affects. CTEM-based prioritization recognizes that the Log4Shell instance on your internet-facing payment gateway is an emergency, while the one on an internal development server behind three layers of network segmentation is important but not urgent. Same CVE, same CVSS, completely different business risk.
Stage 4: Validation
Validation is what separates CTEM from theoretical risk management. It answers the critical question: can an attacker actually exploit this exposure to cause harm? Scanners and automated tools generate findings. Validation proves which findings represent real, exploitable attack paths.
Validation takes multiple forms:
- Penetration testing: Skilled testers attempt to exploit discovered exposures in a controlled manner. Continuous penetration testing aligned with development cycles validates new code and configuration changes as they are deployed.
- Red teaming: Full-scope adversary simulation that tests the entire security program, including detection and response capabilities. Red teams do not just find vulnerabilities; they demonstrate complete attack chains from initial access to objective completion.
- Breach and attack simulation (BAS): Automated tools that continuously run known attack techniques against your production environment to verify that security controls detect and block them. BAS validates that your defenses work as expected.
- Attack path validation: Mapping and testing the lateral movement paths that connect initial access points to high-value targets. This validates whether an attacker who compromises a low-value system can actually reach sensitive data or critical infrastructure.
Validation typically eliminates a significant percentage of theoretical findings. In our experience, 40-60% of scanner-reported critical vulnerabilities either cannot be exploited in the target environment due to compensating controls, or lead to dead ends that do not provide meaningful attacker advantage. Without validation, security teams waste enormous effort on non-issues while real attack paths remain open.
Stage 5: Mobilization
Mobilization is the stage where CTEM delivers its actual value, and where most security programs fail. Finding vulnerabilities is easy. Getting them fixed is hard. Mobilization is the process of translating validated security findings into actions that the right teams execute within acceptable timeframes.
Effective mobilization requires:
- Clear ownership: Every validated finding must have a named owner responsible for remediation. "The development team" is not an owner. A specific engineer or team lead with the authority and access to make the fix is an owner.
- Context-rich tickets: Remediation tickets must include enough context for the fixer to act without extensive back-and-forth. This means the business risk, the technical details of the vulnerability, the validated exploit path, and the recommended fix, not just a CVE number and a CVSS score.
- SLA-based timelines: Remediation deadlines based on validated risk level. Critical, exploitable findings affecting customer data get 48-hour SLAs. Validated but lower-risk findings get 30-day SLAs. Theoretical findings that could not be validated get 90-day SLAs.
- Verification: After remediation, the fix is validated to confirm the exposure is actually closed. This prevents the common scenario where a patch is applied but the vulnerability persists due to a configuration issue or incomplete deployment.
- Cross-team workflows: Security findings often require action from development, infrastructure, cloud, and vendor management teams. Mobilization workflows must cross organizational boundaries with escalation paths when SLAs are at risk.
The mobilization stage also feeds back into scoping. Patterns in validated findings reveal systemic issues: recurring misconfigurations suggest a need for better deployment templates, frequent authentication issues point to identity management gaps, and repeated supply chain findings indicate vendor management needs improvement. These patterns inform the next scoping cycle, making CTEM progressively more effective.
The Gartner Prediction: 3x Less Likely to Suffer a Breach
Gartner's prediction that organizations prioritizing CTEM would be three times less likely to suffer a breach by 2026 was considered aggressive when it was published. The reasoning behind it, however, is straightforward.
Most breaches exploit known issues. They target unpatched vulnerabilities, misconfigured services, exposed credentials, and forgotten assets. These are exactly the exposures that a functioning CTEM program continuously discovers, validates, and remediates. An organization running a mature CTEM program has a dramatically smaller and better-defended attack surface than one relying on annual assessments.
The evidence supports the prediction. Organizations that have adopted continuous security testing and attack surface management report measurably fewer incidents than those using periodic assessment models. The improvement comes not from any single tool or technique but from the systematic, continuous nature of the process. Exposures are found faster, validated more accurately, and fixed more quickly because the entire cycle runs continuously rather than annually.
Key insight: The 3x reduction is not about finding more vulnerabilities. Organizations running CTEM programs often find fewer total vulnerabilities because they are fixing issues before scanners even detect them. The reduction comes from shorter exposure windows, better prioritization, and faster remediation of the vulnerabilities that actually matter.
How CTEM Maps to Existing Tools
One of the strengths of the CTEM framework is that it does not require ripping out your existing security stack. Most organizations already have tools that map to CTEM stages. The framework provides a structure for using them more effectively together.
- Scoping: GRC platforms, asset management databases, business impact analyses. If you have a risk register, you have a starting point for scoping.
- Discovery: Attack surface management (ASM) platforms, vulnerability scanners, CASB tools, cloud security posture management (CSPM). ASM is the most critical addition for organizations that lack external discovery capabilities.
- Prioritization: Risk-based vulnerability management platforms, threat intelligence feeds, asset criticality databases. The key is integrating these data sources to produce business-context-aware prioritization rather than raw CVSS rankings.
- Validation: Penetration testing (PTaaS), red teaming services, breach and attack simulation tools, attack path modeling platforms. PTaaS platforms provide the continuous validation that CTEM requires.
- Mobilization: Ticketing systems (Jira, ServiceNow), SOAR platforms, DevSecOps pipeline integrations. The tooling exists; the process and accountability structures around it usually need improvement.
The most common gap is between discovery and validation. Organizations may have vulnerability scanners (discovery) and ticketing systems (mobilization), but lack the attack surface management and continuous penetration testing capabilities that CTEM requires for its discovery and validation stages.
Building a CTEM Program: Start Small, Iterate, Measure
Implementing a full CTEM program across the entire organization simultaneously is a recipe for failure. The most successful implementations start with a focused scope and expand as the process matures.
Phase 1: External Attack Surface (Months 1-3)
Start with what an attacker sees first: your external attack surface. Deploy an attack surface management solution to continuously discover internet-facing assets. Combine this with external penetration testing to validate the most critical findings. This provides immediate visibility into your highest-risk exposure and demonstrates quick wins that build organizational support for the broader program.
Key metrics for Phase 1:
- Number of previously unknown external assets discovered
- Time from asset deployment to security visibility
- Number of validated exploitable findings on external assets
- Mean time to remediate validated external findings
Phase 2: Web Applications and APIs (Months 3-6)
Expand the program to cover your web application and API portfolio. This is where most customer-facing risk lives. Implement continuous application security testing, including authenticated scanning and regular penetration testing aligned with release cycles. Prioritize applications that process sensitive data or support critical business functions.
Phase 3: Cloud and Identity (Months 6-9)
Extend CTEM to cover cloud infrastructure configuration, identity and access management, and internal network exposure. Cloud misconfigurations and excessive access privileges are among the most common validated findings in CTEM programs. This phase typically requires cloud security posture management (CSPM) tools and identity threat detection capabilities.
Phase 4: Full Scope and Optimization (Months 9-12)
In the final phase, expand to cover supply chain risk, brand exposure, and the human attack surface. Integrate threat intelligence feeds for industry-specific prioritization. Optimize mobilization workflows based on lessons learned from earlier phases. Establish executive reporting that translates CTEM metrics into business risk language.
Measuring CTEM Effectiveness
The right metrics prove that CTEM is reducing actual risk, not just generating activity:
- Mean time to discover (MTTD): How quickly new exposures are identified after they appear. This should decrease as the program matures.
- Mean time to validate (MTTV): How quickly discovered exposures are confirmed as exploitable or dismissed. This tracks the efficiency of the validation stage.
- Mean time to remediate (MTTR): How quickly validated exposures are fixed. Segment this by severity to ensure critical findings are addressed within SLAs.
- Exposure window: The total time an exploitable vulnerability exists in the environment, from introduction to remediation. This is the single most important metric because it directly correlates with breach probability.
- Validation elimination rate: The percentage of scanner findings that validation proves are not exploitable. A high elimination rate means your team is focusing effort on real risks rather than theoretical ones.
How Lorikeet's ASM + PTaaS Platform Enables CTEM
Building a CTEM program requires tooling that covers continuous discovery and continuous validation. These are the two stages most organizations lack, and they are the two stages that differentiate CTEM from traditional vulnerability management.
Lorikeet Security's platform addresses both:
- Attack Surface Management: Our ASM platform provides continuous external discovery, identifying subdomains, cloud assets, exposed services, and shadow IT as it appears. Discovery runs daily, not quarterly, ensuring your asset inventory stays current with your actual attack surface.
- PTaaS for Validation: Our penetration testing as a service platform provides continuous security validation aligned with your development and deployment cycles. Findings are validated by experienced penetration testers who confirm exploitability, map attack paths, and provide remediation guidance with full business context.
- Integrated Prioritization: Findings from ASM and PTaaS are combined with business context and threat intelligence to produce risk-ranked exposure views. You see what matters most, not what has the highest CVSS score.
- Mobilization Workflows: Validated findings flow directly into remediation workflows with clear ownership, SLA tracking, and verification testing. When a fix is deployed, we retest to confirm the exposure is closed.
The platform is designed to implement the CTEM cycle continuously and automatically, from discovery through validation to mobilization, so your security team can focus on reducing exposure rather than managing tools.
Sources
- Gartner - How to Manage Cybersecurity Threats, Not Episodes
- Gartner - Top Cybersecurity Predictions 2023-2024
- Mandiant - Time Between Disclosure and Exploitation Is Shrinking
- Google Cloud Threat Intelligence - Time-to-Exploit Trends
- Gartner - Implement a Continuous Threat Exposure Management (CTEM) Program
- Forrester - The Forrester Wave: Attack Surface Management Solutions
Start Building Your CTEM Program
Lorikeet's integrated ASM and PTaaS platform gives you continuous discovery and validation, the two capabilities most organizations need to implement CTEM. See your real attack surface and prove what is actually exploitable.
Talk to Our Team Explore ASM Platform