The continuous threat exposure management (CTEM) model offers tremendous benefits to any organization implementing it. As we covered in the first and second chapters of this series, CTEM is a way of organizing cybersecurity activities that results in faster, more secure digitalization and adoption of software-as-a-service (SaaS)/cloud services, easier cyber due diligence around mergers and acquisitions (M&A), improved response times and mean time to repair (MTTR), validation of current and future investments, and more.
In this blog, we’ll discuss some of the challenges of implementing CTEM as well as the different tools and approaches that teams can leverage as a part of the validation phase.
Because CTEM is a new model, a practical implementation can be fraught with several challenges. As it becomes more widely adopted, teams will start to understand how to better optimize this program to suit their specific tooling and organization. For now, some of the most common challenges include:
Many of these challenges can be mitigated by selecting tools to help with implementation that incorporate the following key aspects:
Because CTEM doesn’t prescribe specific tool sets, organizations have the flexibility to leverage different types of tools and techniques to support each phase. When it comes to the validation phase, these tools include:
However, not all of the tools above may be appropriate for each organizational environment or the goals you are trying to accomplish within your security program.
Several validation processes deliver an “outside-in” view of your organization’s environment and attack surface, but only for the duration of the exercise (in other words, a single point-in-time). Results technically become outdated the second testing ends. Remember, the first part of ‘CTEM’ is continuous.
Point-in-time validation methods include:
In pen testing, security analysts mimic hacker tactics to mount cyberattacks against production systems to discover potential vulnerabilities and other weaknesses. Pen tests do find some of the same risks as BAS exercises but with two key differences: continuity and timeliness.
Tech target writes:
Pen tests tend to be one-off, resource-intensive exercises that only provide a snapshot of the state of security at that point in time. To keep up with constantly changing IT environments and the continuously evolving threat landscape, security teams need/pup to use BAS exercises to consistently test security defenses on a regular, if not constant, basis to ensure they are always configured correctly and can detect and respond to cyberattacks.
While pen tests offer a point-in-time report on the security of an organization’s security defenses, breach and attack simulations offer regular or even constant status checks.
Expanding on pen tests, red team exercises launch full-cycle attacks aimed directly at the crown jewels. Red teaming differs from pen testing in that defenders aren’t supposed to see an attack coming. Appearing as genuine threats, red team campaigns measure how long and how far attacks can progress without triggering detection.
Like pen tests, the results of red and purple team exercises technically become outdated the minute testing concludes, and resulting insights start to decrease in value as hours, days, weeks, and months pass by.
Other techniques rooted in monitoring do provide ongoing coverage but do not let analysts see things from the attacker’s point of view. Vulnerability scanning and assessments identify individual assets connected to your network so you can evaluate whether they’re at risk from known vulnerabilities. Scanners correlate findings with databases of common vulnerabilities and exposures (CVEs) to find those already potentially being exploited by hackers, but do not let analysts take on the role of the attacker looking to enter via specific vulnerabilities.
Attack surface management (ASM) comes closest to BAS in that ASM tools provide continuous automated monitoring of your attack surface risk from the outside in. ASM lets security analysts see what adversaries see when they size up your attack surface but also does not equip defenders to model lateral movement through your network toward privileged assets and data.
While most of these techniques favor either continuous coverage or an active attacker’s perspective, BAS combines both to provide an accurate, real-time view of risk.
BAS emulates the way real-world attacks might be likely to unfold — from delivery through exploitation, installation, command and control, and malicious actions — and allows responders to rehearse their response so they can tweak controls and fine-tune procedures.
As your organization begins to consider, implement, and refine your CTEM program, breach and attack simulation should be considered as a key component of your validation phase. The SafeBreach team is here to support organizations who are considering a shift to CTEM as the basis of their security program. When you’re ready to learn more about the important role BAS plays in CTEM, connect with a SafeBreach cybersecurity expert.