Hybrid clouds, rapid development, and Shadow IT have expanded the modern attack surface, making complete visibility both crucial and more difficult than ever. Attack surface discovery offers a means of addressing these visibility gaps by continuously mapping all digital assets — internal, external, and hidden.
This guide covers the fundamentals, best practices, and top tools for effectively discovering the attack surface.
Attack surface discovery fundamentals
Fundamentally, attack surface discovery involves establishing a comprehensive, real-time inventory of an IT infrastructure, enabling the identification and management of associated security risks.
The mapping process consists of two key components:
- The external attack surface: This comprises assets that are visible and accessible from the public internet. This extends far beyond corporate websites to include exposed cloud storage buckets (e.g., Amazon’s AWS S3 buckets), public IP ranges, open ports, subdomains, abandoned websites (also known as “rogue” or “forgotten” assets), and external APIs (application programming interface) and third-party vendor connections. Read more on the cybersecurity risks of unmanaged internet-facing assets.
- The internal attack surface: These are systems only accessible after an initial breach. This is the entry point that attackers exploit to essentially “pivot” and escalate privileges. Attack surface discovery for this internal surface involves identifying untracked internal network devices, legacy servers, misconfigured employee endpoints, and Shadow IT.
With a defined and mapped attack surface, your Security Operations Center (SOC) team can transition from a reactive posture to a proactive one with a robust attack surface management solution.
The difference: Attack surface discovery vs. Attack surface management
The primary difference is that attack surface discovery is the technical process of identifying and mapping digital assets to create a complete inventory. In contrast, attack surface management (ASM) is a continuous operational lifecycle that utilizes inventory to prioritize risks, remediate vulnerabilities, and enforce security policies.
Here's a helpful breakdown:
| Feature |
Attack Surface Discovery (ASD) |
Attack Surface Management (ASM) |
| Primary Goal |
Improves visibility by answering the question: "What do we own?" |
Improves cyber threat resilience by answering the question: "Is it secure?" |
| The Action |
Scans, maps, and inventories digital assets (IPs, domains, code, shadow IT). |
Prioritizes risks, orchestrates remediation, and enforces policies based on the inventory. |
| The Output |
A comprehensive asset inventory. |
A reduced digital footprint and improved security posture. |
Best practices for attack surface discovery
Operationalizing attack surface discovery means replacing static asset lists with continuous, automated mapping of your entire digital footprint. This process autonomously detects Shadow IT, forgotten infrastructure, and new cloud deployments in real-time, ensuring your team sees the network exactly as an attacker does
The following best practices define a mature attack surface discovery program:
- Automate asset enumeration: Use AI and machine learning (ML) to perform automated, massive-scale discovery across public and private IP ranges, cloud environments, and code repositories. This reduces manual effort and accurately maps complex relationships between assets, grouping them by owner and function.
- Enrich with threat intelligence: Enhance asset inventories by automatically correlating discovered infrastructure with threat data. A mature discovery engine doesn't just list an IP; it tags it with context—such as whether the asset is hosting known malware or communicating with malicious actors—providing immediate situational awareness.
- Integrate continuous monitoring: Point-in-time scans are insufficient. Mature discovery requires real-time tracking to detect transient cloud instances and ephemeral assets. This ensures that as soon as a new server spins up or a shadow IT application goes live, it is immediately added to the inventory.
- Contextualize asset criticality: Instead of a flat list of IP addresses, mature discovery classifies assets based on their business value. It identifies which assets are "crown jewels" (e.g., payment gateways, production databases) versus non-critical staging environments, ensuring that downstream teams have the necessary context to prioritize effectively.
- Tag for regulatory scope: Automated discovery should identify and tag assets that fall under specific regulatory umbrellas (such as servers storing PII for GDPR or financial systems for DORA). This creates a "compliance-ready" inventory that allows governance teams to instantly see which assets require strict controls.
Top tools for attack surface discovery
| Tool |
Overview |
Pros (Discovery Focus) |
Cons |
| Censys |
The "Google for the Internet." A search engine and scanning platform that continuously maps the entire IPv4 space to find assets and services. |
Raw Visibility: Unmatched breadth. It identifies assets that standard scanners overlook because it scans the entire internet, not just predefined ranges. Excellent for finding shadow IT and "unknown unknowns." |
High Noise: Because it scans everything, the volume of data can be overwhelming. It requires a skilled team to filter results and determine what actually belongs to you. |
| Palo Alto Cortex Xpanse |
An enterprise-grade active discovery platform used by the DoD and Fortune 500s to map global internet assets and attribute them to specific organizations. |
Attribution: Best-in-class at linking a random IP to a specific subsidiary or business unit. It doesn't just find an asset; it tells you who owns it. Deep integration with firewalls for automated blocking. |
Cost & Complexity: Designed for large enterprises with mature SOCs. It is significantly more expensive and complex to deploy than lightweight SaaS scanners. |
| UpGuard |
A platform combining BreachSight (ASM) with Vendor Risk Management. It focuses on discovering exposed data and third-party risks. |
Data & Supply Chain: Strong discovery of data leaks, exposed S3 buckets, and vendor risks. Excellent for mapping the "human" and "supply chain" attack surface. |
Outside-In Focus: Designed primarily for external surface scanning; utilizes deployed agents to extend coverage and identify deep internal assets. |
| Ionix |
An External Attack Surface Management (EASM) platform that maps "connected assets"—infrastructure you don't own but rely on. |
Dependency Mapping: Unique ability to discover "fourth-party" assets (e.g., a script on your site loading from a vendor). Excellent "zero-input" discovery of shadow assets. |
External Only: Highly specialized for the external perimeter and supply chain. Requires integration with other tools for internal network visibility. |
| CyCognito |
An "outside-in" platform that uses botnets to scan your organization exactly as an attacker would, locating subsidiaries and shadow IT. |
Attacker Perspective: Discovers assets by mapping business relationships (subsidiaries, acquisitions) rather than just IP ranges. High fidelity in finding "forgotten" IT. |
Black-Box Limitations: Because it scans from the outside, it cannot provide the deep "white-box" context (e.g., patch levels) that an internal agent would see. |
| Aikido |
A developer-centric security platform that scans source code and cloud environments. It focuses on "Application" surface discovery. |
Code-to-Cloud Visibility: Identifies risks in the code repository phase before deployment. Excellent for identifying application logic flaws and dependency vulnerabilities. |
Not General Purpose: It is an AppSec tool, not a general IT infrastructure scanner. It won't find a rogue server plugged into a wall in a branch office. |
| Flare |
A Threat Exposure Management solution that monitors the "dark web" and criminal underground for signs of your assets being discussed or sold. |
Leak Discovery: Finds "exfiltrated" parts of your attack surface—stolen credentials, leaked API keys on GitHub, and dark web mentions of your domains. |
Intelligence vs. Infrastructure: It is a threat intelligence tool, not an infrastructure mapper. It tells you what was stolen, not necessarily what servers you own. |
| Tenable |
A comprehensive exposure management platform (Tenable One) that combines external ASM mapping with deep internal vulnerability scanning. |
Hybrid Visibility: Unmatched ability to correlate external discovery (ASM) with internal vulnerability data (Nessus), providing a unified view of internal and external assets. |
Licensing Complexity: Gaining the "single pane of glass" view often requires upgrading to the expensive "Tenable One" suite rather than just buying a scanner. |
Read more on the best attack surface management software solutions >
Expand your attack surface discovery with UpGuard
With UpGuard, you gain continuous visibility into your full digital footprint, eliminating blind spots that attackers seek to exploit. Our platform automatically identifies and links your organization's internet-facing assets, including previously overlooked test servers, newly created subdomains, and misconfigured cloud services.
We do this by continuously scanning the internet using DNS, certificates, web archives, and fingerprinting, ensuring you always have a complete and up-to-date inventory of your exposed assets.