Stale CMDBs · shadow IT
Most organisations have 20-40% of internet-facing assets that the CMDB does not know about. Shadow IT, M&A, external developers, marketing.
External Attack Surface Management: outside-in discovery of the external attack surface as an attacker sees it. Internet-facing assets, exploitable vulnerabilities, shadow IT, unintegrated M&A, cloud misconfiguration, credential leaks. Detected exposures are prioritised with threat intelligence (CISA KEV, EPSS, active actors) — not a list of theoretical CVEs, but a list of concrete risks.
Traditional vulnerability management is inside-out: it scans what the CMDB knows. But the attacker does not start from the CMDB · they start from Shodan, Censys, certificate transparency, OSINT. EASM closes the gap · outside-in discovery, like the attacker.
Most organisations have 20-40% of internet-facing assets that the CMDB does not know about. Shadow IT, M&A, external developers, marketing.
Thousands of CVEs per year · only a few are actively exploited. Without correlation to KEV, EPSS and active actors, the team patches everywhere or nowhere.
Public S3 buckets, secrets in GitHub, environment variables on debug endpoints · off the radar of traditional VM, but fully visible to the attacker.
Same discipline (vulnerability), opposite perspective. EASM complements traditional VM · it does not replace it.
Four documented phases · from outside-in discovery to a priority rule calibrated on the actors active against your sector.
Fully outside-in discovery: no agent, no credentials, no internal access. Sources: certificate transparency logs (CT), passive DNS, internet-wide scanning, ASN profiling, OSINT, registrar feeds.
For each detected asset: enumeration of ports, services, banners, software versioning, TLS certificates, HTTP headers, redirect chains. Precise identification of the technology stack (Apache vs Nginx, IIS, Tomcat, application server, framework).
Detected vulnerabilities are correlated with CISA KEV (Known Exploited Vulnerabilities), EPSS score, and the active actors tracked by Fortgale CTI. Only what is genuinely exploited against your sector rises in priority.
Full rescan every 24 hours. Critical assets (VPN, Citrix, MOVEit, Fortinet) every 4-6 hours. Real-time alerts on deltas: new exposed assets, expiring certificates, changed banner versions, new KEV affecting your stack.
The five families of exposure that Fortgale EASM maps continuously · each with dedicated methodology and sources.
Discovery of every internet-facing asset of the organisation: domains and subdomains (root + acquisitions + brand), IP ranges (ASN-owned + cloud-hosted), certificates, API endpoints. Most organisations discover 20-40% of assets they did not know they had.
Vulnerabilities alone are not a priority. Priority comes from correlation with real exploitation: active ransomware groups, mass exploitation campaigns, actors targeting your sector.
Shadow IT is the most dangerous asset: nobody knows it, nobody monitors it, nobody updates it. Automatic discovery via brand keywords, executive names, IP correlation.
Cloud misconfigurations are today one of the leading causes of data breach. Discovery of public buckets, exposed API servers, container registries, secrets in public repositories.
Secrets (API keys, passwords, certificates, .env) end up in public repositories, paste sites, infostealer dumps. Continuous discovery to identify leaks before exploitation.
An excerpt of the exposures most relevant to real-world 2024-2026 risk · each correlated with the actor groups that exploit them.
Top intrusion vector 2024-2026. Continuous tracking of exposed Citrix NetScaler/ADC versions · alerts on versions vulnerable to CVEs actively exploited by Black Basta, LockBit, RansomHub. Admin panel exposed = critical.
The 2024 mass exploitation produced victims across every sector. Tracking of vulnerable versions, build IDs, admin panel configuration.
CVE chains actively exploited by Akira, BlackBasta and APT groups. Tracking of exposed FortiOS/FortiGate with vulnerable versions or public admin configurations.
Vector of the Cl0p 2023 mass exploitation · hit hundreds of organisations. Tracking of MOVEit Transfer instances still exposed publicly.
Continuous tracking of cloud buckets publicly accessible owned by the client or managed by suppliers. Content sampling (no download) to estimate sensitivity.
Continuous tracking of WordPress sites owned or controlled by the client (marketing, brand sites). Vulnerable plugins are often vectors for defacement, SEO poisoning, malvertising.
Publicly exposed hypervisors are a privileged ransomware vector (LockBit, RansomHub, Akira each have dedicated ESXi encryptors). Real-time tracking.
Every exposure receives a severity calculated as a function of CVSS · KEV-listed · EPSS · active actors · asset criticality. Not a number from 0 to 10, but a patching priority decision.
CVE in CISA KEV actively exploited by groups targeting your sector · on a critical exposed asset (VPN, Citrix, hypervisor, file transfer). Immediate alert.
KEV-listed CVE but not yet observed against your sector · OR critical asset exposed with weak configuration · OR EPSS score > 50%. Webhook alert.
Published CVE but not KEV-listed · low EPSS score · non-critical asset · low-impact exposure. Included in the weekly digest.
Discovery of a new asset · non-critical change (e.g., new marketing subdomain) · informational only. Available in the dashboard, does not generate alerts.
Four channels by role: dashboard for the CISO, webhook alerts for the SOC, weekly report for management, manual validation for critical cases.
Web console with real-time view of every detected asset, exposure, prioritised CVE, delta over the last 24h. Filtering by criticality, category, business unit.
Immediate push for Critical exposures (new KEV affecting your stack, critical asset exposed, secret leak) via webhook, email, SMS. SLA < 15 minutes.
Weekly email report for the CISO: asset delta, new exposures, new relevant KEV, BU-level summary, prioritised remediation recommendations.
For critical exposures, manual validation by Fortgale analysts (manual exploitability testing, no automated exploitation) · patching support.
If the external surface is minimal · no public IPv4, no SaaS, no distributed cloud, no frequent M&A, no external developers · traditional internal VM covers most of the risk. EASM is justified when there are unintegrated perimeters.
EASM becomes critical when: distributed cloud (multi-cloud, multi-tenant, multi-region), frequent M&A, broad supplier ecosystem, ungoverned shadow IT, visible brand (e-commerce, B2C applications), sector targeted by mass exploitation campaigns (manufacturing, finance, healthcare).
Not sure? Let's talk. If you don't need it, the Fortgale team will tell you.
Detected exposures feed detection, threat intelligence and remediation roadmap · they don't stay in a PDF report.
Critical asset exposed = reinforced monitoring rule in the SOC · access patterns monitored, anomalous traffic alert prioritised.
Discover the SOC →MDR uses the KEV-aware EASM list to prioritise investigations · less time wasted on theoretical CVEs, focus on actually exposed assets.
Discover MDR →The STIX/TAXII feed receives an additional layer: the IOCs of the actors exploiting your specific exposures, not generic IOCs.
Discover TI Feed →Threat Actor Profiling · TI Feed · Advisory · Executive Briefing · Deep & Dark Web · Brand Intelligence. ASM is capability 06 of 7.
See all →EASM produces data the CISO can take to the board to justify investments and remediation priorities · in business language.
How many internet-facing assets you actually have (vs how many in the CMDB) · how much shadow IT has been uncovered · how many M&A assets remain unintegrated.
How many actively-exploited CVEs affect you · how many critical assets are publicly exposed · how many secrets have leaked in the last 12 months.
How many incidents avoided thanks to pre-warning · how many assets removed/protected · estimated cost avoided vs cost of the service.
The «3 board slides» pack is included in the premium EASM deliverables · available on-demand.
EASM (External Attack Surface Management) is outside-in discovery: it uncovers the organisation's external attack surface as an attacker would see it, with no need for agents or internal integrations. Traditional VM is inside-out: it scans what the CMDB already knows. EASM finds what the CMDB does not know (shadow IT, post-M&A assets, external developers, former-employee assets).
Detected vulnerabilities are correlated with CISA KEV (Known Exploited Vulnerabilities), EPSS score, and the active actors tracked by Fortgale CTI. Example: a "critical" Citrix NetScaler CVE with CVSS 9.8 but no observed exploitation has lower priority than a "high" Fortinet CVE actively exploited by ransomware groups.
Yes. Discovery of public S3 buckets, exposed Azure Blob Storage and GCP Storage, public Kubernetes API servers, Docker registries, secrets in public repositories (GitHub, GitLab), unauthenticated SaaS API endpoints. Coverage also extends to Cloudflare worker, Vercel and Netlify deployments.
No. EASM is fully outside-in: it operates from public sources (certificate transparency, passive DNS, internet scan, OSINT) with no agent, no credentials, no access to internal systems. Typical onboarding: root domain, list of known subdomains, list of IP ranges, list of names and brands. Fortgale finds the rest.
Full discovery: 24 hours. Critical assets (e.g., VPN, Citrix, MOVEit): every 4-6 hours. Real-time alerts on significant deltas: new exposed assets, expiring certificates, changed banner versions, new actively-exploited CVEs affecting the client's stack.
If the external surface is minimal (no public IPv4, no SaaS, no cloud, no e-commerce, no exposed executives), traditional internal VM is sufficient. If instead you have distributed cloud, frequent M&A, a broad supplier ecosystem, ungoverned shadow IT · EASM produces immediate value within 1-2 weeks.
Request a free 30-day assessment · full scan of the external surface, KEV-aware prioritisation, report with the real exposures detected. No commitment.
No nurturing sequences, no auto-replies. One of our analysts calls you back within one business day.
The full Report (executive summary · operational IoCs · technical runbook) is restricted. Share two details and one of our analysts contacts you with access and a short technical briefing.
Response in 30 minutes, containment in 1–4 hours. Even if you are not a Fortgale customer.