Attack surface management (ASM)
Inventory and prioritization of Internet-exposed assets before or alongside the pentest.
- Exposed asset identification
- Public exposure analysis
Typical: black-box or scoped OSINT
runbook · asm
Secuencia ilustrativa bajo alcance acordado
- Coverage
- Subdomains, exposed services and applications, certificates, and scoped perimeter footprinting.
- Typical deliverables
- Risk-prioritized list, duplicates, and shadow IT where applicable; input for where to go deeper in testing.
- Assumptions / modality
- No internal credentials; legal and ethical limits set in writing in the SOW.
