NCSC Feed: ACD 2.0: Insights from the external attack surface management trials

Source URL: https://www.ncsc.gov.uk/blog-post/active-cyber-defence-2-insights-easm-trials
Source: NCSC Feed
Title: ACD 2.0: Insights from the external attack surface management trials

Feedly Summary: We publish the results of our ACD 2.0 external attack surface management (EASM) trials

AI Summary and Description: Yes

Summary: The text discusses the insights gained from the NCSC’s ACD2.0 experiments, focusing on external attack surface management (EASM) and its importance in enhancing cyber security. It highlights the industry’s eagerness to collaborate, the need for clearer guidance in EASM products, and the challenges organizations face in managing their digital footprint.

Detailed Description:

The provided text reports on findings from the NCSC’s (National Cyber Security Centre) experiments related to external attack surface management (EASM). It outlines key themes observed during the first stage of the ACD2.0 experiments and provides actionable insights for security professionals:

– **Collaboration Opportunities**:
– Providers showcased a strong willingness to work with the NCSC, indicating a collective commitment within the industry to improve cyber defense through innovative methods.

– **Challenges for Participation**:
– Difficulties were encountered in recruiting organizations to take part in trials, pointing to a lack of awareness regarding risk management related to their external attack surface and the utility of EASM products.

– **Benefits of EASM Features**:
– EASM provides significant cybersecurity advantages, enabling organizations to gain a comprehensive view of their digital footprints.
– Noteworthy features include automated discovery capabilities that help security teams learn about unknown assets and mobilize resources to safeguard or deactivate them.

– **Need for Guidance**:
– There is a pronounced shortage of clear standards for what constitutes a robust EASM product, which is vital for organizations looking to make informed selections.
– Both service providers and customers voiced a desire for authoritative guidance in EASM selection processes.

– **Market Dynamics**:
– The current commercial landscape for EASM is flourishing, characterized by a variety of service offerings at different price points, underscoring the importance of tailored solutions.

– **Terminology Confusion**:
– The inconsistent language used around EASM scanning practices has led to confusion among customers, which can hinder effective decision-making.

– **Cost Considerations**:
– Financial constraints remain a significant factor for organizations when selecting cybersecurity solutions, emphasizing the need for confidence in their purchasing decisions, especially under budget limitations.

– **Future Efforts by NCSC**:
– The NCSC is poised to address the gaps identified during these experiments to empower organizations with better-informed decisions about their cybersecurity strategies, particularly concerning EASM.

In summary, these insights emphasize the vital role of attack surface management in contemporary cybersecurity strategies and highlight areas requiring further development, guidance, and communication within the industry. Security professionals should take note of these findings to enhance their approach to managing digital vulnerabilities.