Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Plan for Success: Implementation of Operation CTEM
Global Security

Plan for Success: Implementation of Operation CTEM

AdminBy AdminJuly 6, 2024No Comments6 Mins Read
CTEM Operation
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


July 5, 2024Hacker newsCloud Security / Attack Surface

Operation CTEM

The attack surface isn’t what it used to be, and it’s becoming a nightmare to defend. The ever-expanding and evolving attack surface means that the risk to businesses has increased dramatically, and today’s security measures are struggling to protect it. If you have clicked on this article, there is a good chance that you are looking for solutions to manage this risk.

In 2022, Gartner developed a new framework to address these issues – Continuous Threat Exposure Management (CTEM). Since then, the implementation of this framework has become a priority for many organizations for deep improvement, which is expected to lead to maintaining a high level of security readiness and resilience.

“By 2026, organizations that prioritize their security investments based on a continuous exposure management program will be three times less likely to be breached.” Gartner, “How to Manage Cybersecurity Threats, Not Episodes,” 21 Aug 2023

CTEM provides a continuous and comprehensive view of the attack surface and the impact on it, verifying whether security measures are effectively blocking the potential exploitation of the impact, and then ordering the mobilization to address the selected vulnerabilities.

Adopting CTEM can quickly become overwhelming because it involves organizing many disparate and moving parts. Unification of digital assets, workloads, networks, identities and data across the enterprise. So to simplify it, we’ve broken down the framework into its pillars, providing manageable steps to guide you through the process to make impact management manageable.

Pillar #1: Increase the visibility of the attack surface

The main problem of asset management is its limited scope. It provides only a cross-section of the attack surface, typically focusing solely on local vulnerabilities, without the ability to apply the vulnerability data it generates.

CTEM provides better visibility into all types of attack surface exposures – internal, external and cloud – to help organizations better understand their real-world security risk profile.

The process begins with a phased coverage of the environment for digital assets. We recommend an initial volume that includes:

  1. An external attack surface that is typically smaller in scope and supported by a growing ecosystem of tools.
  2. SaaS tools that facilitate risk communication, as SaaS solutions tend to increasingly house critical business data.

As a second step, consider expanding your scope to include digital risk protection, which adds greater visibility to the attack surface.

Once scope is determined, organizations must define their risk profiles, identifying the exposure of high-priority assets. It should also include misconfiguration of assets, especially as it relates to security controls, and other weaknesses such as fake assets or poor responses to phishing tests.

Pillar #2: Enhance vulnerability management

Vulnerability management (VM) has long been a cornerstone of many organizations’ cybersecurity strategies, focusing on identifying and remediating known CVEs. However, with the increasing complexity of the IT environment and the expanded capabilities of threat actors, a single virtual machine is no longer sufficient to maintain enterprise cyber security.

This is especially evident when you take into account the growing number of CVEs published every year. Last year alone there were 29,085 CVE and only 2-7% of them have ever been exploited in the wild. This makes it an unrealistic task to be the perfect patch, especially since it doesn’t account for unpatched vulnerabilities such as misconfigurations, Active Directory issues, unsupported third-party software, stolen and leaked credentials, and more that will by 2026, more than 50% of enterprises.

CTEM shifts the focus to prioritizing exposures based on exploitability and risk impact on critical assets as opposed to CVSS scores, timelines, or supplier ratings. This ensures that the most sensitive digital assets to the organization’s continuity and mission are addressed first.

Therefore, prioritization is based on security gaps that are easy to exploit while providing access to sensitive digital assets. The combination of the two results in prioritizing these impacts, which typically account for a proportion of all identified impacts.

Pillar #3 Validation Transforms CTEM from theory to proven strategy

The final pillar of the CTEM strategy, validation, is a mechanism to prevent exploits of security gaps. To ensure the continued effectiveness of security controls, testing should be offensive in nature, emulating the methods of attackers.

There are four strategies for testing your environment as an attacker, each of which reflects techniques used by adversaries:

  1. Think in graphs – While defenders often think in terms of lists, be it assets or vulnerabilities, attackers think in terms of graphs, depicting relationships and paths between different network components.
  2. Automate tests – Manual penetration testing is an expensive process that involves stress testing your security elements by a third-party pentester. Organizations are limited in what they can audit. In contrast, attackers use automation to execute attacks quickly, efficiently, and at scale.
  3. Check the actual attack paths – Attackers do not focus on individual vulnerabilities; they consider the entire attack path. Effective testing means testing all the way, from initial access to exploited exposure.
  4. The test is continuous – Manual pentesting is typically performed periodically, once or twice a year, but testing in “sprints” or short iteration cycles allows defenders to adapt to the speed of IT change by protecting the entire attack surface by addressing impacts as they occur.

CTEM: Invest Now – Get Consistent Results

With all the different elements of people, processes, and tools in a CTEM strategy, it’s easy to get overwhelmed. However, keep a few things in mind:

  1. You are not starting from scratch. You already have asset and vulnerability management systems in place, the focus is simply to extend their scope. Make sure your tools fully cover the entire attack surface of your IT environment and that they are constantly updated to keep up with the pace of change.
  2. Think of it as a process of continuous improvement. Implementing the CTEM framework becomes an agile cycle of discovery, mitigation, and validation. The work is never truly done. As your business grows and matures, so does your IT infrastructure.
  3. Operation CTEM
  4. Put validation at the center of your CTEM strategy. This gives you confidence that your security operations will stand the test. You need to know where you are at all times. Maybe things are coming true, and that’s great. Alternatively, you can identify a gap, but now you can fill that gap with a prescriptive approach, fully aware of what the consequence will be.

Learn more on how to implement a CTEM strategy for validation with Pentera.

Did you find this article interesting? This article is from one of our respected partners. Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

May 15, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.