Get to full asset inventory by combining active scanning with API integrations - Part 4

|
Updated

industry
CISA BOD 23-01 blog series

This is the final part of our 4-part CISA BOD 23-01 series. Check out part 1 to start at the beginning of the series.

A combination of integrations and active scanning works best #

No single approach can get to full asset inventory across IT and OT, on-premise and cloud, and your remote workforce. However, a combination of active scanning plus integrations usually covers all areas.

You need breadth and depth for asset inventory. Breadth means enumerating all of the devices. Depth means knowing as much as possible about each device.

Active scanning API integrations
Breadth (enumeration) Depth (detail) Breadth (enumeration) Depth (detail)
Managed IT
Unmanaged IT
IoT/OT
Cloud
Remote workforce

Breadth: Enumerating all assets #

Active scanning is the fastest way to get breadth. Start with the networks you know about, then look around the edges to see what’s hiding in the shadows. To discover all devices and subnets, do a full RFC 1918 scan, then find unmapped assets that were seen through SNMP but not reached directly to see where you are missing subnets.

Active scanning can be used for cloud environments and remote work, but getting to breadth is usually better achieved through integrations with cloud hosting providers, EDR, MDM, and productivity suites (e.g., Google Workspace).

Depth: Getting detailed information on all assets #

Next, let’s focus on depth. For managed devices, you can typically get a lot of depth with integrations with EDR, MDM, and productivity suites. However, you’ll get nothing at all for unmanaged IT. A scanner that does not require authentication and is purpose-built for asset inventory, such as the runZero Explorer, will give you the best depth you can get for unmanaged devices, IoT, and OT.

Asset inventory for cloud environments #

For cloud integrations, you’ll typically start out with an API integration, which gives you both breadth and depth. However, active scanning can give you more depth in certain areas, such as open ports, service protocols, and operating systems.

Consider AWS EC2 for example, where each approach delivers only part of the details:

Asset detail Active scanning API integrations
Hostname
IPv4 address
IPv6 address
MAC address
Open ports (from VPC & internet)
Service protocols
Operating system
Installed software
Account ID
Architecture
Availability zone
ID
Image ID
Instance type
Region
Root device name
Subnet ID

Asset inventory for your remote workforce #

For your remote workforce, both breadth and depth will come from integrations. Typically, the following sources are the most helpful, although one source is typically sufficient:

  • EDR agents, such as CrowdStrike and SentinelOne
  • MDM solutions, such as Microsoft Intune and Miradore
  • Productivity suites, such as Google Workspace
  • Directories, such as Microsoft Active Directory and Azure AD

Correlate all data sources to identify security coverage gaps #

Having the breadth of all assets, especially through active scanning, and information on security controls via integrations, enables you to find security coverage gaps, such as:

  • All machines missing EDR agents
  • Subnets missing vulnerability management coverage
  • Devices not covered by MDM

Options if you already have an integration-based CAASM solution for asset inventory #

If you have already rolled out an integrations-based asset inventory solution without active scanning, you have options:

  • Add active scanning to your existing CAASM solution: Use runZero Professional Edition to scan your network, then use the export API to feed the data into other CAASM solutions. runZero has existing integrations with Axonius and JupiterOne.
  • Replace existing CAASM solution: Use runZero Enterprise Edition to have a single solution that includes active scanning and integrations with key sources. This approach may be favorable if you are trying to consolidate solutions and reduce cost.

Written by runZero Team

Due to the nature of their research and out of respect for their privacy, runZero team members prefer to remain anonymous. Their work is published under the runZero name.

More about runZero Team
Subscribe Now

Get the latest news and expert insights delivered in your inbox.

Welcome to the club! Your subscription to our newsletter is successful.


Related Articles

runZero Insights
Taming the Typhoons: How runZero Keeps You Ahead of State-Sponsored Cyber Threats
China's Typhoon cyber attacks are evolving, but runZero helps you stay one step ahead with unmatched visibility and proactive defense.
runZero Insights
Ensure compliance with DORA’s ICT risk framework using runZero
Learn how to uncover unmanaged and unknown assets— including IT, OT, and IoT— to meet DORA's hidden risk requirements using runZero.
Life at runZero
Employee Spotlight: Doug Markiewicz
Doug Markiewicz is a strategic Customer Success Engineer with a passion for solving complex cybersecurity problems. Learn more about his journey as...
runZero Insights
Evolving from IT to IoT: Flax Typhoon preyed on the lesser knowns
A look at Flax Typhoon's latest operations, and how runZero’s unknown and IoT asset visibility can help calm the storm for security teams.

See Results in Minutes

Get complete visibility into IT, OT, & IoT — without agents, credentials, or hardware.

© Copyright 2024 runZero, Inc. All Rights Reserved