20 April 2026 Security Tips Patrowl Team

What is EASM? What your scanners don't see

Technical guide

76% of organisations have suffered an attack through an asset they did not know they had. External Attack Surface Management (EASM) is the answer: it discovers what your scanners cannot see, in real time, from an attacker's perspective. In 2026, Gartner integrates this discipline into Unified Exposure Management Platforms (UEMP), combining Preemptive Exposure Assessment (PEA) with vulnerability validation — which is exactly what Patrowl delivers in a single platform.

This guide explains why your asset inventory is inevitably incomplete, how EASM discovery works in 4 steps, and what 5 real incidents (SolarWinds, Exchange ProxyLogon, Twitch, Volkswagen, Log4Shell) have in common. You will also see how EASM fits into a CTEM strategy and what it changes in practice for your team.

Patrowl Security Team
Updated April 2025
15 min read

You cannot protect what you cannot see.

Ask your team for a complete list of every asset exposed on the internet. What you will get is a list of what you have declared — not what actually exists.

Development environments never decommissioned, cloud storage buckets created by a data team outside IT processes, subdomains inherited from an acquisition three years ago, test APIs forgotten since 2022: these assets are exposed on the internet, reachable from anywhere, and nobody on your security team is monitoring them.

Gartner estimates that 80 to 95% of an organisation's assets change every year.[1] No inventory — even an automated one — covers the full exposed perimeter.

Attackers can scan the entire public IPv4 address space in under 45 minutes and exploit a CVE within 15 minutes of publication.

CISA — Vulnerability Exploitation Reports, 2021–2022

An attacker does not start from your declared inventory. They scan the entire public IPv4 address space, enumerate SSL/TLS certificates, query certificate transparency databases and search engines for exposed services. They find what you have forgotten, before you do.

76% of organisations have suffered an attack originating from an unknown or unmanaged asset Enterprise Strategy Group, 2024
35% additional assets discovered on average after deploying an EASM tool Security Magazine, 2023
15 min median time between CVE publication and first automated exploitation scans CISA / incident reports, 2021

In under 45 minutes, an attacker can traverse the entire public IPv4 address space, query certificate transparency logs and DNS records, and find your forgotten staging environment before your team has opened a single ticket.


What is External Attack Surface Management (EASM)?

External Attack Surface Management (EASM) is the continuous process of discovering, mapping, monitoring and reducing all internet-facing assets of an organisation — including those it does not know about.

The key distinction is the starting point: EASM does not start from your asset register (CMDB, Configuration Management Database). It starts from your domain name and reconstructs everything that flows from it, exactly as an attacker does during reconnaissance — without being limited to your declared inventory.

Gartner formalised the category in its Hype Cycle for Security Operations 2022 and again in 2025. It is now a core component of Continuous Threat Exposure Management (CTEM), the framework for managing exposure on a continuous basis.

Gartner definition

EASM refers to the processes, technology and managed services deployed to discover internet-facing enterprise assets and systems and associated exposures which include misconfigured public cloud service infrastructure, for the purpose of prioritising and addressing potential risks. [Gartner Peer Insights]

What EASM covers in practice:

  • Domains, subdomains and associated SSL/TLS certificates
  • IP ranges and exposed services (ports, banners, protocols)
  • Exposed network and security equipment (VPNs, firewalls, routers)
  • Cloud infrastructure (accounts, regions, exposed services)
  • Web applications, APIs and public endpoints
  • Cloud services and storage buckets
  • Assets linked to subsidiaries and acquired entities
  • Exposure through third-party suppliers
  • Shadow IT and forgotten environments
CERT-EU — Threat Landscape Report 2025

The exploitation of internet-facing systems continued to be the most impactful initial access vector, and threat actors increasingly targeted partners and service providers as indirect pathways to their final targets.


Vulnerability scanner vs EASM

A scanner tests what you declare. EASM finds what you have not declared.

A scanner is a good tool. The problem is upstream: if you do not declare an asset, it will not be tested. EASM generates the scope. The scanner then tests it in depth. These are two distinct steps, not competing tools.

Attacker scans everything KNOWN ASSETS @ Primary domain company.com IP Production IPs declared in scope SSL certificates monitored / Documented APIs in scope Scanner + EASM UNKNOWN ASSETS ! Shadow IT forgotten dev/staging envs Subsidiaries / acquired entities inherited assets, never audited Exposed cloud buckets unintentional public access ~ Undeclared subdomains outside DNS inventory EASM only — scanner is blind SCANNER: You declare → it tests what you give it EASM: Seed = domain + brands → full map auto-discovered

Known vs unknown assets — what the scanner misses, EASM finds

Capability Vulnerability scanner EASM
Discovery of unknown assets (outside-in)
Continuous monitoringPeriodic✓ Continuous
Attacker perspective (outside-in)
Threat intel enrichment (CVE, EPSS)Partial
Unknown vulnerability / 0-day detectionPartial
Declared scope requiredMandatoryNot required
Known vulnerability testing (CVE)
Key takeaway

A scanner must be configured and scheduled against a declared scope; EASM manages that scope for you. A scanner primarily checks whether known patches have been applied; EASM discovers and maps what the scanner was never configured to test. The two tools complement each other.


5 documented incidents, 1 pattern

Five security incidents, all publicly documented and widely covered in the press. In each case: an asset exposed on the internet, absent from any security inventory, with attackers getting there before detection.

01

SolarWinds — supply chain attack

2020 · supply chain attack · over 30,000 US government agencies impacted

APT29 (a group linked to Russia) gained access to an internet-connected development server whose authentication relied on a trivial password with no MFA, and which appeared in no security inventory. After months of reconnaissance and analysis of developer habits, they inserted malicious code into SolarWinds Orion updates by mimicking internal coding styles. The code, distributed with the next update, exfiltrated sensitive data from victims including over 30,000 US government agencies.

What EASM would have changed: the development server would have been detected as an unmanaged exposed asset as soon as it went online — before APT29 found it during reconnaissance.

02

Microsoft Exchange — ProxyLogon

March 2021 · CVE-2021-26855 · over 250,000 servers compromised in 48h · HAFNIUM (linked to China per Microsoft)

CVE published on 2 March 2021. Within 48 hours, HAFNIUM had compromised 250,000 Exchange servers. The real problem: thousands of organisations did not know their servers were accessible from the internet. Without visibility over these assets, no response was possible.

What EASM would have changed: as soon as the CVE was published, EASM would have cross-referenced exposed assets with threat intelligence (CISA KEV, EPSS). Affected Exchange servers would have been surfaced immediately as critical priority.

03

Twitch — server misconfiguration exposing internal repositories

October 2021 · 125 GB of data exfiltrated · source code exposed

A server configuration error at Twitch allowed an unauthorised third party to access internal Git repositories. Platform source code, internal security tools, and streamer payout data — 125 GB in total — were exfiltrated and published on 4chan. The access resulted from a misconfiguration, not a sophisticated attack.

What EASM would have changed: subdomain enumeration would have surfaced the misconfigured server as soon as it became reachable — without any human team needing to know it existed beforehand.

04

Volkswagen / Cariad — S3 bucket left open for months

2024 · 800,000 records exposed · EV geolocation data

A cloud storage bucket belonging to Cariad, the Volkswagen Group's software entity, remained publicly accessible for several months. It contained geolocation data from 800,000 electric vehicles, including those of political figures and German military officers. The asset was monitored by no one after deployment.

What EASM would have changed: manually tracking every cloud service deployed across an international group is structurally impossible. Continuous monitoring of cloud storage configurations is a core EASM capability.

05

Log4Shell — a forgotten library embedded in thousands of exposed services

December 2021 · CVE-2021-44228 · CVSS 10.0 · mass exploitation within 72h

When CVE-2021-44228 (Log4Shell) was published, security teams discovered that Log4j was embedded in hundreds of internal applications, often without anyone knowing. Internet-facing services were using the library without anyone's knowledge, some inherited from old projects that had never been decommissioned. Mass exploitation began less than 72 hours after publication.

What EASM would have changed: EASM maintains a continuous map of the technologies running on each exposed asset. As soon as the CVE was published, assets running Log4j would have been identified and surfaced as critical priority, reducing the exposure window from several weeks to a few hours.

The pattern

Asset exposed, absent from any security inventory, access to sensitive data. Attackers exploit blind spots, not just CVEs.


The 4-step cycle

Unlike a scheduled scanner, EASM runs continuously with no maintenance window. Every new asset, every newly published CVE, every configuration change automatically triggers a map update and, where relevant, an alert.

01 DISCOVER Domains, IPs Shadow IT, cloud subsidiaries, ASN 02 ENRICH CVE + EPSS CISA KEV threat intel 03 PRIORITIZE CVSSv3 + EPSS business context ITSM tickets 04 MONITOR Retest + alert change detection compliance proof continuous loop — 24/7/365

Unlike a pentest, EASM never stops — every new asset and every new exploit is detected as it appears

Discovery

Starting point: a domain name and associated brand names. EASM reconstructs the full exposed map from these inputs — subdomains via SSL/TLS certificates and DNS records, IP ranges, ASN numbers, cloud identifiers. The goal is to map what an attacker would identify during reconnaissance.

Enrichment

For each asset, metadata is collected to identify the technologies in use and their versions. These are cross-referenced with Threat Intelligence (CTI): CVEs enriched via NVD, EUVD and GCVE, EPSS scores, exploitation indicators from the CISA KEV catalogue and dedicated monitoring tools.

Prioritisation

Cross-referencing the CVSS score, EPSS, CISA KEV presence and business criticality separates real risk from theoretical score. An internet-facing asset with an actively exploited CVE takes priority over a critical vulnerability on an isolated internal service.

Monitoring

The inventory is updated in real time. New assets are identified as they appear. Exposures are retested after remediation. Changes are logged for compliance audits.

Patrowl combines EASM and PTaaS in a unified platform. Continuous discovery feeds directly into PTaaS and automated hybrid pentest programmes — tests are always run against the current scope, not a stale declared list. Colas, MGEN and PMU use this approach to maintain real-time visibility of their external exposure.


EASM within CTEM

CTEM (Continuous Threat Exposure Management) is the Gartner framework for managing exposure on a continuous basis. Annual audits and penetration tests — whether annual or twice-yearly — are no longer sufficient: infrastructure changes too fast between cycles.

CTEM breaks down into 5 phases: scoping, discovery, prioritisation, validation, mobilisation. EASM covers the first two. It defines the real perimeter and surfaces exposures that other tools miss.

Gartner, 2023

EASM moved from "essential new technology" in 2021 to a component of CTEM in 2023. The market is converging towards integrated platforms combining VM, CTI and EASM. [Gartner Peer Insights, 2023]

On average, organisations discover 35% more internet-exposed assets after deploying an EASM tool.[Security Magazine, 2023] A third of your real attack surface is invisible to your current tools — that is not a minor blind spot.


Who needs EASM?

As soon as you have several dozen exposed services, multiple cloud environments, or suppliers connected to your infrastructure — you need EASM. It is not reserved for large enterprises.

Concrete use cases:

  • Post-acquisition: map the exposed surface of an acquired entity before integration into the group's infrastructure
  • Incident response: understand what surface was exposed at the time of a compromise
  • Compliance: demonstrate continuous monitoring of the external surface for NIS2 and ISO 27001
  • Pentest scope: test the assets that are actually exposed with a PTaaS or automated hybrid pentest, rather than a declared list that may be incomplete
  • Third-party risk: monitor the exposure of suppliers connected to your environment
In summary

Before EASM, you protect what you know. After, you protect what actually exists. The 35% of missing assets — attackers had already found them.


Frequently asked questions

What is the difference between EASM and a vulnerability scanner?
A scanner tests the assets you declare to it. EASM discovers unknown assets from an attacker's perspective, then cross-references them with threat intelligence. A scanner must be configured and scheduled against a declared scope; EASM manages that scope automatically. The two tools complement each other: EASM generates the scope, the scanner tests it in depth.
How many unknown assets does EASM discover on average?
35% more internet-exposed assets compared to the initial declared inventory, according to multiple industry studies (Security Magazine, Enterprise Strategy Group). These assets have never been assessed — and attackers have already found them.
Does EASM replace penetration testing?
No. EASM runs continuously and identifies what is exposed. A penetration test validates whether it is exploitable under real conditions. Most mature security teams use EASM results to define the scope of their PTaaS engagements or automated hybrid pentests.
How quickly do attackers exploit a newly published CVE?
15 minutes between CVE publication and the first automated exploitation scans (CISA, incident reports 2021–2022). Your average patch management cycle: several days. That is the window EASM reduces.
What is CTEM and what role does EASM play within it?
CTEM (Continuous Threat Exposure Management) is the Gartner framework for managing exposure on a continuous basis rather than through audit cycles. It has 5 phases: scoping, discovery, prioritisation, validation, mobilisation. EASM covers the first two — it defines the real perimeter before everything else.
Does NIS2 mention EASM?
Not explicitly. However, Article 21 of NIS2 requires risk management, asset mapping and continuous monitoring. For essential and important entities, EASM is a direct technical response to these requirements.

What is your real attack surface?

Find your exposed assets before attackers do.

Run an EASM scan →