You possibly can’t management when the following vital vulnerability drops. You possibly can management how a lot of your surroundings is uncovered when it does. The issue is that the majority groups have extra internet-facing publicity than they realise. Intruder’s Head of Safety digs into why this occurs and the way groups can handle it intentionally.
Time-to-exploit is shrinking
The bigger and fewer managed your assault floor is, the extra alternatives exist for exploitation. And the window to behave on them is shrinking quick. For probably the most severe vulnerabilities, disclosure to exploitation might be as brief as 24 to 48 hours. Zero Day Clock tasks that time-to-exploit can be simply minutes by 2028.
That is not a number of time when you think about what has to occur earlier than a patch is deployed: operating scans, ready for outcomes, elevating tickets, agreeing priorities, implementing, and verifying the repair. If disclosure lands out of hours, it takes even longer.
In lots of circumstances, susceptible techniques don’t should be internet-facing within the first place. With visibility of the assault floor, groups can cut back pointless publicity upfront and keep away from the scramble altogether when a brand new vulnerability drops.
When a zero-day drops on a Saturday
ToolShell was an unauthenticated distant code execution vulnerability in Microsoft SharePoint. If an attacker may attain it, they might run code in your server – and since SharePoint is Lively Listing-connected, they’d be beginning in a extremely delicate a part of your surroundings.
This was a zero-day, which means attackers have been exploiting it earlier than a patch was accessible. Microsoft disclosed on a Saturday and confirmed that Chinese language state-sponsored teams had been exploiting it for as much as two weeks earlier than that. By the point most groups knew about it, opportunistic attackers have been scanning for uncovered cases and exploiting at scale.
Intruder’s analysis discovered 1000’s of publicly accessible SharePoint cases on the time of disclosure – even supposing SharePoint does not should be internet-facing. Each a type of exposures was pointless – and each unpatched server was an open door.
Why exposures get missed
So why do exposures so usually get missed by safety groups?
In a typical exterior scan, informational findings sit beneath a whole bunch of criticals, highs, mediums, and lows. However that info can embody detections that signify actual publicity danger, comparable to:
- An uncovered SharePoint server
- A database uncovered to the web, comparable to MySQL or Postgres
- Different protocols, which ought to normally be reserved for the inner community, comparable to RDP and SNMP
Right here’s an actual instance of what that appears like:
In vulnerability scanning phrases, classifying these as informationals generally is sensible. If the scanner sits on the identical personal subnet because the targets, an uncovered service may genuinely be low danger. However when that very same service is uncovered to the web, it carries actual danger even with no identified vulnerability connected to it. But.
The hazard is that conventional scan studies deal with each circumstances the identical method, so the actual dangers slip by way of the gaps.
What proactive assault floor discount truly entails
There are three key parts to creating assault floor discount work in follow.
1. Asset discovery: outline your assault floor
Earlier than you may cut back your assault floor, you want a transparent image of what you personal and what’s externally reachable. That begins with figuring out shadow IT – techniques your group owns or operates however is not at present scanning or monitoring.
Closing that hole is essential, and there are three key parts we advocate having in place:
- Integrating along with your cloud and DNS suppliers in order that when new infrastructure is created, it is mechanically picked up and scanned. That is one space the place defenders have a real benefit: you may combine straight with your personal environments, attackers cannot.
- Utilizing subdomain enumeration to floor externally reachable hosts that are not in your stock. This issues particularly after acquisitions, the place you could be inheriting infrastructure you do not but have visibility of.
- Figuring out infrastructure hosted with smaller, unknown cloud suppliers. You might have a safety coverage that mandates growth groups solely use your major cloud supplier, however it’s worthwhile to test that follow is being adopted.
Watch a deep dive into these strategies:
. Deal with publicity as danger
The following step is treating assault floor publicity as a danger class in its personal proper.
That requires a detection functionality that identifies which informational findings signify an publicity and assigns applicable severity. An uncovered SharePoint occasion, for instance, may fairly be handled as a medium-risk problem.
It also means carving out space for this work in how you prioritize. If strategic efforts like attack surface reduction are always competing against urgent patching, they will always lose. That might mean setting aside time each quarter to review and reduce exposure, or assigning clear ownership so someone is accountable for it – not just when a crisis hits, but routinely.
3. Continuous monitoring
Attack surface reduction isn’t a one-time exercise. Exposure changes constantly – a firewall rule gets edited, a new service gets deployed, a subdomain gets forgotten – and your team needs to detect those changes quickly.
Vulnerability scans take time to complete, and running full scans daily isn’t usually possible. Daily port scanning is a better fit. It’s lightweight, fast, and means you can detect newly exposed services as they appear. If someone edits a firewall rule and accidentally exposes Remote Desktop, you find out the day it happens – not at the next scheduled scan, which could be up to a month later.
Fewer exposed services, fewer surprises
When unnecessary services aren’t exposed in the first place, they’re far less likely to be caught up in the mass exploitation that follows a critical disclosure. That means fewer surprises, less urgent scrambling, and more time to respond deliberately when new vulnerabilities emerge.
Intruder automates this process – from discovering shadow IT and monitoring for new exposures, to alerting your team the moment something changes – so your security team can stay ahead of exposure rather than reacting to it.
If you want to see what’s exposed in your environment, book a demo of Intruder.




