Based on insights from this project, we recommend the following best practices for organizations with large, complex IT infrastructures:
1. Continuous Attack Surface Monitoring Is Mandatory
With thousands of assets, annual or quarterly testing is insufficient. New systems go live daily, developers commit code, configurations change. Only continuous, automated monitoring catches vulnerabilities before attackers do.
External Attack Surface Management (eASM)
Tools like Argos automatically scan all externally accessible assets, identify vulnerabilities, and alert on critical findings.
Real-time Alerting
Integration with Slack, Teams, or SIEM systems for immediate notification of critical findings - live alerts, not weekly reports.
Asset Inventory & CMDB
Automatic synchronization between monitoring tools and asset management systems for complete documentation.
Credential & Secret Monitoring
Continuous monitoring of GitHub, Pastebin, and leak databases for exposed credentials and API keys.
2. Detect and Manage Shadow IT
Shadow IT is inevitable in large organizations. The key is not preventing it, but detecting it early and integrating it:
- Regular asset discovery scans (at least weekly)
- Automatic alerts for new, unknown domains/subdomains
- Clear process for registering new services with the Security team
- Security Champions in each development team as primary contacts
3. "Shift-Left" Security in Development
Many of the identified vulnerabilities could have been prevented through early integration of security in the development process:
- Pre-Commit Hooks: Secret scanning before every Git push
- CI/CD Security Gates: Automatic SAST/DAST scans in build pipelines
- Infrastructure as Code (IaC) Scanning: Check Terraform/CloudFormation for misconfigurations
- Container Image Scanning: Scan all Docker images for vulnerabilities before deployment
4. Regular Manual Pentests as Complement
Automated tools are essential for scaling, but they don't replace the human eye. Recommended hybrid approach:
- Continuous: Argos for comprehensive, automated 24/7 monitoring
- Quarterly: Manual pentests for critical systems and complex business logic
- On Changes: On-demand tests after major releases or architecture changes
- Annually: Comprehensive red teaming for entire attack surface
For Your Organization
Ready to assess your external attack surface? We offer a free 2-week Argos PoC to analyze your attack surface and uncover critical vulnerabilities.