7.6
IG2 IG3

Perform Automated Vulnerability Scans of Externally>Exposed Enterprise Assets

Asset Type: Applications
Security Function: Identify

Description

Perform automated vulnerability scans of externally-exposed enterprise assets using a SCAP-compliant vulnerability scanning tool. Perform scans on a monthly, or more frequent, basis.

Implementation Checklist

1
Document current state and create baseline inventory
2
Define data fields and attributes to track
3
Assign ownership and responsibilities
4
Establish review cadence and update procedures
5
Select and configure vulnerability scanning tool
6
Define scan scope, frequency, and credentials
7
Establish vulnerability remediation SLAs by severity
8
Create exception/waiver process for unremediated findings

Threats & Vulnerabilities (CIS RAM)

Threat Scenarios

Internet-Facing Vulnerability Exploitation by Automated Scanners

Confidentiality

Threat actors continuously scan internet-facing assets using tools like Shodan and Censys to identify exploitable vulnerabilities in web servers, VPN gateways, and email systems that the organization has not detected through its own external scanning.

Perimeter Service Compromise via Undetected Misconfigurations

Integrity

Externally exposed services with misconfigurations such as open admin panels, exposed API endpoints, or weak TLS configurations are discovered and exploited by attackers before the organization identifies them through external vulnerability scanning.

Exploitation of Shadow Internet-Facing Assets

Confidentiality

Externally exposed assets that were provisioned outside normal change management, such as development servers or test environments, contain critical vulnerabilities that are never scanned because no automated external scanning program exists.

Vulnerabilities (When Safeguard Absent)

No Automated External Vulnerability Scanning Program

The organization does not perform regular automated vulnerability scans of its external attack surface, leaving internet-facing assets unassessed while attackers continuously probe them for weaknesses.

Incomplete External Asset Scope for Scanning

External vulnerability scans cover only known IP ranges and domains, missing cloud-hosted assets, CDN endpoints, third-party hosted services, and shadow IT exposed to the internet.

Scan Frequency Below Monthly Cadence

External scans are performed quarterly or less frequently rather than monthly, creating windows of exposure where newly published vulnerabilities in perimeter systems go undetected for extended periods.

Evidence Requirements

Type Evidence Item Collection Frequency
Document Current inventory or catalog documentation Maintained continuously, reviewed quarterly
Document Process/procedure documentation for identification activities Reviewed annually
Technical Vulnerability scan reports showing scope and findings Per scan cycle
Record Vulnerability remediation tracking with SLA compliance metrics Monthly
Document Governing policy document (current, approved, communicated) Reviewed annually