Importance
Medium
Small businesses are less likely to be affected while large organizations should treat this as high importance.
RISKS IF REQUIREMENTS ARE NOT MET
- Some sites and applications are left completely unprotected
- Increased risk of a data breach, escalation to other systems, or loss of reputation
Why you need it
It’s likely your organization has websites and web applications that are not part of your regular security processes yet still belong to you or represent your business. A successful attack on one of these applications may lead to a breach, allow attack escalation, or harm your reputation. For example, even the simplest campaign site associated with your business name may be used in a global phishing attack if it has a reflected XSS vulnerability.
What to look for
Look for a web application security solution that can find all the websites and web applications that belong to your business. Technically, this can be as simple as crawling for domain registration information and SSL certificate information. However, the leading tools employ many other techniques to support the discovery process.
How to evaluate
- Ask your vendor about techniques they are using to discover web assets.
- Request a custom discovery report from the vendor for your business name.
- When you test the software, look for any functionality that lets you automatically find targets to scan instead of adding them manually.
- When you find the discovery function, enter your business name to see what results it provides and how long it takes.