Outside-In
- 3 Minutes to read
- Print
- PDF
Outside-In
- 3 Minutes to read
- Print
- PDF
Article summary
Did you find this summary helpful?
Thank you for your feedback
Introduction
Info
SAFE continuously does the outside-in assessment for First-party and Third-parties.
- SAFE triggers the outside-in assessment once every 24 hours.
- For any change in the company profile, SAFE triggers the outside-in assessment and updates the SAFE Score.
The Outside-in assessment in SAFE includes:
- External email security assessment using the primary domain
- The email security assessment includes DNS-based configuration checks to ensure email spoofing security controls are in place.
- In addition to the primary domain and email of the administrator, users can add up to ten additional domains while configuring the External Assessment in SAFE Hooks.
- Users can generate the PDF report for their External Assessment from the Reports module. Users can also generate PDF reports from the External Assessment module. The External Assessment module also offers a CSV report download, helping users drive remedial actions better.
- Enumerate the entire digital footprint (entity attribution) using the primary domain
- Users will be able to leverage automated digital footprinting, i.e., based on the primary domain supplied at the time of initiation of external assessment, the additional scope of the assessment is automatically enumerated.
- The external assessment will not just happen on the primary domain and supplied email domains, but the additionally discovered scope. The additional scope includes sub-domain discovery, associated domain, and subdomain discovery.
- Users can see the enumerated digital assets under the Digital Footprint section in the comprehensive external report once the external assessment is completed.
- This section comprises three subsections: Primary Domain, Associated Domains, and sub-domains, along with some additional information like the location of the asset and their IP address.
- Web Application Security Headers Assessment
HTTP security headers are a fundamental part of web application security. Upon implementation, they protect you against the types of attacks your web application is most likely to encounter. These headers protect against XSS, code injection, clickjacking, and other web application threats. - TLS/SSL Misconfigurations and Certificate Issues
The organization tends to give less importance to how SSL / TLS is implemented, which, while deceptively simple, has many common pitfalls that pose a serious risk to the secure transfer of data across the world wide web and serve as a key indicator of security effectiveness. - Open Ports Exposures
Unintentional exposure of ports and services can be an easy attack vector for a malicious user. Organizations fail to maintain the public-facing services, leading to adversaries exploiting them for entry to the organization. - Malware Servers Assessments
As a part of the outside-in assessment for the organization, SAFE assesses Malware Servers. Upon completion of the assessment, users can view the control level insights for Malware Servers. - Assessment of DNS Security and TypoSquat Domains
SAFE external assessment includes the DNS Security and TypoSquat Domains for the organization as well their third parties. Once the scan is completed, you can see control level insights for DNS Security and TypoSquat Domain.
Info
- DNS Security assessment: DNS Security identifies gaps in the configuration of a DNS server. It also suggests best security practices to keep the client's DNS information secure by enforcing DNS Security Extensions.
- TypoSquat Domains: Typosquatting, also called URL hijacking, a sting site, or a fake URL, is a form of cybersquatting that relies on the possibility of people causing errors while entering the domain URL such as a common misspelling or a different TLD (Top Level Domain) and arriving at the Fake, unintended domains which are registered and controlled by malicious actors.
View external security assessment result
The outside-in dashboard displays the external security assessment report card for the parent organization (first-party). The report card includes the identified gaps categorized in five sub-groups: Critical, High, Medium, Low, and Informational.
You can drill down to the gaps' details by clicking any of the gaps.
View Digital Footprints
The outside-in page also displays the location-wise digital footprints on a world map and in a list at the bottom of the page, including IP addresses, domains, and locations.
Manage Exceptions
Refer to Manage Exceptions.
Was this article helpful?