Introduction
Outside-In Assessment in SAFE evaluates an organization’s external attack surface by analyzing publicly exposed assets, such as domains, IP addresses, applications, and services.
It focuses on identifying:
Internet-facing vulnerabilities
Misconfigurations
Exposed services
Breach and reputation risks
This approach simulates how an external attacker views the organization, without requiring internal access.

Outside-In Assessment in SAFE
SAFE performs Outside-In Assessment using a combination of:
Digital Footprint Discovery
Identifies external assets (domains, subdomains, IPs)
Uses an enhanced attribution framework to map assets to organizations
Supports high-confidence attribution with reduced false positives (~2%)
Continuous Findings Detection
Scans for vulnerabilities across:
System Security
Network Security
Application Security
DNS & Email Security
Detects issues like:
Open ports/services
SSL/TLS misconfigurations
Missing SPF/DKIM/DMARC
Known CVEs
Threat Intelligence Integration
Leverages 100+ threat intelligence sources
Includes:
Vulnerability feeds
Internet scan data (e.g., service exposure)
Breach and incident datasets (since 2021)
Fourth-Party Risk Detection
Identifies dependencies on external vendors/services
Uses signature-based and correlation techniques
Refresh
Findings refresh: every 15 days
Attribution refresh: 30–60 days
Navigate to the Outside-In Assessment
Navigate to a Third-party details page.
Click the Outside-In Assessment card.
The Outside-In page provides:
Summary view
Findings breakdown
Detailed findings table
Summary View
The Outside-In Findings Summary provides a category-wise snapshot of detected issues.
Categories displayed (as per UI):
System Security
Network Security
Application Security
DNS Security
Email Security
Patching Cadence
Cyber Reputation
Compromised Systems
Breach Exposure
What each tile represents:
Total number of findings (instances) in that category
Severity distribution (color-coded):
🔴 Critical
🟠High
🟡 Medium
🟢 Low
⚪ Informational
Example Insight from Screenshot:
Network Security: ~6.5K instances → high exposure area
Application Security: ~1.12K instances
DNS Security: 0 (no issues detected or no data)
Compromised Systems: 6 (requires immediate attention)

Drill-down Capability
Clicking a category opens a detailed modal view, showing:
Severity-wise distribution: Critical, High, Medium, Low, Informational
Finding names (e.g., "Potentially Exploitable Systems")
Impacted asset count per finding

Outside-In Findings List
Navigate to the Outside-In page for a third-party.
Scroll to the Outside-In Findings section.
View the findings table
Here you can see the following details:
Name: Finding title (e.g., CVE, misconfiguration)
Severity: Critical / High / Medium / Low
Finding Score: Risk score indicating severity & exploitability
Mapped Controls: Linked SAFE control categories (e.g., SSW, DTE, HAOS)
Asset Count: Number of impacted assets
Key Capabilities
Search & Filter: Filter by severity, score, or control
Sorting: Sort by risk score or asset count
