Sold by: NCC Group
Are you sure you know all your external-facing assets? We know from experience that even a single unknown asset can open you to exploits.
At NCC Group, we help you gain full visibility of your external attack surface by identifying risks tailored to your unique risk appetite. Our team not only prioritises these findings but also develop a custom remediation plan, allowing you to focus on critical mitigation efforts.
We free up your team’s valuable time, by handling triage, analysis and planning and provide actionable insights that reduce your overall risk exposure. We help clients: Visualise the invisible – what assets are present in your environment, Get the basics right – tuning is key, Intelligent action – Prioritisation for mitigating activities based on contextualised and relevant data
Overview
The EASM service aims to give the client visibility of their external facing assets, identify their appetite to risk and enable effective prioritisation and remediation where it matters most. NCC Groups Managed service wrap will take all the hard and time consuming work of correlating results, understanding what they mean to the organisation and prioritising remediation activities, providing the client with streamlined and actionable result so they know where to focus their attentions first. Thus removing overhead on the clients security teams, and freeing up their time for those all-important mitigating activities.
The service comprised high-level of:
• Regular external asset discovery and validation – ensuring NCC and Clients are always working with the latest asset inventory. Including IPs, Domains, Web Apps and certificates.
• Subsidiary breakout – Highlighting which assets belong to which subsidiary, streamlining action and responses from applicable security teams.
• Regular risk, vulnerability and misconfiguration identification (exposures)
• API integration for cloud environments Eg, AWS, GCP, Azure.
• Comprehensive coverage across AWS cloud, on-premises servers, user endpoints, and network devices.
• Cloud Visibility Dashboard - to view specific risks to cloud assets within the AWS, Azure, and GCP environments monitored.
• Exploit intelligence – providing additional context based on the criticality of an asset, exposures present and whether exposures are of high interest from attack vectors
• Exposure analysis – providing updates on any emerging threats and zero day vulnerabilities that may affect the client
• Prioritization and recommendations – Providing intelligent action to client. Where does the client need to focus their efforts to make the most impacting to reducing their appetite for risk. What actions are needed to mitigate an exposure.
• Unauthenticated web application scanning
• Asset chaining – Highlighting which assets relate to each other, E.G identifying certificates and webapps relating to an IP and vice versa.
• Daily ports and services – monitoring for baseline changes against ports and services of importance to the client.
• Actionable insight – providing remediation plans, remediation steps and guidance on how to safely exploit an exposure in your environment for testing purposes.
• Portal access - Access to NCC Groups portal for ticket notifications and relevant information to action and remediate accordingly. Providing a single pane of glass with interactive dashboards.
• AWS Hosted Console: The ASM management console and backend run in the AWS and / or GCP Cloud
• Feeds into the AWS shared responsibility model – aiding clients to meet their responsibility for securing data and configurations and be compliant with organisational policies
• Enables coverage of asset in autoscaling scenarios such as cloud environments
• Complementary to AWS vulnerability management tools such as:o Amazon Inspector – Helps detect vulnerabilities in applications deployed by AWS
o AWS Security Hub – Providing organisations with a view of their security state within AWS, aggregating security findings from multiple AWS services
o Amazon Guard Duty – Continuously monitors AWS accounts and workloads for malicious activity
o AWS Config – assess, audit and evaluate the configuration of AWS resources
Highlights
- Regular external asset discovery without the need for seed information, breaking results into subsidiary and asset location: IPs, Web Apps, Domains and Certificates
- Risk, vulnerability and misconfiguration identification
- Results enhanced with Threat/Exploit Intelligence based on what is actively being exploited by attackers. Providing full visibility of your external attack surface and appetite for risk. Providing full visibility of your external attack surface and appetite for risk.
Details
Unlock automation with AI agent solutions
Fast-track AI initiatives with agents, tools, and solutions from AWS Partners.

Pricing
Custom pricing options
Pricing is based on your specific requirements and eligibility. To get a custom quote for your needs, request a private offer.
How can we make this page better?
We'd like to hear your feedback and ideas on how to improve this page.
Legal
Content disclaimer
Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.
Support
Vendor support
Full managed service delivered by a dedicated NCC Vulnerability Consultant. Get Support