The Most Comprehensive Solution

Continuous Threat Exposure Management

What is CTEM?

Continuous Threat Exposure Management (CTEM) is a proactive and continuous five-stage program, or framework, that reduces exposure to cyber attacks. It helps organizations identify vulnerabilities and exposures, correlate them to potential attack paths, prioritize them based upon their risk to critical assets, and monitor progress as they implement remediation activities. Organizations worldwide are leveraging CTEM to efficiently address exposures and improve their security posture. 

CTEM continually assesses an organization’s entire ecosystem–including networks, systems, assets, and more–to identify exposures and weaknesses with the goal of reducing the likelihood of these weaknesses being exploited. Having a CTEM program can enable continual improvement of security posture by identifying and remediating potentially problematic areas before attackers can exploit them.

The “continuous” element of CTEM refers to a give-and-take relationship between the CTEM program and the associated risk remediation efforts, wherein data stemming from both aspects informs processes to make ever-more optimal decisions about how to manage exposure risk. According to Gartner® in their report Implement a Continuous Threat Exposure Management (CTEM) Program, Published 21 July 2022, “The objective of CTEM is to get a consistent, actionable security posture remediation and improvement plan that business executives can understand and architecture teams can act upon.” The fundamental objective of CTEM is to lower the probability that weaknesses will be leveraged.

What are the 5 Stages of CTEM?

CTEM is an umbrella program that implements an approach to exposure reduction. Accordingly, it isn’t a product or service, but the right product(s) can help implement it in your organization. The five stages of CTEM are described below.

Stage 1 Scoping

This first stage encompasses understanding your attack surfaces and how important each asset is to your business, both of which will change over time. It includes identifying key attack surfaces, and it requires input from various decision-makers, such as leaders from IT, Legal, GRC, Dev, R&D, Product, and Business Ops teams.

Stage 2 – Discovery

The discovery stage consists of assessing each asset for potential exposures and analyzing how the exposures correlate particular risks. This extends beyond just standalone vulnerabilities in that it includes other types of exposures – such as Active Directory, identity and configuration risks – as well as how exposures can be chained together to enable attack paths towards assets. 

Stage 3 – Prioritization

In the prioritization stage, the exposures are analyzed to weigh the level of known threat they’ve posed ‘in the wild’ and the importance of the assets directly impacted. 

This step is crucial, because large organizations uniformly find that there are far more exposures than they’ll ever be able to fix. Why? Partly because of sheer volume, and partly because their environments are constantly changing – new assets, users, software, configuration settings, and more.

Prioritization has traditionally been limited to vulnerabilities, excluding other exposure types, such as identities and misconfigurations. And it hasn’t considered how the exposures relate to potential attack paths to critical assets. With CTEM, prioritization makes clear which remediations are most beneficial for reducing the greatest amount of risk to critical assets.

Stage 4 – Validation

The validation stage looks at how attacks can occur and the likelihood of their occurrence. This step can leverage a variety of tools for different uses. In some cases, validation is performed to enable prioritization, as in Stage 3 above. In other cases, validation can be valuable in continually testing security controls or to automate periodic pen testing.

Stage 5 – Mobilization

This stage, which in a sense serves as the facilitating factor for the entire framework, is where you make sure everyone is on the same page and understands their role and responsibilities within the context of the program. Mobilization is optimized when both the security team and the IT teams involved in remediation have clarity around the risk reduction value of any remediation effort, as well as reporting to show the overall trend of improvements made to security posture over time. 

 

What Problem is CTEM Solving, and Why Now?

Organizations implement CTEM because otherwise, they are faced with the following frustrating situation:

  • When they execute a comprehensive discovery, they find an overwhelming volume of exposures – far more than they can actually fix, and some of which they simply can’t fix.
  • The exposures are typically separated into different lists based on the tools available for different types of exposure, and for different environments – on-premise, cloud, container, traditional vulnerability, configuration issue, identity exposure, Active Directory issue, and more.
  • Organizations have no way to aggregate the exposures, place them into context according to actual risk (based on how an attacker can exploit the current configuration of their environment), and prioritize remediation activities. So, they waste time on fixing exposures that don’t matter, or they essentially give up.
  • Furthermore, where they do make progress, they have no way to correlate it to overall organizational risk, or to illustrate how their efforts are making a difference.

All this is despite decades of using traditional vulnerability management tools, and even more recent breach and attack simulation (BAS) tools. The failure of these tools to protect against attacks is a primary reason that CTEM is a top priority now.

Is CTEM the Right Solution?

According to Gartner, “CTEM programs expand traditional cybersecurity assessment.” Further, the report also notes that CTEM programs use cybersecurity technology to “Align the scopes of exposure assessment cycles with specific business projects and critical threat vectors.” and “Validate the enterprise’s exposure and remediation priorities by including the attacker’s perspective, and testing the effectiveness of security controls and incident response processes.” This ensures that security efforts are precisely tailored to the areas that matter most to an organization, enhancing the efficiency and efficacy of security measures. And CTEM provides a holistic view of risk – one that can be tracked over time to correlate remediation activity with posture improvement.

How Valuable is CTEM?

The value of CTEM correlates to the size of the problem and the improvements that organizations see when they implement it. In XM Cyber’s own research  Navigating the Paths of Risk: The State of Exposure Management in 2024, we find that:

  • Larger enterprises can have over 250,000 open vulnerabilities.
  • However, research shows that firms only fix about 10% of those open vulnerabilities, leaving the rest in place.
  • Yet 75% of exposures don’t lead to another asset – they are “dead ends” to attackers. Furthermore, only 2% lead to critical assets. 

Forrester’s Total Economic Impact Study, 2022 finds a 90% reduction in likelihood of a severe breach for those organizations with a proper solution in place, and an ROI of up to 400%.

What Does Gartner Say About CTEM?

“By 2026, organizations prioritizing their security investments, based on a continuous threat exposure management program, will realize a two-third reduction in breaches”, Gartner Top Strategic Technology Trends for 2024: Continuous Threat Exposure Management, Published 16 October 2023

Debunking a common “detection-based” approach, CTEM proposes that focusing on events rather than posture is a losing approach in the long term. Attackers have proven that. Only a prioritized, continuous, threat-based approach will be successful in the long run. In other words: implement CTEM.

Furthermore, as mentioned above, Gartner outlines a five-step process that organizations can follow to properly manage their exposures. As we see it, critical to those steps are the following:

  • Going beyond vulnerability management to understand critical assets and how they can be attacked
  • Developing an ongoing, continuous process 
  • Prioritizing findings based on actual risk and impact to the environment, from an attacker’s perspective
  • Executing and validating based on the above

 

How is CTEM Different from Vulnerability Management/RBVM?

Risk-based Vulnerability Management (RBVM) is a cybersecurity strategy designed to help organizations limit risk through the strategic prioritization of vulnerability remediation. To accomplish this, organizations use tools to assess existing cybersecurity vulnerabilities and determine the amount of risk each vulnerability poses to business-critical assets based on known exploitation of vulnerabilities “in the wild”.

Automating this process is certainly essential, given the scale involved, which is why they’ve existed for decades. In 2020, 17,000 new vulnerabilities were reported – a rate that equals one new vulnerability every six minutes. Attackers waste no time seeking to develop exploits, which means that defenders must be equally nimble and fast to respond.

However, defenders using these tools are overwhelmed with the job of managing cyber vulnerabilities. Even large, well-funded organizations can’t patch all the vulnerabilities they discover. There are simply too many vulnerabilities, and there are systems that can’t be patched, as well as supply chain dependencies.

Critically, RBVM is limited to prioritizing only vulnerabilities (CVEs), and doesn’t address identity issues and misconfigurations that attackers regularly exploit.

CTEM dramatically focuses and reduces remediation efforts by prioritizing efforts across all exposure types, not just CVEs, based upon the impact of real risk to critical assets. And it provides a holistic process for managing that risk over time. In this way, CTEM elevates RBVM, augmenting it with broader exposure coverage, real-world attacker information and remediation insights.

 

How is CTEM Different From Red Team Exercises?

Red Team exercises are performed to achieve specific goals, such as evaluating the ability of attackers to reach business-critical applications. According to IBM, Red Teaming is “heavily focused on emulating an advanced threat actor using stealth, subverting established defensive controls and identifying gaps in the organization’s defensive strategy. The value of this type of engagement can be derived from a better understanding of how an organization detects and responds to real-world attacks.”

Red Team exercises are valuable to (a) identify and uncover one or more particular attack paths to critical assets and (b) test the ability of defenders to detect the attackers. However, they’re manual exercises that are expensive and only performed periodically. Also, they don’t uncover all the attack paths that could be taken, or prioritize the fixes required to prevent them. In other words, they are good for testing existing defenses, but poor for making regular, comprehensive posture recommendations.

Unlike one-off Red Team exercises, CTEM provides an ongoing, holistic analysis of defenses; it prioritizes remediation efforts to shore them up; and it tracks improvement over time.

How is CTEM Different From Penetration Testing?

Penetration testing is similar to Red Team exercises in that both use a testing methodology in an attempt to assess an organization’s cyber defenses. However, pen testing is typically performed periodically during well understood timeframes, and typically looking for known vulnerabilities. Pen tests assess if applications, networks, platforms, and systems can be breached, and are used to find issues that need to be addressed.

As with Red Team exercises, pen testing suffers from an inability to assess the full environment, and it only provides a point-in-time assessment – one that’s lacking in prioritization, and almost immediately out of date. Penetration testing results will deliver highly confident results for a limited scope, but with a highly manual effort.

CTEM provides an ongoing, holistic analysis of defenses; it prioritizes remediation efforts to shore them up; and it tracks improvement over time. In fact, according to the Forrester Total Economic Impact Study, 2022, organizations that use a CTEM-oriented attack path solution can reduce their penetration testing costs of up to $1.4 million over three.

How is CTEM Different From Breach and Attack Simulation (BAS)?

Breach and Attack Simulation (BAS) solutions offer a different approach for performing automated security testing. Some BAS tools challenge the existing security infrastructure, while others are designed to test existing security controls to ensure they are working as expected.

Breach and Attack Simulation, pen testing, and Red Teaming all simulate attacks to hypothesize the outcomes of real-world scenarios. They are used to assess and find issues that need to be addressed. Their use, though, is limited by the operational risk they create, as running these live tests can put the security team at risk of creating performance issues- or worse, outages- on production systems. These tools are used periodically across a fraction of the overall environment, leveraging only a subset of all possible attack techniques. While still valuable for finding issues, this approach is incomplete. 

A CTEM solution analyzes the complete environment, and it covers a broader array of exposures. It provides an ongoing, holistic analysis of defenses; it prioritizes remediation efforts to shore them up; and it tracks improvement over time.

How is CTEM Different From IAM and ITDR Solutions?

Identity and Access Management (IAM) and Identity threat detection and response (ITDR) solutions are laser focused on identities. These are critical to an organization’s security posture, since most attacks take advantage of an identity vulnerability somewhere along the attack path. However, they don’t include an evaluation of non-identity exposures, or any ability to determine potential attack paths to critical assets. Thus, their view into an organization’s environment is quite limited.

A CTEM solution analyzes the complete environment, and it covers a broader array of exposures. It provides an ongoing, holistic analysis of defenses; it prioritizes remediation efforts to shore them up; and it tracks improvement over time.

How is CTEM Different From External Attack Surface Management (EASM)?

External Attack Surface Management (EASM) is the process of continuously discovering and inventorying the risks of external assets to potential breaches. It’s fully focused on the initial breach points of an attack – your IT environment’s “external surface”. As such, it’s conducted from outside your environment, and it provides no insight into further steps an attacker would take beyond that initial breach.

CTEM looks beyond the surface to understand the full set of exposures in your environment, as well as how an attacker can chain together a set of exposures into an attack path reaching critical assets. CTEM provides a much more complete list of exposures than ASM can provide, and it can give you a much more meaningful assessment of your cyber security risk. Furthermore, CTEM has the context to prioritize those exposures for you so you can remediate with confidence and efficiency.

How is CTEM Different From Cloud Security Posture Management (CSPM)?

Cloud security posture management (CSPM) solutions identify misconfiguration issues and compliance risks in the cloud. CSPM helps monitor cloud infrastructure for exposures and gaps in security policy enforcement. Given the growth in the combined IaaS, PaaS and SaaS markets (projected at over 17% annually through 2027), this is clearly an area of importance. In fact, experts project that 99% of records compromised in cloud environments will be the result of user misconfigurations and account compromise.

However, most organizations, especially large ones, have environments consisting of remote employees, on-premises assets, and multiple cloud vendors. So a CSPM is fundamentally a piecemeal solution. It doesn’t provide a holistic view into their security posture, and it can’t prioritize remediation efforts organization-wide. This is particularly important since many attacks involve a compromising a combination of remote assets, on-premise assets, and cloud assets. 

A CTEM solution takes all this into account, by incorporating cloud assets into a holistic view of an organization’s environment. Attack path analysis and posture assessment includes all types of assets, and remediation recommendations are prioritized accordingly. Total organizational security is the domain of CTEM.

How do I Choose a CTEM Vendor?

While CTEM is a strategy rather than a product category, there are several key aspects of solutions that you should evaluate when choosing tools related to CTEM.

Breadth of exposure detection – What different types of exposures does the solution encompass, such as traditional vulnerabilities, misconfigurations, identity issues, and more?

Environmentally comprehensive – Does the solution cover all workstations, entities, virtual machines, containers, user activity, cloud resources, and configurations, etc., as part of analysis to ensure you can see all ways your organization is at risk to plan prioritized remediation efforts?

Risk contextualization – How well does the solution combine its knowledge of exposures, network paths, and critical assets into a view of potential attack paths? And how does it display this information for defenders so that both security and IT teams understand the value of their remediation efforts?

Remediation prioritization – Does the solution analyze potential attack paths and prioritize them by the impact they pose to critical assets, so you know what to fix to disrupt the most damaging attack paths first? And can it detect “dead ends” that don’t need to be fixed in the short term?

Remediation assistance – With its knowledge of exposures and attack paths, can the solution provide concrete remediation guidance to implement fixes, improving both consistency and efficiency?

Continuous evaluation – Given that IT environments are constantly changing, does the solution perform continuous evaluations to detect new exposures and new attack paths that will surely appear? Does it also keep up to date with the latest vulnerabilities and attack techniques? And can it track changes in security posture over time?

Executive reporting – Can the solution combine organization-wide risk assessments and trending information into executive-level reporting, to answer such questions as, “Where are we most vulnerable?” and, “How is our risk posture improving over time?”

Operational safety and impact – How easy is the solution to deploy and manage? And what potential risks, if any, does the deployment have on your production environments?

Another way to evaluate vendors is to consider these questions, and how different vendors answer them.

  • Which of my critical assets are at risk today?
  • What paths would allow an attacker to reach them?
  • Where are all the exposures in my environment?
  • Which ones are most important to remediate to protect my critical assets (i.e. choke points)? Which are least important (i.e. dead ends)?
  • How can you show me an overall score or assessment of my posture in protecting my critical assets? Can you help me demonstrate improvement over time?

Does CTEM Cover Both On-prem and Cloud Environments?

Absolutely. Fundamental to CTEM is a full analysis of exposures and how they impact the risk to critical assets. In almost all organizations, exposures span remote workers, on-premise equipment, and cloud resources. While seemingly separate, these environments are, in fact, highly integrated. And often the assets come from multiple different vendors, with different management systems. To understand attack surfaces, attack paths to critical assets, and overall risk, all these environments must be considered in a holistic way – the way an attacker will view them. 

 

attack surfaces

71% of orgs have exposures in their on-prem networks that put their critical assets in the cloud at risk. Once there, 92% of critical assets become vulnerable.

 

Accordingly, XM Cyber’s CTEM solution encompasses your whole environment.

 

For more information on how XM Cyber incorporates your cloud environment into a CTEM solution, check out The Power of Attack Paths in the Cloud.

Who is Benefiting From CTEM Now?

Any organization with a formal cyber security program can benefit from CTEM, and adoption is becoming mainstream. Accordingly, a recent Gartner study of 247 organizations found that 29% had already implemented a CTEM program, with another 46% having their CTEM program under development- a 75% “penetration rate” of CTEM into these organizations.

XM Cyber similarly sees many different types of organizations using our solution in support of their CTEM program, including the following examples:

  • A leading US insurance firm taking the next step beyond vulnerability scanners and antivirus software.
  • A major international port authority looking to gain insight and control into security posture that could be impacted by over 100 local administrators.
  • One of the largest retailers in the world, with over 500,000 employees, improving the efficiency of remediation, and better coordinating activities between security and IT teams.

Why Should I Choose XM Cyber for CTEM?

XM Cyber is the most comprehensive approach to Continuous Exposure Management.  As the only solution to address all 5 stages of CTEM, it seamlessly helps organizations build a proactive, risk-based, and tailored approach that aligns security with business goals.Here is how we do it:

Scoping – XM Cyber maps critical business processes to underlying IT assets to prioritize exposures based on risk to the business
Discovery – Discovery of all CVEs and non-CVEs (misconfigurations, identity risks, over-permissions) across on-prem and cloud environment and across internal and external attack surfaces.
Prioritization – Faster, accurate prioritization based on proprietary Attack Graph Analysis™ that leverages threat intelligence, complexity of the attack path the number of critical assets which are compromised  and whether it’s on a Choke Points to multiple attack paths.
Validation – Validation of whether issues are exploitable in a specific environment and if security controls are configured to block them.
Mobilization – Improved remediation, owing to a focus on Choke Points, context-based evidence, remediation guidance and alternatives. The platform is also integrated with ticketing, SIEM, and SOAR tools to track remediation progress.