Technical20 min read

Cyber Asset Attack Surface Management (CAASM): Explained

Cyber Asset Attack Surface Management (CAASM) is the inside-out attack surface discipline. The platform reads existing security and IT systems through API connectors (the CMDB, the cloud provider IAM and tag tables, the endpoint protection inventory, the identity provider directory, the mobile device manager, the SaaS admin consoles, the vulnerability scanners, the application security tools, the cloud security tools, the network discovery tools, the certificate inventory), consolidates the asset records they already hold into one cyber asset register, resolves the identity of each asset across overlapping sources, maps each asset to its security tool coverage, business owner, and exposure relationships, and exposes the resulting record so security teams can answer recurring buyer-side questions of the form what do we own, what is unmanaged, where is security tooling missing, who owns each asset, and what is reachable from what. For CISOs, security architects, internal security teams, AppSec teams, vulnerability management teams, cloud security teams, GRC teams, and the security leaders who sponsor the programme, CAASM is the layer that answers a question the other security disciplines cannot answer on their own: what assets is my coverage actually reaching, and where is it not. This guide covers what CAASM is and what it is not, the five capability layers (Source Aggregation, Asset Normalisation and Identity Resolution, Relationship and Exposure Graph, Coverage and Control Mapping, Operating Record), how CAASM differs from EASM, the CMDB, vulnerability management, CSPM, ITDR, and CTEM, the buyer-side questions a CAASM record actually answers, the recurring adoption pitfalls, the audit-read shape of the operating record against ISO 27001, SOC 2, NIST 800-53, PCI DSS, and NIST CSF 2.0, and a phased rollout that takes an enterprise from fragmented asset systems to a single defensible cyber asset record.

What CAASM Actually Is

Cyber Asset Attack Surface Management is the inside-out asset reconciliation discipline. The platform does not run new discovery scans, does not emulate attacker techniques, and does not detect exposures the underlying tools have not already detected. It reads the records the underlying tools have already produced, normalises them into one cyber asset register, resolves identity across overlapping sources, and exposes the unified record as a queryable asset surface. The differentiator is consolidation and reconciliation, not detection.

The motivation is that every mature enterprise already has the asset data; it lives in a dozen separate systems with overlapping but inconsistent views. The CMDB knows about a hostname. The cloud account knows about an instance with that hostname but a different IP. The endpoint protection console knows about an agent installed on a device with that hostname, registered to a user. The identity provider knows about that user, in a group, with a set of role grants. The vulnerability scanner knows about findings against an asset with that IP but a different hostname. The SaaS admin console knows about a workspace owned by the same user. Each system holds part of the truth. Asset records disagree in subtle ways (different hostnames, different IP addresses, different ownership attribution, different lifecycle state). The team cannot reliably answer questions like which endpoints have no EDR coverage, which cloud workloads are not in CSPM scope, which identities have privileged grants but no MFA, or which applications in the portfolio have never been pentested, because the answer requires joining records across sources that were never designed to be joined.

CAASM closes that gap. The platform sits as a read-only consolidation layer on top of the existing tooling. The category label was popularised by Gartner around 2021 to 2022 to name the discipline that vendors like Axonius, JupiterOne, Sevco Security, runZero, Lansweeper, and Noetic Cyber had been building independently. The label is now the default term enterprise security buyers, architects, and CISOs use when describing the asset record consolidation problem alongside attack surface management, vulnerability management, cloud security posture management, identity threat detection, and exposure management.

The Five Capability Layers of a CAASM Platform

A mature CAASM platform has five capability layers. The layers depend on each other: a gap in any of them weakens the assurance the platform produces. Buyers evaluating CAASM vendors should benchmark each layer against the named source systems the team actually runs and against the asset classes the team actually owns, not against the vendor demo.

Layer 1: Source Aggregation

Source Aggregation is the connector layer. The platform reads asset records through API connectors from every security and IT system the enterprise runs: the on-prem and cloud CMDB (ServiceNow CMDB, BMC Helix, Device42), the cloud provider control plane (AWS Config and Organizations, Azure Resource Graph, Google Cloud Asset Inventory), the cloud security tool (CSPM, CNAPP, KSPM), the endpoint protection console (CrowdStrike, SentinelOne, Microsoft Defender for Endpoint, Carbon Black), the identity provider (Microsoft Entra ID, Okta, Ping, Auth0, JumpCloud, the on-prem directory), the mobile device manager (Intune, Jamf, Workspace ONE), the SaaS admin consoles (Google Workspace, Microsoft 365, Salesforce, GitHub, GitLab, Atlassian), the vulnerability scanners (Nessus, Qualys, Rapid7, Tenable.io, Wiz, authenticated and external web scanners), the application security tools (SAST, SCA, DAST), the network discovery tools (passive network discovery, NDR inventory), the certificate inventory, and the secrets manager records. The Source Aggregation breadth is the main differentiator between CAASM vendors. A platform missing a connector to a source the team relies on produces an asset record with structural blind spots that the rest of the stack cannot fill in.

Layer 2: Asset Normalisation and Identity Resolution

Asset Normalisation and Identity Resolution is the join layer. The platform takes the raw records from every source and reconciles them into one normalised asset record per real-world asset. Identity resolution is the hard problem: the same asset appears under different hostnames, different IP addresses, different MAC addresses, different cloud resource IDs, different agent IDs, different inventory IDs, and different ownership labels across the source systems. The reconciliation rules combine deterministic match keys (cloud resource ID, agent ID, certificate fingerprint, MAC address), heuristic match keys (hostname plus IP plus timestamp, hostname plus department plus owner), and lifecycle reasoning (the asset that disappeared from one source and appeared in another with similar attributes is likely the same asset renamed rather than two assets). The output is a normalised cyber asset record with stable identity over time, an audit trail of which source contributed which fields, and an explicit conflict log for the records that could not be unambiguously reconciled. Identity resolution transparency is the second main CAASM differentiator. Platforms that hide the rules produce records that look clean until the team starts acting on them and discovers the wrong assets were merged.

Layer 3: Relationship and Exposure Graph

The Relationship and Exposure Graph is the structure layer. The platform models the relationships between assets (network reachability, identity grants, dependency chains, ownership, lifecycle state) and overlays each known exposure type onto the graph (a vulnerability attaches to an asset; a misconfiguration attaches to an asset; a privileged identity attaches to an asset; a missing control attaches to an asset). The graph is what lets the operating record answer relational questions: which assets are reachable from the public internet, which assets have a privileged identity that is also attached to a critical data store, which workloads in the production cloud account inherit a vulnerable base image, which applications depend on a deprecated runtime. Graph depth varies across vendors. Some CAASM platforms model only attribute relationships (the asset belongs to this account, this account is owned by this group); the more capable vendors model reachability and identity blast radius as first-class relationships. Graph breadth matters when the security question requires lateral reasoning rather than just attribute filtering.

Layer 4: Coverage and Control Mapping

Coverage and Control Mapping is the exposure layer. For every asset in the consolidated record, the platform names the security tools that cover it, the controls that apply, and the controls that are missing. The output is a coverage matrix per asset type: every server has or does not have EDR, every cloud workload is or is not in CSPM scope, every identity has or does not have MFA, every privileged account is or is not vaulted in PAM, every internet-facing application has or has not been pentested in the last twelve months, every production environment has or does not have authenticated scanning enabled. Coverage mapping is what converts the consolidated asset record into a security programme input. A list of assets without a coverage map is just an inventory; a list of assets with named tools attached and named gaps surfaced is an operating record the security team can act on. Control framework mapping (ISO 27001 Annex A controls, NIST 800-53 control families, PCI DSS requirements, CIS Controls, NIST CSF 2.0 outcomes) sits on top of the coverage map and converts technical coverage into audit-read evidence.

Layer 5: Operating Record

The Operating Record is the consumption layer. The consolidated record, the graph, the coverage map, and the framework mapping are exposed through dashboards (named gaps per asset class), queries (security team, AppSec, GRC, audit, incident response can run their own questions), alerts (a new unmanaged asset appeared, a coverage gap widened, an asset retired from one source but persisted in another), report exports (audit-ready coverage extracts, customer due diligence packs, M and A diligence snapshots), and integrations outbound to the security and ticketing tooling so the gap closure work flows into the existing operating cadence. Operating Record maturity is what separates a CAASM platform from a one-time consolidation script. Platforms that produce a clean asset record but no way to operate against it leave the gap closure work to whoever exports CSVs.

CAASM vs EASM, CMDB, Vulnerability Management, CSPM, ITDR, and CTEM

Six adjacent categories overlap with CAASM. The boundaries are operational rather than strict definitional. The table below summarises how each differs from CAASM and where the disciplines reconcile in a mature programme.

CategoryWhat it doesRelationship to CAASM
EASMExternal-side attack surface management. Outside-in discovery against the public internet with WHOIS, DNS, certificate, ASN, and content attribution.Adjacent. EASM extends the asset record with externally discovered exposure the internal sources cannot see; CAASM reconciles the EASM-discovered assets with the inside-out source-of-truth record.
CMDBIT operations-side authoritative configuration record, populated by discovery scans and change management workflows, consumed by ITSM processes.Source. CAASM reads the CMDB as one of its source systems alongside cloud, identity, endpoint, mobile, SaaS, and vulnerability records, then reconciles. CAASM does not replace the CMDB.
Vulnerability managementDetection of known CVEs and misconfigurations against assets reachable by the scanner stack, with prioritisation and remediation tracking.Consumer. Vulnerability management uses the CAASM record to answer which assets the scanner stack is not reaching and where coverage gaps live, then drives remediation against the consolidated record.
CSPMCloud control plane posture management against a standing policy for misconfiguration, drift, identity grant, and tag hygiene.Source and consumer. CSPM contributes cloud-side asset and posture records to CAASM and consumes the CAASM coverage map to identify cloud accounts and workloads it has not yet reached.
ITDRIdentity-side detection and response on directory services, identity providers, privileged access, and SaaS session telemetry.Source and consumer. ITDR contributes identity-side asset records (human and non-human identities, role grants, federation trusts) to CAASM and consumes the CAASM coverage map for identity coverage gaps.
CTEMContinuous Threat Exposure Management: scoped exposure cycle across vulnerability management, ASM, AppSec, configuration, identity, and human-led testing.Consumer. CTEM uses the CAASM record as the structural input to the Scoping and Discovery stages, so the cycle is anchored on the assets the organisation actually owns rather than on the assets a particular scanner happened to see.

The Buyer-Side Questions a CAASM Record Answers

The reason enterprise programmes invest in CAASM is not the asset record itself; it is the answers the record supports. Five questions recur across buyer-side conversations, and each one is a structural reason a security programme cannot answer it from any single existing system.

What do we actually own

The unified asset count across the CMDB, the cloud accounts, the endpoint inventory, the identity directories, the mobile fleet, and the SaaS estate, after cross-source identity resolution. The number is not the sum of the per-source counts because each source includes retired assets, duplicates, and overlaps with other sources. The CAASM-resolved count is what leadership reports to the board, what customer due diligence questionnaires answer, and what regulators ask during M and A diligence and incident reviews.

What is unmanaged

Assets that exist in one source but are missing from the control records that should cover them. The endpoint registered in the directory but with no EDR agent installed. The cloud workload in the cloud account but with no CSPM coverage and no authenticated scanning. The identity with privileged grants but with no MFA enrolment. The internet-facing application in the portfolio but with no AppSec testing in the last twelve months. Each gap is actionable; each gap names the asset, the missing control, and the business owner who can authorise the remediation.

Where is security tooling missing

The structural coverage gap by surface, by region, by business unit, by asset type, expressed as a list of named assets rather than as a percentage. Percentage coverage is misleading when the missing five percent are the most critical assets in the estate. Named-asset coverage gaps drive concrete remediation work that the programme can close and demonstrate closure of in the next cycle. The structural gap also feeds the budget conversation; a coverage gap of 12 percent of cloud workloads against CSPM is the input the platform team needs to argue for CSPM expansion in the next budget cycle.

Who owns each asset

The named business and technical owner reconciled across the CMDB, the cloud tags, the application portfolio, and the directory groups. Ownership attribution is the bottleneck for vulnerability remediation in most enterprise programmes. A finding with no owner is a finding that never closes. CAASM-resolved ownership lets vulnerability management, AppSec, and security operations route findings to the actual responsible engineer rather than to a generic security mailbox, and lets audit trace ownership decisions across cycles.

What is reachable from what

The relationship graph that lets the programme reason about lateral movement, identity blast radius, and dependency-driven exposure across the asset estate. The graph is what supports the conversation with leadership about why a Critical finding on an internet-facing application matters more than a Critical finding on an isolated internal asset: the path to the production data store is the difference. The graph also supports incident response: the investigator can query the relationship graph for the assets reachable from a compromised identity rather than reconstructing that graph manually under pressure.

CAASM Cadence and Operating Shape

CAASM works as a continuous operating discipline rather than as a one-off integration project. The cadence has four layers that together turn the consolidated record into an active operating surface for the security programme.

  • Source synchronisation cadence: source connectors run on the cadence the underlying systems support (hourly to daily for cloud and identity, daily for endpoint and CMDB, weekly for SaaS admin consoles, on-change for source-of-truth additions). Programmes that batch source pulls to weekly windows produce records that are visibly out of date when the team needs them most.
  • Reconciliation cadence: the reconciliation engine runs on each source update, applies the identity resolution rules, refreshes the asset record, opens new conflicts for records that could not be unambiguously matched, and closes the conflicts that have been arbitrated. Reconciliation transparency (named rules, named decisions, audit-readable conflict log) is what makes the record defensible at audit.
  • Coverage gap review cadence: a weekly or biweekly walkthrough by the named programme owner with security operations, AppSec, vulnerability management, and cloud security leads to triage new gaps surfaced by the coverage matrix. New unmanaged assets get named owners and remediation timelines; widened gaps get root-cause analysis (a connector failed, an acquisition was missed, a control was decommissioned without replacement).
  • Leadership and audit-read cadence: a monthly or quarterly coverage report that surfaces the named-asset gap closure plan to security leadership and the audit-ready coverage extract that the GRC team and external audit can read against the control framework mapping. The cadence here is set by the wider security programme review cadence, not by the CAASM platform.

CAASM Adoption Pitfalls

Six recurring failure modes appear in CAASM rollouts. The combination of all six is the most common pattern in stalled programmes; teams that recognise and design around these failure modes are the ones that produce durable operating value.

  • Treating CAASM as a CMDB replacement. The CMDB is the IT operations source of truth; CAASM is the security reconciliation record on top of it. Positioning CAASM as the new CMDB starts a turf war with IT operations and produces an unowned shadow inventory rather than a complementary security record. The mature pattern is to consume the CMDB as a source and feed reconciliation findings back to the CMDB owner so the upstream record improves.
  • Connecting only the easy sources. Cloud connectors and endpoint connectors typically deploy in a day each. SaaS admin consoles, on-prem identity directories, mobile device managers, and OT environments are harder. Programmes that stop after the easy connectors leave material asset classes unreconciled, which means the unified record looks complete on a dashboard while the hardest exposure surfaces are still invisible.
  • Skipping identity resolution transparency. Default reconciliation rules merge records based on heuristics that look reasonable on paper but produce wrong merges in real estates with acquisitions, renamed assets, and stale agent records. Programmes that accept the platform-default rules without reviewing them are surprised when remediation work routes to the wrong team because the asset was merged with a different production instance.
  • Running CAASM without a named owner. CAASM as a cross-functional unowned programme produces a clean dashboard nobody acts on. Coverage gaps that surface in week one are still open in month six because no engineer is tasked with closing them. The mature pattern names one programme owner with explicit accountability for the reconciliation cadence, the gap closure cadence, and the conflict arbitration calls.
  • Confusing coverage with control health. The CAASM coverage map says an EDR agent is installed; it does not say the agent is healthy, the policy is applied, or the recent detection rules are in place. Programmes that conclude an asset is protected because the coverage matrix shows a green box miss the category of failures where the control exists but is not functioning. The mature pattern pairs CAASM coverage with periodic control validation or red team verification.
  • Treating reconciliation as a one-off project. Source systems change, acquisitions happen, business units reorganise, and new asset classes appear in the portfolio. CAASM runs that captured a clean snapshot at deployment and never re-validate the reconciliation rules drift back to inaccuracy within months. The mature pattern reviews reconciliation rules on a quarterly cadence and re-validates them whenever a major source change happens.

Audit-Read Shape of the CAASM Operating Record

The CAASM operating record produces audit-relevant evidence across multiple frameworks. The artefacts below are the ones audit, customer due diligence, and regulator reviews routinely ask for. The mapping is not exhaustive; the operating record should be readable against the team's specific control framework rather than against a generic checklist.

  • ISO 27001 (2022): Annex A 5.9 Inventory of information and other associated assets, A 5.10 Acceptable use, A 8.1 User end point devices, A 8.8 Management of technical vulnerabilities. The CAASM record supplies the inventory artefact and the coverage map against the technical vulnerability management programme.
  • SOC 2 (Trust Services Criteria): CC3.2 Risk identification, CC6.1 Logical and physical access, CC6.2 Authentication, CC7.1 Detection of configuration changes, CC7.2 Detection of security events. The CAASM record supplies the asset population that the access, change detection, and event detection controls are evaluated against.
  • NIST SP 800-53 Rev. 5: CM-8 System component inventory, CM-12 Information location, CM-13 Data action mapping, PM-5 System inventory, RA-5 Vulnerability monitoring and scanning, SA-5 Information system documentation. The CAASM record supplies the system component inventory and the data-action mapping evidence.
  • PCI DSS v4.0: Requirement 9.5 Maintain inventory, Requirement 11.3 External and internal vulnerability testing, Requirement 12.5 Documented operational responsibilities. The CAASM record supplies the inventory and the coverage attestation against the testing requirements.
  • NIST CSF 2.0: ID.AM Asset Management (ID.AM-01 Inventories of hardware, ID.AM-02 Inventories of software, services, and systems, ID.AM-03 Representations of authorised network communication and data flows, ID.AM-04 Inventories of services provided by suppliers, ID.AM-05 Assets prioritised by criticality). CAASM is the primary input to the ID.AM outcome category.
  • CIS Controls v8.1: Control 1 Inventory and Control of Enterprise Assets, Control 2 Inventory and Control of Software Assets, Control 6 Access Control Management. CAASM provides the inventory artefact and the control-mapping evidence against Controls 1 and 2.
  • DORA (Digital Operational Resilience Act): Article 8 ICT risk management framework. The CAASM record supplies the ICT asset register and the third-party ICT service dependency record that the article requires for in-scope financial entities.

Phased CAASM Rollout

CAASM rollouts that aim for total source coverage in the first quarter routinely stall. The phased shape below produces visible value early without leaving structural blind spots in the consolidated record.

Phase 1: Core source set (weeks 1-6)

Connect the CMDB, the cloud provider control planes, the endpoint protection console, and the identity provider. Run the first reconciliation pass. Surface the first coverage gap report against EDR coverage, cloud account coverage, and MFA enrolment. Sign off the reconciliation rules with the named programme owner. The exit criterion is one coverage map per asset class with named owners attached to the top gaps.

Phase 2: SaaS, mobile, and vulnerability sources (weeks 7-14)

Add the SaaS admin consoles for the SaaS portfolio, the mobile device manager, the vulnerability scanners (external, authenticated, code), the application security tools, and the certificate inventory. Surface the second coverage gap report. The exit criterion is a CAASM record that covers every asset class the security programme operates against, not just the operationally easiest ones.

Phase 3: Relationship graph and control framework mapping (weeks 15-22)

Stand up the relationship graph for network reachability and identity grants. Stand up the control framework mapping against the team's primary control framework (ISO 27001, SOC 2, NIST 800-53, PCI DSS, NIST CSF 2.0, CIS Controls). Stand up the audit-ready coverage extract. The exit criterion is a CAASM record that can be read against the control framework without a separate manual mapping exercise.

Phase 4: Operating discipline (week 23 onwards)

Move from project mode to operating mode. Lock the reconciliation cadence, the coverage gap review cadence, the leadership-read cadence, and the audit-read cadence. Integrate CAASM-surfaced coverage gaps into the wider security backlog so closure work tracks alongside vulnerability remediation, AppSec findings, and pentest follow-ups rather than as a parallel queue. Re-validate reconciliation rules quarterly.

Where SecPortal Fits Alongside a CAASM Programme

SecPortal does not market itself as a dedicated CAASM platform. The packaged CMDB connectors, cloud IAM connectors, endpoint protection connectors, identity provider connectors, mobile device manager connectors, SaaS admin connectors, asset graph modelling, and cross-source identity resolution engines that define a CAASM platform are not part of SecPortal. Programmes evaluating dedicated CAASM platforms should benchmark coverage of their named source systems, the depth of asset relationship modelling, and the reconciliation rule transparency against the named CAASM vendors.

SecPortal is the operating record where the security testing and remediation work driven by a CAASM record lands. The mature pattern is CAASM holds the asset truth, and SecPortal holds the finding-and-engagement truth for the work that flows from CAASM-resolved coverage gaps and ownership decisions.

SecPortal provides the following verified capabilities:

  • Findings management with CVSS 3.1 calibration, named owner, status lifecycle, and evidence attachments, so the remediation work driven by a CAASM coverage gap is tracked on the same record as the rest of the security backlog.
  • Bulk finding import of Nessus, Burp, and CSV exports, so the findings emitted by the team's existing scanner stack and by adjacent CAASM-integrated tools can be consolidated into one engagement record.
  • External scanning, authenticated scanning, and code scanning on assets within the SecPortal workspace, so the team can run the security testing programme against the asset estate it knows about while it decides whether a dedicated CAASM platform is the next investment.
  • Continuous monitoring on daily, weekly, biweekly, and monthly cadences, so coverage changes on the assets the team has authorised for scanning surface alongside the wider security finding queue.
  • Retesting workflows paired to the original finding, so the closure of a CAASM-surfaced gap can be verified against the same record.
  • Compliance tracking against 70+ framework templates (including ISO 27001, SOC 2, NIST 800-53, PCI DSS, NIST CSF 2.0, and CIS Controls), so the audit-read evidence the CAASM programme produces can be cross-linked to the finding and engagement record.
  • Activity log with CSV export and named-actor timestamped audit trail across the engagement and finding lifecycle.
  • AI report generation for the leadership read of the security testing programme, with retesting and exception lifecycle context included.
  • Team management with RBAC, MFA enforcement, and verified domain management for scan authorisation.

The honest scope is that SecPortal is not a substitute for a CAASM platform on a multi-source enterprise estate; it is the downstream operating record that gives the security testing programme a defensible home alongside whichever CAASM platform the team eventually adopts. The relevant adjacent SecPortal workflows include asset ownership mapping for findings, asset criticality scoring, asset decommissioning and finding retirement, vulnerability prioritisation, and security leadership reporting.

Scope and Limitations

This guide describes the operating shape of Cyber Asset Attack Surface Management as it is consumed in mainstream enterprise programmes. The vendor landscape evolves quickly: connector breadth, asset graph depth, reconciliation transparency, and packaged framework mappings shift between releases. Specific feature claims, supported source systems, and the precision of named reconciliation models should be verified against current vendor documentation and against benchmark exercises on the team's own asset estate.

CAASM is a consolidation and reconciliation discipline on top of the existing tooling stack; it is not a discovery layer that finds assets the underlying tools have not already seen, and it is not a detection layer that finds exposures the underlying tools have not already detected. Programmes that adopt CAASM as a substitute for EASM lose the outside-in discovery that CAASM cannot perform; programmes that adopt CAASM as a substitute for vulnerability management, CSPM, or ITDR lose the detection content those disciplines produce. Programmes that adopt CAASM as the inside-out reconciliation layer alongside EASM for outside-in discovery, the exposure disciplines for detection content, the CTEM cycle for operating sequencing, and a defensible finding-and-engagement record for the remediation work are the ones that see durable operating value.

Run the remediation record for CAASM-surfaced gaps on SecPortal

Stand up the security testing and remediation operating record in under two minutes. Free plan available, no credit card required.