{"id":2259,"date":"2025-02-25T06:22:13","date_gmt":"2025-02-25T06:22:13","guid":{"rendered":"https:\/\/www.purevpn.com\/white-label\/?p=2259"},"modified":"2025-02-25T06:22:15","modified_gmt":"2025-02-25T06:22:15","slug":"what-is-attack-surface-management","status":"publish","type":"post","link":"https:\/\/www.purevpn.com\/white-label\/what-is-attack-surface-management\/","title":{"rendered":"What is Attack Surface Management, and Why Should Your Business Care?"},"content":{"rendered":"<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_71 ez-toc-wrap-left counter-hierarchy ez-toc-counter ez-toc-transparent ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.purevpn.com\/white-label\/what-is-attack-surface-management\/#What_is_Attack_Surface_Management\" title=\"What is Attack Surface Management?\">What is Attack Surface Management?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.purevpn.com\/white-label\/what-is-attack-surface-management\/#Types_of_Attack_Surfaces\" title=\"Types of Attack Surfaces\">Types of Attack Surfaces<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.purevpn.com\/white-label\/what-is-attack-surface-management\/#Digital_Attack_Surface\" title=\"Digital Attack Surface\">Digital Attack Surface<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.purevpn.com\/white-label\/what-is-attack-surface-management\/#Physical_Attack_Surface\" title=\"Physical Attack Surface\">Physical Attack Surface<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.purevpn.com\/white-label\/what-is-attack-surface-management\/#Human_Attack_Surface\" title=\"Human Attack Surface\">Human Attack Surface<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.purevpn.com\/white-label\/what-is-attack-surface-management\/#Importance_of_Knowing_Your_Attack_Surface\" title=\"Importance of Knowing Your Attack Surface\">Importance of Knowing Your Attack Surface<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.purevpn.com\/white-label\/what-is-attack-surface-management\/#Why_Businesses_Are_Opting_For_Attack_Surface_Management\" title=\"Why Businesses Are Opting For Attack Surface Management?\">Why Businesses Are Opting For Attack Surface Management?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.purevpn.com\/white-label\/what-is-attack-surface-management\/#Threat_Surface_vs_Attack_Surface\" title=\"Threat Surface vs. Attack Surface\">Threat Surface vs. Attack Surface<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.purevpn.com\/white-label\/what-is-attack-surface-management\/#Examples_of_Human_Attack_Surfaces\" title=\"Examples of Human Attack Surfaces\">Examples of Human Attack Surfaces<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/www.purevpn.com\/white-label\/what-is-attack-surface-management\/#Phishing_Emails\" title=\"Phishing Emails\">Phishing Emails<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/www.purevpn.com\/white-label\/what-is-attack-surface-management\/#Weak_Passwords\" title=\"Weak Passwords\">Weak Passwords<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/www.purevpn.com\/white-label\/what-is-attack-surface-management\/#Social_Engineering\" title=\"Social Engineering\">Social Engineering<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/www.purevpn.com\/white-label\/what-is-attack-surface-management\/#Untrained_Staff\" title=\"Untrained Staff\">Untrained Staff<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/www.purevpn.com\/white-label\/what-is-attack-surface-management\/#Insider_Threats\" title=\"Insider Threats\">Insider Threats<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/www.purevpn.com\/white-label\/what-is-attack-surface-management\/#Public_Wi-Fi_and_Remote_Work\" title=\"Public Wi-Fi and Remote Work\">Public Wi-Fi and Remote Work<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/www.purevpn.com\/white-label\/what-is-attack-surface-management\/#How_Attack_Surface_Management_Works\" title=\"How Attack Surface Management Works?\">How Attack Surface Management Works?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-17\" href=\"https:\/\/www.purevpn.com\/white-label\/what-is-attack-surface-management\/#What_are_the_Challenges_Around_External_Attack_Surface_Mapping\" title=\"What are the Challenges Around External Attack Surface Mapping?\">What are the Challenges Around External Attack Surface Mapping?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-18\" href=\"https:\/\/www.purevpn.com\/white-label\/what-is-attack-surface-management\/#How_can_PureVPN_Help\" title=\"How can PureVPN Help?\">How can PureVPN Help?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-19\" href=\"https:\/\/www.purevpn.com\/white-label\/what-is-attack-surface-management\/#Conclusion\" title=\"Conclusion\">Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n\n<p>Do you worry about hackers trying to break into your business systems? These days, every company is at risk, whether big or small. Hackers are constantly on the hunt, looking for weak spots in your company\u2019s online setup. Once they <a href=\"https:\/\/www.purevpn.com\/white-label\/cve-2024-6387-regresshion-remote-code-execution-vulnerability-openssh\/\" target=\"_blank\" rel=\"noreferrer noopener\">find a vulnerability<\/a>, they can steal data, cause major disruptions, or even lock you out of your systems until you pay a ransom. That\u2019s why Attack Surface Management (ASM) is so important.<\/p>\n\n\n\n<p>But what is attack surface management? It might sound complicated, but it\u2019s pretty simple. Think of it like securing your house. You\u2019d check all the doors and windows to make sure they\u2019re locked, right? ASM does the same for your business\u2019s digital world. It helps you find and fix any weak spots before hackers can get in.<\/p>\n\n\n\n<p>This blog will explore what attack surface management is, why it\u2019s essential, and how it can help keep your business safe. We\u2019ll also discuss external attack surface management, cyber asset attack surface management, and the best attack surface management tools to use.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"What_is_Attack_Surface_Management\"><\/span>What is Attack Surface Management?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Attack Surface Management is the process of finding, watching, and securing all the ways a hacker could break into your company\u2019s digital systems. These potential entry points are called &#8220;attack surfaces.&#8221; They can be anything from your company website and mobile apps to email servers and cloud services.<\/p>\n\n\n\n<p>External attack surface management focuses on the parts of your system that are exposed to the internet, like your website or <a href=\"https:\/\/www.purewl.com\/developers\/\" target=\"_blank\" rel=\"noreferrer noopener\">public APIs<\/a>. These are often the first places hackers look because they\u2019re easy to reach.<\/p>\n\n\n\n<p>The goal of attack surface management is simple: find security gaps before hackers do. It continuously scans your digital assets, looking for weak spots, misconfigurations, or outdated software. Once it finds them, you can fix these issues quickly to stay protected.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Types_of_Attack_Surfaces\"><\/span>Types of Attack Surfaces<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Not all attack surfaces are the same. They can be divided into three main categories:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Digital_Attack_Surface\"><\/span>Digital Attack Surface<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>This includes all the parts of your business that are online. Think of your website, email servers, public APIs, cloud services, and online applications. Hackers often start here because these assets are visible and easier to target. Every time you launch a new website or open an API, it adds to your digital attack surface. Without regular monitoring, these new additions can become easy entry points for hackers. Regularly updating and patching these systems can help reduce risks, but staying on top of it all can be a challenge for many businesses.<\/p>\n\n\n\n<p>Digital attack surfaces also include forgotten assets, often called &#8220;shadow IT.&#8221; These are tools and applications that employees use without the IT department\u2019s knowledge. For example, an employee might use an unsanctioned file-sharing app to send large documents. While convenient, this creates a new, unsecured access point for hackers. Identifying and managing these hidden assets is a critical part of effective attack surface management.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Physical_Attack_Surface\"><\/span>Physical Attack Surface<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>This includes your company\u2019s hardware\u2014like servers, computers, mobile devices, and even USB drives. If someone gains physical access to one of these devices, they could install malware or steal data. Imagine an unauthorized person walking into your office and plugging in a malicious USB drive into one of your computers\u2014that\u2019s a direct threat to your network.<\/p>\n\n\n\n<p>Physical attack surfaces also involve poorly secured office spaces. If server rooms are left unlocked or workstations are left unattended, it increases the risk of insider threats. Regular security audits, secure locks, and employee awareness training can help reduce the vulnerabilities in your physical attack surface.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Human_Attack_Surface\"><\/span>Human Attack Surface<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>People are often the weakest link in cybersecurity. Hackers use phishing emails, weak passwords, and social engineering tricks to target employees and trick them into giving away sensitive information. A single click on a malicious link can open the door for attackers to infiltrate your entire network.<\/p>\n\n\n\n<p>Human attack surfaces also include mistakes made by employees, such as misconfiguring software, using the same password across multiple accounts, or accidentally sharing sensitive information. Regular training sessions and clear cybersecurity policies can significantly reduce human-related vulnerabilities. Encouraging a culture of security awareness helps employees stay alert and recognize potential threats before they become major issues.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Importance_of_Knowing_Your_Attack_Surface\"><\/span>Importance of Knowing Your Attack Surface<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Why is it so important to know your attack surface? Because you can\u2019t protect what you can\u2019t see.<\/p>\n\n\n\n<p>Every time your company adds a new device, app, or cloud service, your attack surface gets bigger. Without proper monitoring, these new additions can create hidden risks. Hackers love finding these \u201cshadow IT\u201d assets\u2014systems or software that your IT team doesn\u2019t even know exist.<\/p>\n\n\n\n<p>Here\u2019s why businesses need to understand their attack surface:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Prevent Attacks Before They Happen<\/strong>: By constantly monitoring for vulnerabilities, you can fix issues before hackers find them.<br><\/li>\n\n\n\n<li><strong>Reduce Security Risks<\/strong>: A smaller, well-managed attack surface means fewer opportunities for hackers to break in.<br><\/li>\n\n\n\n<li><strong>Stay Compliant<\/strong>: Many industries have strict security regulations. Managing your attack surface helps you meet these standards and avoid hefty fines.<br><\/li>\n\n\n\n<li><strong>Save Time and Money<\/strong>: A data breach can cost millions. Preventing one through proper attack surface management is a smart investment.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Why_Businesses_Are_Opting_For_Attack_Surface_Management\"><\/span>Why Businesses Are Opting For Attack Surface Management?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Businesses are investing in attack surface management now more than ever, and it\u2019s easy to see why.<\/p>\n\n\n\n<p>Cyber threats are on the rise. As companies use more devices, cloud services, and remote workers, their networks get larger and more complex. This makes it harder to keep track of everything and protect it all.<\/p>\n\n\n\n<p>Here\u2019s why businesses are choosing ASM:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Real-Time Monitoring<\/strong>: ASM tools scan your network constantly, giving you up-to-date information about your security.<br><\/li>\n\n\n\n<li><strong>Proactive Security<\/strong>: Instead of waiting for a breach, ASM helps businesses find and fix weak spots before hackers can use them.<br><\/li>\n\n\n\n<li><strong>Improved Compliance<\/strong>: Regulations like GDPR and HIPAA require businesses to secure their data. ASM helps you meet these rules.<br><\/li>\n\n\n\n<li><strong>Cost Savings<\/strong>: Preventing a breach is much cheaper than dealing with the damage afterward.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Threat_Surface_vs_Attack_Surface\"><\/span>Threat Surface vs. Attack Surface<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>People often mix up &#8220;threat surface&#8221; and &#8220;attack surface,&#8221; but they\u2019re not the same, and understanding the difference is key to improving your cybersecurity strategy.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Attack Surface<\/strong>: This is the total number of points where a hacker could try to break into your system. It includes all your digital assets, applications, endpoints, and any external-facing elements like websites or APIs. The more assets you have exposed to the internet, the larger your attack surface becomes. A large attack surface means more opportunities for hackers to find vulnerabilities and exploit them.<br><\/li>\n\n\n\n<li><strong>Threat Surface<\/strong>: This goes beyond just entry points. It encompasses all the potential risks your business faces, not limited to digital assets. This includes natural disasters, insider threats, supply chain vulnerabilities, and even human errors. The threat surface looks at the bigger picture, covering any situation or condition that could put your business at risk.<\/li>\n<\/ul>\n\n\n\n<p>Think of it this way: the attack surface is all the doors and windows in your house\u2014potential entry points for burglars. The threat surface, on the other hand, includes those doors and windows but also adds risks like fires, floods, or a tree falling on your roof. Managing your attack surface helps lock the doors and windows while managing your threat surface ensures you&#8217;re protected against a wider range of dangers.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Examples_of_Human_Attack_Surfaces\"><\/span>Examples of Human Attack Surfaces<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Humans are often the easiest way for hackers to break into a system. Despite all the firewalls, antivirus software, and security protocols in place, a single human error can open the door to a cyberattack. Understanding the different ways people can unknowingly create vulnerabilities is crucial for effective security.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Phishing_Emails\"><\/span>Phishing Emails<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>One of the most common tactics hackers use is phishing. They send fake emails that appear to be from trusted sources, tricking employees into clicking malicious links or downloading harmful attachments. These emails often create a sense of urgency, like warning about an overdue bill or a security breach, prompting the user to act quickly without thinking. Once the link is clicked, malware can infiltrate the system or the attacker may gain access to sensitive data.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Weak_Passwords\"><\/span>Weak Passwords<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Simple and easy-to-guess passwords are a goldmine for hackers. Using common passwords like &#8220;123456,&#8221; &#8220;password,&#8221; or even personal details like a pet\u2019s name makes it easier for attackers to break in. Hackers often use automated tools that can try thousands of password combinations in seconds. Without<a href=\"https:\/\/www.purewl.com\/password-manager\/\" target=\"_blank\" rel=\"noreferrer noopener\"> strong, unique passwords<\/a> and two-factor authentication, your systems become easy targets.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Social_Engineering\"><\/span>Social Engineering<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Beyond phishing, social engineering involves manipulating people into revealing confidential information. Hackers might pose as IT staff or trusted vendors, calling employees and convincing them to <a href=\"https:\/\/www.purewl.com\/is-sharing-login-credentials-in-real-estate-legal\/\" target=\"_blank\" rel=\"noreferrer noopener\">share login credentials<\/a> or <a href=\"https:\/\/www.purevpn.com\/white-label\/how-can-you-prevent-viruses-and-malicious-codes\/\" target=\"_blank\" rel=\"noreferrer noopener\">install malicious software<\/a>. These attacks prey on human psychology, exploiting trust and the desire to be helpful.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Untrained_Staff\"><\/span>Untrained Staff<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Employees who lack cybersecurity training are more likely to make mistakes that can lead to breaches. They might unknowingly download unsafe software, click on pop-ups, or use unauthorized apps for work. Regular training sessions can help employees recognize and avoid common threats, reducing the human attack surface significantly.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Insider_Threats\"><\/span>Insider Threats<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Sometimes, the threat comes from within. Disgruntled employees or contractors with access to sensitive information can intentionally leak data or sabotage systems. Even well-meaning employees can accidentally cause harm by mishandling sensitive data. Implementing strict access controls and monitoring user activity can help mitigate these risks.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Public_Wi-Fi_and_Remote_Work\"><\/span>Public Wi-Fi and Remote Work<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>With more employees working remotely, unsecured public Wi-Fi networks have become a major vulnerability. Hackers can intercept data transmitted over these networks, gaining access to company systems. Educating employees about the dangers of public Wi-Fi and encouraging the use of VPNs can help secure remote connections.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"How_Attack_Surface_Management_Works\"><\/span>How Attack Surface Management Works?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Attack Surface Management (ASM) isn\u2019t just a one-time scan of your systems; it\u2019s a continuous, dynamic process that evolves as your network grows and changes. Think of it as having a dedicated security guard who never sleeps, constantly patrolling your digital perimeter and keeping an eye out for any weaknesses. ASM works by continuously monitoring your digital environment, identifying potential vulnerabilities, and ensuring that no door is left open for attackers to sneak through.<\/p>\n\n\n\n<p>Here&#8217;s a breakdown of how attack surface management typically operates:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Discovery<\/strong><\/li>\n<\/ol>\n\n\n\n<p>This is the first and most crucial step. The ASM tool performs a comprehensive scan of your network to identify all assets connected to it. This includes everything from cloud services, servers, and databases to applications, devices, and even shadow IT\u2014those unauthorized tools and apps that employees might be using without IT\u2019s knowledge. It\u2019s like turning on the lights in a dark room and finally seeing everything that\u2019s there, including the things you didn\u2019t know existed.<\/p>\n\n\n\n<ol start=\"2\" class=\"wp-block-list\">\n<li><strong>Analysis<\/strong><\/li>\n<\/ol>\n\n\n\n<p>After discovery, the next step is to scrutinize every asset identified. The ASM tool checks each asset for vulnerabilities\u2014outdated software, misconfigurations, open ports, weak passwords, and any other potential security gaps. It\u2019s not just about finding these issues but understanding how they could be exploited. This step often involves evaluating the severity of each vulnerability so that your security team knows which problems to tackle first.<\/p>\n\n\n\n<ol start=\"3\" class=\"wp-block-list\">\n<li><strong>Monitoring<\/strong><\/li>\n<\/ol>\n\n\n\n<p>Cyber threats are constantly evolving, so ASM tools don\u2019t just stop after the initial scan. They continue to monitor your network around the clock. This real-time monitoring ensures that any new vulnerabilities, changes in configurations, or additions to your network are immediately flagged. Continuous monitoring is essential because your attack surface is dynamic\u2014it changes whenever new devices are added, software is updated, or employees use new cloud services.<\/p>\n\n\n\n<ol start=\"4\" class=\"wp-block-list\">\n<li><strong>Remediation<\/strong><\/li>\n<\/ol>\n\n\n\n<p>Finding vulnerabilities is only half the battle; fixing them is where the real work begins. Once the ASM tool identifies a weakness, it alerts your IT team so they can take immediate action. This might involve applying patches, updating software, closing open ports, or tightening security configurations. Some ASM solutions even offer automated remediation features, which can handle basic fixes without human intervention, speeding up the process and reducing the risk window.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"What_are_the_Challenges_Around_External_Attack_Surface_Mapping\"><\/span>What are the Challenges Around External Attack Surface Mapping?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Mapping your external attack surface isn\u2019t always easy. It comes with several challenges that businesses need to be aware of. Let\u2019s break down these challenges into simple, easy-to-understand points:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Shadow IT<\/strong>\n<ul class=\"wp-block-list\">\n<li>Employees often use unauthorized devices or applications without informing the IT department.<\/li>\n\n\n\n<li>This creates hidden entry points that aren\u2019t monitored, leaving vulnerabilities open for attackers.<\/li>\n\n\n\n<li>Common examples include using personal devices for work or downloading unapproved software.<\/li>\n\n\n\n<li>These actions make it difficult for IT teams to keep a complete and secure inventory of all assets.<br><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Constant Changes<\/strong>\n<ul class=\"wp-block-list\">\n<li>Your company\u2019s attack surface is always growing and changing.<\/li>\n\n\n\n<li>New devices, users, cloud services, and applications are added regularly.<\/li>\n\n\n\n<li>With every addition, the attack surface expands, increasing the risk of unnoticed vulnerabilities.<\/li>\n\n\n\n<li>Keeping up with these changes can be overwhelming, especially for small IT teams.<br><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Complex Networks<\/strong>\n<ul class=\"wp-block-list\">\n<li>Large organizations often have complicated networks.<\/li>\n\n\n\n<li>Multiple locations, cloud providers, and interconnected systems add to the complexity.<\/li>\n\n\n\n<li>It becomes challenging to map every component accurately.<\/li>\n\n\n\n<li>Legacy systems that aren\u2019t well-documented add another layer of difficulty.<br><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Third-Party Risks<\/strong>\n<ul class=\"wp-block-list\">\n<li>Businesses often work with vendors, partners, and third-party services.<\/li>\n\n\n\n<li>Each external connection can introduce potential vulnerabilities.<\/li>\n\n\n\n<li>If a third-party provider has weak security, it can expose your network to threats.<\/li>\n\n\n\n<li>Managing and monitoring these connections is essential but often overlooked.<br><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Unmanaged Assets<\/strong>\n<ul class=\"wp-block-list\">\n<li>Devices or applications that were once used but are now forgotten.<\/li>\n\n\n\n<li>These &#8220;orphaned&#8221; assets can still be accessible and pose security risks.<\/li>\n\n\n\n<li>Without proper decommissioning, they remain part of the attack surface.<br><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Inconsistent Security Policies<\/strong>\n<ul class=\"wp-block-list\">\n<li>Different departments might follow varied security practices.<\/li>\n\n\n\n<li>Lack of standardized policies creates gaps in protection.<\/li>\n\n\n\n<li>Ensuring company-wide adherence to security protocols is crucial.<br><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Human Error<\/strong>\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.purevpn.com\/white-label\/what-is-a-human-firewall\/\" target=\"_blank\" rel=\"noreferrer noopener\">Mistakes made by employees<\/a> can introduce vulnerabilities.<\/li>\n\n\n\n<li>Misconfigurations, weak passwords, or unintentional exposure of sensitive data are common issues.<\/li>\n\n\n\n<li>Regular training and awareness programs help minimize human error.<br><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Limited Visibility<\/strong>\n<ul class=\"wp-block-list\">\n<li>Without proper tools, it\u2019s hard to get a complete view of your external attack surface.<\/li>\n\n\n\n<li>Limited visibility makes it difficult to identify and fix vulnerabilities promptly.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"How_can_PureVPN_Help\"><\/span>How can PureVPN Help?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>PureVPN\u2019s White Label solution simplifies attack surface management while giving businesses full control over their cybersecurity. It allows companies to offer a fully customized VPN under their own brand, complete with robust security features and tailored solutions. With PureVPN, businesses can provide secure, encrypted connections for employees, ensuring data stays protected, whether staff are working remotely or in the office. This reduces the risk of breaches by shielding sensitive information from prying eyes.<\/p>\n\n\n\n<div class=\"wp-block-buttons text-center is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-1 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-text-color has-background has-link-color wp-element-button\" href=\"http:\/\/purevpn.com\/white-label\/\" style=\"color:#fdfafa;background-color:#b15aff\" target=\"_blank\" rel=\"noreferrer noopener\">Join PureVPN&#8217;s White Label Program<\/a><\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Attack Surface Management is crucial for any business in today\u2019s digital world. With hackers constantly looking for weak spots, businesses must stay ahead by monitoring and securing their attack surfaces.<\/p>\n\n\n\n<p>Understanding what is attack surface management, knowing the types of attack surfaces, and using the right tools can help protect your business. External attack surface management and cyber asset attack surface management are key areas that need attention.<\/p>\n\n\n\n<p>Using tools like PureVPN\u2019s White Label solution can help reduce risks and keep your business safe. Don\u2019t wait for a breach to happen\u2014start managing your attack surface today.<\/p>\n\n\n\n<script type=\"application\/ld+json\">{\"@context\":\"https:\/\/schema.org\",\"@type\":\"FAQPage\",\"mainEntity\":[{\"@type\":\"Question\",\"name\":\"What is Attack Surface Management?\",\"acceptedAnswer\":[{\"@type\":\"Answer\",\"text\":\"Attack Surface Management (ASM) is the continuous process of discovering, monitoring, and securing all potential entry points in an organization\u2019s digital environment that attackers could exploit.\"}]},{\"@type\":\"Question\",\"name\":\"What is the Difference Between ASM and DAST?\",\"acceptedAnswer\":[{\"@type\":\"Answer\",\"text\":\"ASM identifies and monitors an organization\u2019s external attack surface, while Dynamic Application Security Testing (DAST) tests running applications for vulnerabilities without access to the source code.\"}]},{\"@type\":\"Question\",\"name\":\"What is the Difference Between Attack Surface Management and Vulnerability Management?\",\"acceptedAnswer\":[{\"@type\":\"Answer\",\"text\":\"ASM focuses on discovering and managing external-facing assets, while Vulnerability Management scans known assets for internal weaknesses and misconfigurations.\"}]},{\"@type\":\"Question\",\"name\":\"What is the Difference Between ASM and BAS?\",\"acceptedAnswer\":[{\"@type\":\"Answer\",\"text\":\"ASM maps and monitors attack surfaces in real-time, while Breach and Attack Simulation (BAS) tests existing defenses by simulating real-world cyberattacks.\"}]},{\"@type\":\"Question\",\"name\":\"What is an Example of an Attack Surface?\",\"acceptedAnswer\":[{\"@type\":\"Answer\",\"text\":\"Examples of attack surfaces include public-facing websites, open APIs, cloud services, employee devices, and even human elements like phishing-prone email accounts.\"}]}]}<\/script><!-- Generated by https:\/\/www.searchlogistics.com -->\n","protected":false},"excerpt":{"rendered":"<p>Do you worry about hackers trying to break into your business systems? These days, every company is at risk, whether big or small. Hackers are constantly on the hunt, looking for weak spots in your company\u2019s online setup. Once they find a vulnerability, they can steal data, cause major disruptions, or even lock you out&#8230;<\/p>\n","protected":false},"author":3,"featured_media":2260,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[122],"tags":[465,469,466,468,467],"class_list":["post-2259","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-attack-surface-management","tag-examples-of-human-attack-surfaces","tag-external-attack-surface-mangement","tag-threat-surface","tag-types-of-attack-surfaces"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is Attack Surface Management &amp; Why Should Business Care<\/title>\n<meta name=\"description\" content=\"Discover what Attack Surface Management (ASM) is, how it protects your business from cyber threats, and why proactive security is crucial.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.purevpn.com\/white-label\/what-is-attack-surface-management\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Attack Surface Management &amp; Why Should Business Care\" \/>\n<meta property=\"og:description\" content=\"Discover what Attack Surface Management (ASM) is, how it protects your business from cyber threats, and why proactive security is crucial.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.purevpn.com\/white-label\/what-is-attack-surface-management\/\" \/>\n<meta property=\"og:site_name\" content=\"PureVPN White label\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-25T06:22:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-25T06:22:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/d1jxermyrliwoo.cloudfront.net\/white-label\/wp-content\/uploads\/2025\/02\/25061603\/Port-Forwarding-3-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"876\" \/>\n\t<meta property=\"og:image:height\" content=\"493\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"duresham\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"duresham\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.purevpn.com\/white-label\/what-is-attack-surface-management\/\",\"url\":\"https:\/\/www.purevpn.com\/white-label\/what-is-attack-surface-management\/\",\"name\":\"What is Attack Surface Management & Why Should Business Care\",\"isPartOf\":{\"@id\":\"https:\/\/www.purevpn.com\/white-label\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.purevpn.com\/white-label\/what-is-attack-surface-management\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.purevpn.com\/white-label\/what-is-attack-surface-management\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/d1jxermyrliwoo.cloudfront.net\/white-label\/wp-content\/uploads\/2025\/02\/25061603\/Port-Forwarding-3-1.jpg\",\"datePublished\":\"2025-02-25T06:22:13+00:00\",\"dateModified\":\"2025-02-25T06:22:15+00:00\",\"author\":{\"@id\":\"https:\/\/www.purevpn.com\/white-label\/#\/schema\/person\/d75943d96d9bdd3277bc60adaf00f44c\"},\"description\":\"Discover what Attack Surface Management (ASM) is, how it protects your business from cyber threats, and why proactive security is crucial.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.purevpn.com\/white-label\/what-is-attack-surface-management\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.purevpn.com\/white-label\/what-is-attack-surface-management\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.purevpn.com\/white-label\/what-is-attack-surface-management\/#primaryimage\",\"url\":\"https:\/\/d1jxermyrliwoo.cloudfront.net\/white-label\/wp-content\/uploads\/2025\/02\/25061603\/Port-Forwarding-3-1.jpg\",\"contentUrl\":\"https:\/\/d1jxermyrliwoo.cloudfront.net\/white-label\/wp-content\/uploads\/2025\/02\/25061603\/Port-Forwarding-3-1.jpg\",\"width\":876,\"height\":493,\"caption\":\"Illustration representing attack surface management, showing multiple browser windows with a red skull icon, symbolizing potential vulnerabilities and cyber threats in web applications.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.purevpn.com\/white-label\/what-is-attack-surface-management\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.purevpn.com\/white-label\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is Attack Surface Management, and Why Should Your Business Care?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.purevpn.com\/white-label\/#website\",\"url\":\"https:\/\/www.purevpn.com\/white-label\/\",\"name\":\"Purevpn White label\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.purevpn.com\/white-label\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.purevpn.com\/white-label\/#\/schema\/person\/d75943d96d9bdd3277bc60adaf00f44c\",\"name\":\"duresham\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.purevpn.com\/white-label\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/676e150b24efe0726f53fef31f98d1da?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/676e150b24efe0726f53fef31f98d1da?s=96&d=mm&r=g\",\"caption\":\"duresham\"},\"url\":\"https:\/\/www.purevpn.com\/white-label\/author\/duresham\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Attack Surface Management & Why Should Business Care","description":"Discover what Attack Surface Management (ASM) is, how it protects your business from cyber threats, and why proactive security is crucial.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.purevpn.com\/white-label\/what-is-attack-surface-management\/","og_locale":"en_US","og_type":"article","og_title":"What is Attack Surface Management & Why Should Business Care","og_description":"Discover what Attack Surface Management (ASM) is, how it protects your business from cyber threats, and why proactive security is crucial.","og_url":"https:\/\/www.purevpn.com\/white-label\/what-is-attack-surface-management\/","og_site_name":"PureVPN White label","article_published_time":"2025-02-25T06:22:13+00:00","article_modified_time":"2025-02-25T06:22:15+00:00","og_image":[{"width":876,"height":493,"url":"https:\/\/d1jxermyrliwoo.cloudfront.net\/white-label\/wp-content\/uploads\/2025\/02\/25061603\/Port-Forwarding-3-1.jpg","type":"image\/jpeg"}],"author":"duresham","twitter_card":"summary_large_image","twitter_misc":{"Written by":"duresham","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.purevpn.com\/white-label\/what-is-attack-surface-management\/","url":"https:\/\/www.purevpn.com\/white-label\/what-is-attack-surface-management\/","name":"What is Attack Surface Management & Why Should Business Care","isPartOf":{"@id":"https:\/\/www.purevpn.com\/white-label\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.purevpn.com\/white-label\/what-is-attack-surface-management\/#primaryimage"},"image":{"@id":"https:\/\/www.purevpn.com\/white-label\/what-is-attack-surface-management\/#primaryimage"},"thumbnailUrl":"https:\/\/d1jxermyrliwoo.cloudfront.net\/white-label\/wp-content\/uploads\/2025\/02\/25061603\/Port-Forwarding-3-1.jpg","datePublished":"2025-02-25T06:22:13+00:00","dateModified":"2025-02-25T06:22:15+00:00","author":{"@id":"https:\/\/www.purevpn.com\/white-label\/#\/schema\/person\/d75943d96d9bdd3277bc60adaf00f44c"},"description":"Discover what Attack Surface Management (ASM) is, how it protects your business from cyber threats, and why proactive security is crucial.","breadcrumb":{"@id":"https:\/\/www.purevpn.com\/white-label\/what-is-attack-surface-management\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.purevpn.com\/white-label\/what-is-attack-surface-management\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.purevpn.com\/white-label\/what-is-attack-surface-management\/#primaryimage","url":"https:\/\/d1jxermyrliwoo.cloudfront.net\/white-label\/wp-content\/uploads\/2025\/02\/25061603\/Port-Forwarding-3-1.jpg","contentUrl":"https:\/\/d1jxermyrliwoo.cloudfront.net\/white-label\/wp-content\/uploads\/2025\/02\/25061603\/Port-Forwarding-3-1.jpg","width":876,"height":493,"caption":"Illustration representing attack surface management, showing multiple browser windows with a red skull icon, symbolizing potential vulnerabilities and cyber threats in web applications."},{"@type":"BreadcrumbList","@id":"https:\/\/www.purevpn.com\/white-label\/what-is-attack-surface-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.purevpn.com\/white-label\/"},{"@type":"ListItem","position":2,"name":"What is Attack Surface Management, and Why Should Your Business Care?"}]},{"@type":"WebSite","@id":"https:\/\/www.purevpn.com\/white-label\/#website","url":"https:\/\/www.purevpn.com\/white-label\/","name":"Purevpn White label","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.purevpn.com\/white-label\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.purevpn.com\/white-label\/#\/schema\/person\/d75943d96d9bdd3277bc60adaf00f44c","name":"duresham","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.purevpn.com\/white-label\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/676e150b24efe0726f53fef31f98d1da?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/676e150b24efe0726f53fef31f98d1da?s=96&d=mm&r=g","caption":"duresham"},"url":"https:\/\/www.purevpn.com\/white-label\/author\/duresham\/"}]}},"_links":{"self":[{"href":"https:\/\/www.purevpn.com\/white-label\/wp-json\/wp\/v2\/posts\/2259","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.purevpn.com\/white-label\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.purevpn.com\/white-label\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.purevpn.com\/white-label\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.purevpn.com\/white-label\/wp-json\/wp\/v2\/comments?post=2259"}],"version-history":[{"count":1,"href":"https:\/\/www.purevpn.com\/white-label\/wp-json\/wp\/v2\/posts\/2259\/revisions"}],"predecessor-version":[{"id":2261,"href":"https:\/\/www.purevpn.com\/white-label\/wp-json\/wp\/v2\/posts\/2259\/revisions\/2261"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.purevpn.com\/white-label\/wp-json\/wp\/v2\/media\/2260"}],"wp:attachment":[{"href":"https:\/\/www.purevpn.com\/white-label\/wp-json\/wp\/v2\/media?parent=2259"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.purevpn.com\/white-label\/wp-json\/wp\/v2\/categories?post=2259"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.purevpn.com\/white-label\/wp-json\/wp\/v2\/tags?post=2259"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}