We can't find the internet
Attempting to reconnect
Something went wrong!
Attempting to reconnect
EASM: Automating External Attack Surface Discovery
How Prismatic Perimeter discovers and monitors an organization's internet-facing assets using DNS enumeration, certificate transparency, port scanning, and continuous monitoring.
Tomas Korcak (korczis)
Prismatic Platform
Your attack surface is everything an adversary can see from the internet. Most organizations do not know the full extent of theirs. Shadow IT, forgotten subdomains, test environments left running, third-party services with your data -- the external attack surface grows faster than security teams can track.
Prismatic Perimeter is our External Attack Surface Management (EASM) system. It discovers, catalogs, and continuously monitors internet-facing assets. This post explains the discovery process.
Discovery Pipeline
Asset discovery operates in six phases:
Phase 1: DNS Enumeration
Starting from a root domain, we enumerate subdomains through multiple methods:
CT logs are the most productive source. A single query can reveal hundreds of subdomains that would take hours to discover through brute-forcing.
Phase 2: IP Resolution
Each discovered hostname resolves to one or more IP addresses. We map the IP space:
Phase 3: Service Discovery
For each IP address, we identify running services:
Phase 4: Web Application Analysis
For HTTP/HTTPS services, deeper analysis:
Phase 5: Cloud Asset Discovery
Modern attack surfaces extend into cloud providers:
Phase 6: Continuous Monitoring
Discovery is not a one-time event. The attack surface changes daily:
Scoring Methodology
Each discovered asset contributes to the overall security rating (A-F scale, 300-900 score):
|-----------|--------|-----------------|
Every factor is traceable to specific evidence. If your score drops, you can see exactly which finding caused the change and what to fix.
NIS2 Compliance Mapping
The EU NIS2 Directive (2022/2555) requires essential and important entities to implement specific cybersecurity measures. Perimeter maps findings to NIS2 articles:
For Czech organizations, we also map against ZKB 264/2025 Sb. requirements, providing a gap analysis with remediation guidance.
Architecture
Perimeter is implemented as a dedicated umbrella application:
prismatic_perimeter/
βββ lib/
β βββ discovery/ # Asset discovery modules
β βββ analysis/ # Security analysis modules
β βββ scoring/ # Rating calculation
β βββ monitoring/ # Continuous monitoring
β βββ compliance/ # NIS2/ZKB mapping
βββ test/
prismatic_perimeter_web/
βββ lib/
β βββ live/
β βββ dashboard_live.ex # Main EASM dashboard
β βββ asset_detail_live.ex # Individual asset view
β βββ compliance_live.ex # Compliance gap analysis
βββ test/
The dashboard at /perimeter provides real-time visibility into your attack surface with drill-down into individual assets.
Getting Started
Discover your organization's attack surface:
# API
curl -X POST https://api.prismatic-reality.com/v1/perimeter/discover \
-H "Content-Type: application/json" \
-d '{"domain": "your-company.com"}'
# SDK
result = await prismatic.perimeter.discover("your-company.com")
The initial discovery typically completes within 5-15 minutes depending on the size of the attack surface. Continuous monitoring starts automatically after the first discovery.
Explore the [EASM Dashboard](/capabilities/easm/) or read the [Security Ratings methodology](/blog/security-ratings-easm-explained/) for scoring details.