Getting Started With ASRM Student Book - May2024
Getting Started With ASRM Student Book - May2024
Student Guide
May, 2024
Published
Copyright ©2024 Trend Micro Incorporated. All rights reserved. Trend Micro, the Trend Micro logo, the t-ball logo, and [other Trend trademarks]
are trademarks or registered trademarks of Trend Micro Incorporated. All other company and/or product names may be trademarks or registered
trademarks of their owners. Information contained in this document is subject to change without notice. Trend Micro, the Trend Micro logo, and
the t-ball logo Reg. U.S. Pat. & Tm. Off. [03042024/ Getting Started with Trend Vision One for Cloud – Student Guide]
TrendMicro.com
For details about what personal information we collect and why, please see our Privacy Notice on our website at: trendmicro.com/privacy
Student Guide
Getting Started with Trend Vision One Attack Surface Risk Management 1
Student Guide
Objectives
After completing this course, participants will be able to:
• Highlight how Vision One calculates your risk index.
⁻ How it is computed (methodology and risk index calculation)
⁻ Understand relationship between data sources and your risk index
⁻ Explain risk status to various stakeholders
• Perform functions in Executive and Operations dashboards, along with Attack Surface
Discovery, to understand and mitigate risk.
• Take actions to lower your organizational risk by managing the status of risk events.
• Integrate third-party products into Vision One for a comprehensive risk assessment,
and a fuller picture of the organization's security posture.
This session is designed to assist IT managers, operations teams, CISOs, and CIOs in
adopting a risk-based cybersecurity approach to address evolving challenges in the
cybersecurity landscape.
We will explore how Vision One Attack Surface Risk Management (ASRM) helps calculate
your cybersecurity risk and explains it to various stakeholders, from the board to those
who need to act based on this risk. Additionally, we’ll delve into using the Executive and
Operations dashboards, along with Attack Surface Discovery, to understand and mitigate
risk. Most importantly, we’ll examine the necessary steps to lower your organization’s risk
using the provided risk management tools. Finally, we’ll explore integrating third-party
products into Vision One and maximizing data sources, enhancing Vision One’s discovery
capabilities for a more comprehensive and accurate view of your organization’s security
posture.
Getting Started with Trend Vision One Attack Surface Risk Management 2
Student Guide
Before We Start
Post questions in the Chat and Q&A pane only Download your copy of the Student Guide
from the Education Portal
Post any questions in the Q&A pane. The Chat pane is not being monitored by the trainers.
The Student Guide for this course can be downloaded from the Trend Education Portal.
• Log into your account, click the Getting Started With Attack Surface Risk
Management course.
• Scroll to the Course Syllabus section and click to download the Student Guide
PDF.
Getting Started with Trend Vision One Attack Surface Risk Management 3
Student Guide
The threat landscape is always changing, but the drastic shifts of recent years have made
unprecedented demands of security teams.
• Attackers are trying to attack in all kinds of new ways and new places.
• The battleground never stops growing and changing.
• This very complex and diverse digital environment presents new opportunities
for attack.
• An increased number of cyber assets means more of those assets are likely to be
vulnerable, more areas of weakness arise in the infrastructure, and, overall,
results in an even bigger and more profitable target that cybercriminals are only
too eager to exploit.
Getting Started with Trend Vision One Attack Surface Risk Management 4
Student Guide
Cyber Assets
Compromised Credentials
Weak Credentials
Where are my cyber assets & how many are there?
Ransomware
Phishing
Social Engineering
Software Vulnerabilities
Exposures & Vulnerabilities?
Denial-of-Service
Unpatched Vulnerability
Misconfiguration
Impact of a compromise?
…
5
5 | ©2023 Trend Micro Inc.
The attack surface refers to all cyber assets and all the attack vectors you are facing. When
it comes to your attack surface, you can no longer consider only assets like endpoints,
servers and workloads, but now must consider identities, mobile devices, IoT, OT, cloud
infrastructure and so on.
• Facing the perfect storm: Ever-growing number of cyber assets in your
organization on one side, and on the other, attackers who continue to find new
and novel ways of infiltrating organizations and systems. You need to understand
the attack surface. Asking and answering things like:
• Which assets present an easier challenge for attackers?
• How impactful would it be if that specific asset is compromised?
• Does it host sensitive data, or belong to VIP employee in your company,
like an executive?
• What is its relationship or connection with other assets?
• Depending on skills, resources, and available tools in your organization, the
difficulty in getting to these answers could range from tedious to impossible.
Getting Started with Trend Vision One Attack Surface Risk Management 5
Student Guide
82 %
Of breaches, Identity compromise is a key element.
70%
of organizations have been compromised via an unknown, unmanaged, or poorly
managed internet-facing asset.
52%
of Trend Micro IR incidents start with phishing
Due to this attack surface scale in the past year alone, nearly 70% of organizations have
been compromised via an unknown, unmanaged, or poorly managed internet-facing asset.
This is partly due to the complexity of taking an inventory of external-facing assets — with
the average organization taking upwards of 80 hours to generate an accurate picture of
their attack surface.
Source: https://www.randori.com/reports/the-state-of-attack-surface-management-2022/
6
Student Guide
You are probably already familiar with Trend’s ASRM Lifecycle (Discover, Assess, Mitigate).
With Attack Surface Risk Management capabilities in Vision One, we offer customers a full
cyber risk lifecycle management solution helping you become more proactive at identifying
potential risk, and mitigating or remediating it before that risk can be realized in the form
of a breach or incident.
7
Student Guide
User &
Identity
Endpoints
& Servers
Cloud Infra It begins with visibility
Only when you have a holistic view
of your attack surface can you:
Email Applications
5G Network
Code
Repo
8 | ©2023 Trend Micro Inc.
To manage risk effectively - now more than ever organizations need full holistic visibility.
This is essential for addressing critical questions that risk decision-makers grapple with,
ultimately improving their overall management of risk exposure.
8
Student Guide
9 | ©2023 Trend Micro Inc. * Source: Forester, Erik Nost, Senior Analyst
This illustration (Erik Nost, Senior Analyst at Forester) simplifies the concepts of “proactive”
versus “reactive” security approaches using a house analogy to illustrate fixing a leak.
When it comes to ASRM (proactive security), it’s about staying ahead of the game and
safeguarding your organization’s digital landscape.
Getting Started with Trend Vision One Attack Surface Risk Management 9
Student Guide
Trend’s ASRM is built to manage the full cyber risk lifecycle and it collapses multiple market
capabilities into one offering. It has the broadest and deepest capability set on the market.
Why get one thing when you can get everything you need to manage risk and ease the
burden on your team with prioritization and central management built-in.
Unlike other Attack Surface Management (ASM) vendors it goes beyond discovery with
assessment and remediation.
• From point products by assessing risk across the attack surface, as opposed to
looking at risk in individual areas or for specific vectors.
• From other Risk Scoring/ Dashboard solutions by being able to assess a broader
set of risk factors.
• From a risk assessment perspective in particular, no other vendor offers the
option to consider or calculate risk across so many factors. We offer risk scoring
across cloud assets, internet-facing assets, devices, cloud app activity, account
compromise, user activity and behaviors, vulnerabilities, XDR detections, and
threats. This offers a comprehensive assessment of risk, as compared to
competitor’s siloed risk views or "checkbox" capabilities without any integrations
between all of the risk factors.
• From key competitors by offering a platform approach that consolidates XDR and
helps operationalize Zero Trust strategies.
Getting Started with Trend Vision One Attack Surface Risk Management 10
Student Guide
More and more customers are moving towards a consolidated platform approach and
Trend Vision One is uniquely positioned to help you move in that direction at your own
pace.
The Trend Vision One platform represents a truly integrated approach and visibility across
the entire digital environment.
• The platform includes the solutions, services, and technology that connect and
benefit security and operations teams across multiple functions.
• More importantly, the platform delivers a single common framework so security
teams can bridge threat protection and cyber risk management to drive better
security outcomes and accelerate the business.
Getting Started with Trend Vision One Attack Surface Risk Management 11
Student Guide
Do I have complete
visibility of risks in my
environment? What are the steps I can take
to lessen the chances of an
attack?
During today’s session, we will delve into the significant role that comprehensive risk
management plays in ASRM.
ASRM today is helping our customers answer some extremely important questions,
questions that you might be asking yourself like:
• Why is my Risk Index 57? (or whatever that number may be) Understanding risk
calculation is crucial for risk management, stakeholder communication, and risk
reduction. Considering factors like threats, vulnerabilities, and potential consequences,
understanding your risk assessment helps identify risks and their relative importance.
• Do I have complete visibility of risks in my environment? One of the most pressing
concerns today is about risk visibility and if you have complete visibility of your
environment.
• Are we compliant? If not, how do we get and stay there? Another critical area of
concern is compliance. Its not just about being compliant in a point of time but getting
compliance and then staying compliant.
• How do I make the best use of my team, technology and time? Customers are asking if
we can address their need to reduce complexity and cost. How can they make the best
use of their team (big or small) their existing investments and the time.
• What steps should/could I take to lessen chances of an attack? Improving cyber
resilience is top of mind and what steps should/could they be taking to ensure they are
as secure as can be. I am sure one or all these questions are on your mind as well.
Getting Started with Trend Vision One Attack Surface Risk Management 12
Student Guide
ITOps SecOps
Understanding the questions that security personas need answers to is crucial for effective
risk management. Let’s explore some common inquiries that security professionals
encounter.
Addressing these questions helps organizations quantify cyber risks and make informed
decisions. By understanding the risks thoroughly, security leaders can communicate
effectively both upstream and downstream, helping you maintain a healthy security
posture.
Getting Started with Trend Vision One Attack Surface Risk Management 13
Student Guide
But before diving into risk discussions with stakeholders and adopting a risk-based
approach to cybersecurity, it’s essential to first understand the fundamentals of the Cyber
Risk Management Lifecycle.
Getting Started with Trend Vision One Attack Surface Risk Management 14
Student Guide
CYBER RISK
TRACKING &
MONITORING DISCOVER ASSETS &
ASSET VALUATION
The following cyber risk management lifecycle, adapted from Juan Pablo Castro at Trend
Micro, serves as a strategic compass for navigating the complexities of digital threats. While
numerous sources, such as this one (https://medium.com/@jp_castro/navigating-the-
lifecycle-of-cyber-risk-management-a-strategic-blueprint-d810abdc5b69) offer further
insights, we will provide a concise overview here.
This lifecycle is not just a framework; it's a structured methodology guiding organizations
through the complex terrain of digital threats.
The Cyber Risk Management Lifecycle facilitates this by providing a structured methodology
to identify, assess, mitigate, and monitor cyber risks in a continuous loop of improvement.
1. The lifecycle begins with discovering every asset and assigning a valuation to each one.
It's crucial to set the context and criticality of every asset, as this forms the foundation
for managing cyber risk. Without this, it is not possible to manage cybersecurity risk.
This process involves identifying all assets and how they are related, including IPs, PCs,
Getting Started with Trend Vision One Attack Surface Risk Management 15
Student Guide
desktops, containers, Lambda functions, APIs, websites, and more. This process is very
complex.
• While companies can utilize a variety of tools within their technology stack to
manage assets, the real challenge lies in maintaining an updated asset list and
comprehending the criticality of each asset. Platforms like Vision One automates
this process, allowing you to update asset criticality starting with a solid baseline.
• This initial phase of discovering assets and assessing their criticality is key to the
Cyber Risk Management Lifecycle.
1. The second phase involves identifying vulnerabilities, threats, and consequences
associated with the discovered assets. This step is crucial as it forms the basis of the risk
definition.
2. Once these elements are identified, the next step is to assess and calculate the cyber
risk. This involves not only identifying these factors but also quantifying them in a
measurable way, such as with risk scoring.
3. After assessing the risk, the next step is to implement defenses and controls to mitigate
the cyber risk. This is a critical part of the Cyber Risk Management Lifecycle, unique to
managing cyber risks. It's important to note that cyber risk management is part of
operational or IT risk management, which are handled differently and require a different
approach.
4. Following mitigation, continuous tracking and monitoring are essential. Unlike static
methods like GRC (Governance, Risk, and Compliance), continuous monitoring ensures
that risks are actively managed, not just assessed periodically.
5. After mitigation and monitoring, continuous reassessment and recalculation of cyber risk
is necessary. This continuous cycle ensures that risks are managed dynamically, adapting
to changes in the risk landscape.
Imagine for a moment having to perform all these steps using only your own tools and
resources!
Getting Started with Trend Vision One Attack Surface Risk Management 15
Student Guide
Threat
IDENTIFY
VULNERABILITIES,
THREATS & Potential Theoretical
CONSEQUENCES Cyber Cyber
Risk Cyber Risk
RISK
Vulnerability Cyber Consequence
Risk
Exposure
Source: Adapted from Navigating the Lifecycle of Cyber Risk Management (Juan Pablo Castro, Trend Micro)
16 | ©2023 Trend Micro Inc.
The definitions of threats, vulnerabilities, and consequences are crucial for understanding
cyber risk.
• Threat refers to anything that has the potential to cause harm or allow unauthorized
access to an information system. This could be malicious actors, state-sponsored groups,
cyber criminals or insider threats.
• Vulnerability is a weakness that can be exploited by a threat. Examples include
unpatched software, misconfigured controls and users who may fall victim to social
engineering.
• Consequence is the impact or damage that would occur if a threat successfully exploits
a vulnerability. Financial loss, reputational harm, loss of proprietary data, and business
disruption are common consequences.
Getting Started with Trend Vision One Attack Surface Risk Management 16
Student Guide
• Then, if you have a vulnerability and a consequence but no threat, then you have
a cyber risk exposure. But at any time, the threat can happen and then at this
point, the cyber risk exists.
• Cyber Risk: Represents the potential for losses or damages that may occur due to a threat
exploiting a vulnerability and resulting in a consequence. It is the overarching concept that
encompasses all aspects of the potential negative outcomes of cyber events.
• Potential Cyber Risk: The intersection of Threat and Vulnerability, highlighting that there is
a risk present if both a threat exists and the system is vulnerable to it, even if a
consequence has not yet occurred.
• Theoretical Cyber Risk: The intersection of Threat and Consequence, there is a theoretical
risk when a threat could have serious consequences, even if a current vulnerability isn’t
identified.
• Cyber Risk Exposure: This is the area where Vulnerability and Consequence intersect,
indicating that there is exposure to risk when a system is vulnerable and the
consequences of an exploit are potentially significant, regardless of the current level of
threat.
Central to the Cyber Risk Management Lifecycle is the in-depth analysis of vulnerabilities,
threats, and consequences, as illustrated by the intersecting circles of the diagram. Each
component plays a critical role in the formulation of an organization’s cybersecurity risk
index or your risk posture, and ONLY, when all three are present does a cyber risk
materialize.
This explanation provides a qualitative understanding of the main concepts, but once we
delve into calculations, the picture becomes much clearer!
Getting Started with Trend Vision One Attack Surface Risk Management 16
Student Guide
0
Threat
CYBERRISK
ASSESSMENT,
PROFILING & Cyber
CALCULATION
y
x
RISK
z
cr
100
Consequence
Vulnerability
0
0
Source: Adapted from Navigating the Lifecycle of Cyber Risk Management (Juan Pablo Castro, Trend Micro)
17 | ©2023 Trend Micro Inc.
To simplify the discussion about risk, instead of diving straight into complex terminology
like threats, vulnerabilities, heat maps etc., consider this straightforward approach.
Start out by placing your cyber risk at the center as a variable, with three axes representing
threats, vulnerabilities, and consequences.
Picture the score ranging from zero at the edge to 100 at the center. Next, assign values to
each component—let's call them X, Y, and Z—and then use a formula to calculate the
overall cyber risk score.
Getting Started with Trend Vision One Attack Surface Risk Management 17
Student Guide
0
Threat
62
CYBERRISK
ASSESSMENT,
PROFILING & Cyber 67 𝑓 62,43,51
CALCULATION
RISK
67
100
51
43
Consequence
Vulnerability
0
0
Source: Adapted from Navigating the Lifecycle of Cyber Risk Management (Juan Pablo Castro, Trend Micro)
18 | ©2023 Trend Micro Inc.
Going further we then add in some numbers. For instance, here we have a threat score of
62, a vulnerability score of 43, and a consequence score of 51, and when all this is
calculated, you end up with an overall risk as 67. This numerical approach is essential,
because you are starting with a value, and with values you can then compare them.
This is especially important for business leaders like CEOs or CFOs, who may not grasp what
ransomware is, what the name is of the black basta family, or if something is a vulnerability,
a CVE and so on, but they do understand numbers. They can easily compare numbers, and
they can compare the performance of the company based on numerical values. Public
companies use similar methods, like stock market comparisons, to gauge their
performance against competitors.
Vision One ASRM is dedicated to solving the persistent challenge you face daily: assessing
and calculating cyber risk within a dynamically evolving environment.
It is also vital to recognize that this scoring is not fixed or static. While you could manually
undertake these calculations (if you so desired!), it's essential to note that these variables
are continually in flux. Threats, vulnerabilities, and consequences can swiftly evolve,
necessitating ongoing recalculations to proactively manage cyber risks.
In Vision One ASRM, the cyber risk calculation is a dynamic process that adapts to the
evolving landscape of threats.
Getting Started with Trend Vision One Attack Surface Risk Management 18
Student Guide
This example highlights the invaluable role of Vision One in managing your risk calculations.
Utilizing NIST standards, Vision One ensures meticulous and reliable risk assessments,
streamlining your cybersecurity efforts.
Getting Started with Trend Vision One Attack Surface Risk Management 18
Student Guide
Risk Risk
Prioritization Reduction
Vulnerability Compliance Misconfiguration Threat/Attack
Getting Started with Trend Vision One Attack Surface Risk Management 19
Student Guide
• Asset Discovery
• Asset Influence
Threat Activity
• Threat Detections
Detection from
Investigation
• Attack attempts
Impact of successful attack
Trend Vision One ASRM provides quick and accurate risk assessments by continuously
updating metrics and generating individual asset risk scores and a company-wide risk
index.
It monitors cyber assets like devices, public domains, IPs, applications, cloud assets, and
identities by analyzing vulnerability, exposure, security control data, XDR telemetry, and
threat intelligence feeds.
Getting Started with Trend Vision One Attack Surface Risk Management 20
Student Guide
For a comprehensive understanding of our risk calculation methodology and the standards
we adhere to, we invite you to explore our white paper, "More than a Number: Your Risk
Score Explained." https://www.trendmicro.com/en_ca/business/products/detection-
response/attack-surface-management.html?modal=s3b-btn-get-the-report-a2575b#tabs-
69e2de-2
Getting Started with Trend Vision One Attack Surface Risk Management 20
Student Guide
Tools Used
System and Network Management Consoles, XDR XDR Workbench, Search App, Threat Intelligence, Executive Dashboard (Risk Index, Security Posture Status),
Workbench, Operations Dashboard, Security Forensic App, Security Playbooks, Operations Automated Risk and Compliance Reports, Attack Surface
Configuration and Control Dashboard
21 | ©2023 Trend Micro Inc.
Dashboard, Attack Overview Exposure Overview
Vision One has custom views and dashboards for the entire security team, from generalist
to specialist to senior leader.
This training focuses on two main persona use cases (as shown in the outside columns of
this illustration)
Let’s break down the key points:
1. Personas:
• Operations Personas: These include SOC Analysts, IT Operations, and others.
They focus on lowering the risk score. Their main dashboard is the Operations
Dashboard.
• Executive Personas: These individuals are concerned with monitoring and
reporting. They primarily work in the Executive Dashboard, where they review
items like the Risk Index, Security Posture Status, Reports, and attack surface
exposure.
2. Vision One XDR:
• The middle column is covered by Vision One XDR, which will not be covered in
today’s session. If you’re interested in learning more about XDR tools in Vision
One designed for Incident Responders, we recommend checking out the Trend
Education portal for XDR training.
Getting Started with Trend Vision One Attack Surface Risk Management 21
Student Guide
Executive Dashboard
Use the Executive Dashboard to get better insights into your company's security posture
including the overall risk index, device exposure, and on-going attacks.
Getting Started with Trend Vision One Attack Surface Risk Management 22
Student Guide
The Executive Dashboard, helps you understand and report on how risk is changing over
time. Vision One aggregates data from across the enterprise, including third-party security
tools, so you can identify areas of weakness, make risk-informed decisions, and benchmark
against peers in the same region, industry, or company size.
During the upcoming demo, we’ll delve into the Executive Dashboard more closely.
Getting Started with Trend Vision One Attack Surface Risk Management 23
Student Guide
Operations Dashboard
Getting Started with Trend Vision One Attack Surface Risk Management 24
Student Guide
Within the Operations Dashboard, you’ll notice the following button labeled “Data
sources.” Note that these data sources play a crucial role in calculating your risk index.
Data sources are what provide essential information for assessing and quantifying risks
within your organization.
Getting Started with Trend Vision One Attack Surface Risk Management 25
Student Guide
When you click the “Data Sources” button you will be able to view all the data sources that
are contributing event data to Vision One.
This view provides a clear visualization of the relationship between data sources and
individual risk factors. Each data source directly corresponds to specific risk factors that
Vision One can identify.
On the left side, you’ll find the sources contributing data, which informs the risk factors
displayed on the right.
Those blue dots represent the sources that upload event data to Vision One.
It’s evident that the greater number of blue dots you observe, the more comprehensive
your understanding becomes of your organization’s security posture. Consequently,
prioritize adding as many data sources as possible to improve your risk management
efforts.
And now let’s jump into the demonstrations of the Executive and Operations Dashboards.
Getting Started with Trend Vision One Attack Surface Risk Management 26
Student Guide
Getting Started with Trend Vision One Attack Surface Risk Management 27
Student Guide
Set goals
Communicate risk
When it comes to risk management, most security professionals have a single focus: How
can I reduce my risk? It’s a critical question, and organizations strive to implement effective
strategies to minimize vulnerabilities, mitigate threats, and enhance their overall security
posture.
General best practices that security teams can use to achieve their risk reduction goals
include:
• Set goals: What are your objectives for risk reduction? Are you simply trying to lower
your current risk index? , or match the industry standard? etc.
• Prioritize risk events: It is important to manage resource allocation effectively by
working on risk events that have the highest impact.
• Assess and readjust: Continuously assess risk re-adjusting your strategy as you go
• Communicate risk: Communicate your risk to risk-decision makers and stakeholders
• Consider the following scenario: An IT manager observed that the top 10 risk events
categorized under the “RISK REDUCTION MEASURES” were all “XDR” detections. The
Managed Detection and Response (MDR) team informed the IT manager that the
workbench alerts were false positives.
• Issue: Although the team closed the workbench in their case management
system, they neglected to close the corresponding workbench in Vision One.
This oversight occurred because their standard operating procedures (SOPs) for
Getting Started with Trend Vision One Attack Surface Risk Management 28
Student Guide
the managed XDR team did not include a specific process for closing false positive
workbenches in Vision One.
• Takeaway: Even if you have a managed XDR service, as a customer, you may still
be responsible for manually closing these workbenches in Vision One. It’s
essential to align your procedures to ensure comprehensive incident
management.
Getting Started with Trend Vision One Attack Surface Risk Management 28
Student Guide
When your job involves risk mitigation, your primary focus centers on implementing Risk
Reduction Measures within the Operations Dashboard.
This entails proactively taking steps to lower your organization's risk index to an acceptable
level.
These measures (Remediation steps) serve as your daily to-do list, already prioritized for
you by Vision One, so you can focus on the events with most significant impact on your
organization’s risk posture.
Getting Started with Trend Vision One Attack Surface Risk Management 29
Student Guide
2. Match the industry average: Shows the events that you should remediate to help
you match the average risk index for your industry.
3. Focus on the top 10 high-impact risk events: Shows you the events to remediate
which are affecting your Risk Index the most.
Getting Started with Trend Vision One Attack Surface Risk Management 30
Student Guide
4. Achieve your own goal: Set your own custom goal to achieve your own Risk Index
outcome.
Getting Started with Trend Vision One Attack Surface Risk Management 30
Student Guide
Risk Prioritization
Risk prioritization means figuring out which risks are the most important to deal with first
allowing you to:
• Use your time and money on handling risks that could cause the most harm.
• Reduce the impact of critical risks on your business.
• Enhance decision-making and clarity on how to handle risks.
• Improve your resilience to unforeseen events and disruptions.
• Better align risk management functions to business goals.
Getting Started with Trend Vision One Attack Surface Risk Management 31
Student Guide
• New: Indicates that the risk has been recently identified and still requires processing.
The risk status of an event remains “new” until you change it to one of these available
statuses.
• Impact on Risk Index: The risk contributes to the overall risk calculation during
this phase until further assessment.
• Use Case: Status assigned to newly discovered risks for initial evaluation.
• In progress: When a risk is marked as “In Progress,” it indicates that your team is actively
working on addressing it.
• Impact on Risk Index: The risk remains part of the overall risk calculation but
may be weighted less heavily during this phase.
• Use Case: Assign this status to risks that are being investigated or undergoing
processing.
• Remediated: A risk marked as “Remediated” indicates that the identified issue has been
resolved or mitigated successfully.
• Impact on Risk Index: The risk score associated with this issue decreases by the
“Real-time Score Impact” value (Operations Dashboard > Risk Reduction
Measures).
• Use Case: Apply this status once the risk has been fully addressed.
Getting Started with Trend Vision One Attack Surface Risk Management 32
Student Guide
• Dismissed: Status implies that the risk was evaluated and deemed not applicable or
insignificant.
• Impact on Risk Index: Dismissed events are excluded from the overall calculation
and do not affect the Risk Index until a new instance of the event is reported, or
an event rule for the risk event is created.
• Use Case: Use this status to indicate acknowledgment of a risk that you are
deciding not to take immediate action (instead you are deciding to tolerate the
risk temporarily). Examples include, monitoring a minor deviation, accepting a
known limitation, or awaiting further data and so on.
• Accepted: When a risk is marked as “Accepted,” it acknowledges that the risk exists, but
the organization has decided not to take immediate action. When marking a risk event as
“Accepted”, you may create an event rule to mark current and future instances of the
event as “Accepted” for a specified time period.
• Impact on Risk Index: The risk remains part of the overall calculation. Accepted
events continue to affect the Risk Index until they are remediated or dismissed.
• Use Case: Apply this status when the risk is accepted as part of the organization’s
risk tolerance. It is like saying, “I agree but I can’t do anything about it.” For
example, used for events that have been marked as too difficult or expensive to
address etc.
In our upcoming demo, we will provide an in-depth review of the “Change Status” options
that can be used as tools for risk management.
Getting Started with Trend Vision One Attack Surface Risk Management 32
Student Guide
“Event Rule Management” provides a centralized location to view and manage event rules.
Event rules can be created when changing the status of risk events to “Dismissed” or
“Accepted”.
Getting Started with Trend Vision One Attack Surface Risk Management 33
Student Guide
Dismissed:
• Event rules for “Dismissed” events suppress the reporting of future instances of
the risk event.
• Events marked as “Dismissed” will no longer negatively impact the Risk Index.
Getting Started with Trend Vision One Attack Surface Risk Management 34
Student Guide
Changing the event status to “Dismissed” is used to indicate that you do not agree with the
event because it is not applicable to your environment.
Once you select “Dismissed”, over to the right you will have the options to create an event
rule for the selected risk event. If you select this check box, you then have the option to
select “Event rule settings” allowing you to specify the scope for dismissing this rule. You
can select the option to apply to “All assets”, or the ones that you select.
Note: By creating the event rule for the event, you are preventing duplicate events from
being created in the future and clogging up your Operations Dashboard > RISK REDUCTION
MEASURES which is effectively your risk (reduction) management workspace.
Under the “Notes” area on the right hand-side of the screen, you can optionally select “Risk
not applicable to my environment”, “False positive” and “Other”.
This will be explored in more detail in an upcoming demo.
Getting Started with Trend Vision One Attack Surface Risk Management 35
Student Guide
Accepted:
• Marking a risk event as “Accepted” and creating a related event rule ensures
existing and future instances of the risk event are marked as “Accepted” for the
specified time period.
• Events marked as “Accepted” will still contribute to your Risk Index.
Getting Started with Trend Vision One Attack Surface Risk Management 36
Student Guide
Future instances of the selected risk event are marked as “Accepted” during the specified
time period that is configured here.
You can additionally specify why the risk was accepted by selecting one of the options
appearing under the “Notes” section.
Getting Started with Trend Vision One Attack Surface Risk Management 37
Student Guide
Removing an event rule (in the case of false positives) provides the option for you to enable
reporting for future instances of the related risk event.
Getting Started with Trend Vision One Attack Surface Risk Management 38
Student Guide
Getting Started with Trend Vision One Attack Surface Risk Management 39
Student Guide
At first glance, you might assume that clicking a button would instantly update the risk
score. However, the reality is more intricate. Behind the scenes, a complex series of steps
involving multiple back-end technologies comes into play. As a result, recalculating the risk
index can take up to an hour. (The button is intentionally limited to run the calculation
process once per hour!)
• If you’re a patient person, rest assured that the risk index will automatically
adjust itself over time. But if you’re feeling impatient and want quicker results, go
ahead and use the button.
Please note the following limitation: Currently, the “Recalculate Risk Index” button does
Getting Started with Trend Vision One Attack Surface Risk Management 40
Student Guide
not grey out after you’ve clicked it. However, this issue will be resolved in an upcoming
release. Once fixed, the button will correctly grey out and present a notification indicating
that this state lasts for an hour. This enhancement is designed to prevent customers from
repeatedly clicking the button and causing a backlog of requests on the backend. It’s
essential to keep in mind that when the queue gets longer, risk indexes take longer to
recalculate.
Lastly, as the risk score fluctuates, it’s crucial to maintain vigilance and stay on top of timely
monitoring for effective risk management.
Getting Started with Trend Vision One Attack Surface Risk Management 40
Student Guide
• Balancing Act: Organizations should strike a balance between addressing risks promptly
and managing resource allocation effectively.
• Prioritize risks: Prioritizing risks is a critical aspect of effective risk management. As a
general guideline, prioritize risks based on severity, potential impact, and available
resources.
• Regular Review: Regularly review risk statuses to ensure they align with the current risk
landscape. Adjust status as needed based on changes in risk exposure or organizational
priorities.
• Communication: Transparently communicate risk status changes to relevant
stakeholders. Ensure that decision-makers understand the implications of each status
option.
Getting Started with Trend Vision One Attack Surface Risk Management 42
Student Guide
Devices
Internet-Facing Assets
Accounts
Attack Surface Discovery in ASRM offers a comprehensive asset-based view for managing
your attack surface.
Here’s how it helps:
1. Asset Identification: Discover all assets, both managed and unmanaged, before
potential attackers do.
2. Comprehensive View: Construct a detailed picture of your attack surface using native
data sources and third-party integrations.
3. Detailed Asset Profiling: Provides granularity to help you understand the impact of
selected assets on your organization’s overall surface risk.
4. Attack Paths: Visualize predicted attacker behavior through attack paths.
Getting Started with Trend Vision One Attack Surface Risk Management 43
Student Guide
Applications
Cloud Assets
Getting Started with Trend Vision One Attack Surface Risk Management 44
Student Guide
Getting Started with Trend Vision One Attack Surface Risk Management 45
Student Guide
Real-time monitoring of user activities and events in the selected AWS account.
View current compliance scores of account(s) based on five pillars of the AWS Well-Architected
Framework.
Why is having Cloud Security Posture Management important for Attack Surface Risk
Management? It secures your complex hybrid cloud environment by providing security for
preferred cloud platforms like AWS, Microsoft Azure, and Google Cloud Platform.
Getting Started with Trend Vision One Attack Surface Risk Management 46
Student Guide
With the complexity of today’s attack surface, it has also become increasingly important to
understand identities and their behaviors.
Getting Started with Trend Vision One Attack Surface Risk Management 47
Student Guide
Getting Started with Trend Vision One Attack Surface Risk Management 48
Student Guide
Getting Started with Trend Vision One Attack Surface Risk Management 49
Student Guide
Getting Started with Trend Vision One Attack Surface Risk Management 50
Student Guide
Third-Party Integration
Integrate data from various sources (for example, threat intelligence feeds, vulnerability
management systems, SIEMs etc.) to create a comprehensive risk picture.
This enables ARSM to continuously query the Vision One platform for updates on asset
statuses and associated risk scores.
We continue to grow our integration ecosystem to ensure Vision One fits seamlessly within
your existing security stack.
Our hybrid approach stands out by extending third-party integrations to ingest and
normalize activity from more of the customer environment through purpose-built and
flexible API-driven integrations.
• Security Information and Event Management (SIEM)/Security Orchestration,
Automation, and Response (SOAR)
• IT Service Management (ITSM)
• Breach Attack Simulation
• Managed Detection and Response (MDR)
• Cloud Services
• Threat Intel
• Network
• Endpoint Management
• Identity and Access Management (IAM)
Getting Started with Trend Vision One Attack Surface Risk Management 51
Student Guide
• Vulnerability Management
Getting Started with Trend Vision One Attack Surface Risk Management 51
Student Guide
Data sources are essential for Vision One to more accurately identify, assess, and calculate
risks. Each data source is directly related to specific risk factors that Vision One can identify.
On the left side, you can see the sources contributing data, which informs the risk factors
displayed on the right.
Getting Started with Trend Vision One Attack Surface Risk Management 52
Student Guide
Getting Started with Trend Vision One Attack Surface Risk Management 53
Student Guide
Getting Started with Trend Vision One Attack Surface Risk Management 54
Student Guide
Feed data from all deployed security products into Vision One for a consolidated risk
assessment.
More data sources enhance the quality and depth of risk assessment, resulting in a more
accurate and complete risk score calculation.
Key points to understand the relationship between data sources and events:
Getting Started with Trend Vision One Attack Surface Risk Management 55
Student Guide
IMPORTANT: If you do not see any blue dots, it indicates that you will not receive events
from the corresponding security products deployed in your environment. Ensuring proper
data integration is essential for effective risk assessment and comprehensive visibility.
Getting Started with Trend Vision One Attack Surface Risk Management 55
Student Guide
Getting Started with Trend Vision One Attack Surface Risk Management 56
Student Guide
Try it yourself
A 30-day full access trial of Trend Vision One is available for download.
58
Student Guide
Please complete the class survey at the following URL or by scanning the QR code:
https://www.surveymonkey.com/r/TrendMicroVisionOne
This helps guide the development of courses and helps ensure that content matches your
requirements.
59
Student Guide
Additional Resources
• Trend Vision One : The Power of your Risk Score
− https://youtu.be/EEfP-AqPlLY?si=Ho9O7XXmMCL1ZPs0
• Attack Surface Risk Management - Take Charge of Risk (Demo)
− https://youtu.be/cknqj0strTk?si=fkvpixAkfbs6nFNA
• Attack Surface Risk Management - Actionable Insights (Demo)
− https://youtu.be/myOks054mR0?si=uQlwZySwC98cBMvU
• MORE THAN A NUMBER-YOUR RISK SCORE EXPLAINED.pdf
− https://resources.trendmicro.com/rs/945-CXD-062/images/MORE%20THAN%20A%20NUMBER-
YOUR%20RISK%20SCORE%20EXPLAINED.pdf
• For more learning resources visit: Education.trendmicro.com
Appendix
Getting Started with Trend Vision One Attack Surface Risk Management 61
Student Guide
IMPROVE PRIORITIZATION:
Detection data
informs asset prioritization
Discover Detect
Assess Investigate
As you can see, whether we are talking about a CISO managing risk or a SOC leader trying
to respond to threats, the challenges are related.
• The more proactive risk mitigation, the fewer security incidents the SOC team has to
respond to.
• Likewise, the detection data collected by XDR provides valuable insight that can factor
into risk assessments.
• There are multiple points of interaction across these functions.
This provides you with a single place where teams can work across their borders to close
the gap between attack surface risk management and detection and response. This is the
winning formula for security teams across industries.
Getting Started with Trend Vision One Attack Surface Risk Management 62