What is the Edgescan scanning approach?

Edgescan takes a production safe (AKA low & slow) approach to scanning minimal impact should be expected on your testing environments.

Version Number: v1.0.1

Published Date: 16 May 2024

____________________________________________________________________________

CTEM Phase 2: Discovery

During this phase, the organization conducts a comprehensive inventory of all assets that could potentially be targeted by attackers. Full-stack (Network & Application) Vulnerability Assessment helps catalogue all vulnerable assets across the attack surface.

CTEM Phase 4: Validation

Dynamic Application Security Testing (DAST) is typically involved in the validation phase of the Continuous Threat Exposure Management (CTEM) process.

In this phase, the identified vulnerabilities are validated to confirm if they are real and exploitable.

Network/Host/Server Layer Scanning

Our network/host testing takes a passive approach and has a very minimal impact on targets. Test types are limited to non-intrusive tests – by virtue of the nature of the vulnerabilities themselves, a majority of tests are based around version and configuration detection.

 

Web Application & API Layer Scanning

Edgescan adopts a low and slow approach – by default we limit the HTTP traffic to a maximum of 6 requests per second. From our experience scanning thousands of production systems, we have found that this is a safe threshold to use on just about every application. These levels can be adjusted to your desired levels.

Only safe payloads are used – for example, when testing for SQL Injection we will only use read-only checks. 

You have the ability to customize the scope of testing based on your preferences. For example, if the web application includes sensitive functions or certain requests may affect data you want to keep unchanged, you can exclude these functions from the scan to ensure they are not tested.