Skip to main content
ASM Cheatsheet
Search...
⌘
K
Toggle theme
? shortcuts
Workflows
6 step-by-step procedures for common ASM scenarios, from beginner to advanced.
🟢
Beginner
30 minutes
New Domain Assessment
Your organization has acquired a new domain or you need to assess a domain's security posture.
5 steps
Start Workflow
🟡
Intermediate
2 hours
Continuous Monitoring Setup
Establish ongoing monitoring for changes in your attack surface.
5 steps
Start Workflow
🟡
Intermediate
1 hour
Incident Response Investigation
A security incident has occurred and you need to quickly assess the attack surface for potential entry points.
4 steps
Start Workflow
🔴
Advanced
4-8 hours
Merger & Acquisition Due Diligence
Your organization is acquiring another company and needs a comprehensive security assessment of their digital assets.
4 steps
Start Workflow
🟡
Intermediate
1-2 hours
Bug Bounty Reconnaissance
You're participating in a bug bounty program and need to efficiently map the target's attack surface.
5 steps
Start Workflow
🔴
Advanced
3-6 hours
Cloud Migration Assessment
Your organization is migrating to the cloud and needs to assess the security implications of the current and future attack surface.
1 steps
Start Workflow