EASM to email
easm to email
Overview
This workflow automates the collection and reporting of External Attack Surface Management (EASM) data by querying identified assets and APIs, then generating comprehensive email summaries for security teams. It provides regular visibility into the organization's external attack surface through structured reporting and data analysis.
How It Works
- Parallel EASM Data Collection: Simultaneously queries the EASM system to retrieve two key data sets:
- Asset Discovery: Fetches comprehensive list of identified organizational assets including domains, subdomains, and external-facing infrastructure
- API Inventory: Retrieves discovered APIs and their associated endpoints, services, and exposure details
- Data Consolidation: Merges the collected asset and API data using script processing to create a unified dataset for comprehensive analysis and reporting.
- Parallel Report Generation: Processes the consolidated data through two concurrent streams:
- Executive Summary: Generates high-level summary statistics, key findings, and risk assessments suitable for management review
- Detailed Excel Report: Creates comprehensive spreadsheet containing detailed asset inventories, API listings, and technical specifications
- Email Formatting: Structures the summary content and Excel report into professional email format with appropriate headers, descriptions, and attachment handling.
- Report Delivery: Executes the mail delivery process to send the formatted EASM report to designated recipients including security teams and stakeholders.
Who is this for?
- Security teams monitoring external attack surface exposure
- Risk management professionals requiring regular asset visibility reports
- IT administrators tracking organizational digital footprint
- Compliance officers needing external asset documentation for audits
What problem does this workflow solve?
- Automates manual EASM data collection and report generation, eliminating time-intensive security asset inventory processes
- Provides regular visibility into organizational attack surface changes through scheduled email reporting
- Standardizes external asset reporting format for consistent stakeholder communication and decision-making
- Ensures security teams maintain current awareness of exposed assets and APIs without manual monitoring overhead