Assess Network Risks with Censys
One of the primary reasons for acquiring Censys is to shrink your network's attackable surface area, so Censys proactively flags risks in order to draw your attention to the places that need it.
Get started by customizing risk settings in order to reduce noise. Then, investigate and remediate risks in your network to improve your security posture.
Configure Risk Settings
As Censys continuously maps your organization's attack surface, it surfaces more than 50 different risks. You can tune the risks list by updating severities to those that better fits your security policies, accepting particular instances of a risk, or disabling altogether.
You can edit a risk right from the table, or you can click the blue Configure Risk button to view all 50+ risks that Censys monitors and finds, and configure those risk settings.
After you have configured your risks and Censys has remapped your attack surface, head to the risks section of the app to start investigating.
Risks in the table are listed by severity, with the highest severity at the top. They are also separated by whether they are on hosts that Censys believes your organization administers directly, or on shared web hosts administered by third parties.
Click on the linked asset count in the Affected Assets column to go to the asset list page filtered by the risk.
|Note||We recommend remediating all of the risks in your attack surface. If complete remediation is not possible, you can filter to find the risks that your company deems most important.|
Certificates that are expired or about to expire can pose a risk to your company. You can utilize the certificate risks on the Certificates page to ensure that you’re renewing your certificates before they expire, or to locate where already expired certificates are being presented.
Similar to certificates, domains that are expired or are expiring soon can also pose a risk to your company. The Domains page will show domains that have expired or will expire soon.
Most host risks are related to services that are exposed to the public Internet. Other risks include outdated TLS versions or weak cipher suites.
Using the Hosts by IP page, you can filter your hosts to show only those exposing risks of a certain severity, or even show a combination of specific risks.
On a Host Details page, expand the red risks banner at the top of the page to see the list of risks and click into each risk to obtain details and remediation recommendations.
Storage Bucket Risks
Misconfigured storage buckets are an increasingly common source of security incidents. In order to help keep your company out of the headlines, you can use the Storage Buckets page to ensure that the permissions are correctly configured for your storage buckets.
Further Reading on Risks
See this reference article for a description of every risk that the Censys ASM platform identifies.