Skip to content

Asset Inventory

The Asset Inventory is the foundation of ShadowMap's External Attack Surface Management (EASM) platform. It provides a continuously updated catalog of every externally visible digital asset belonging to your organization -- domains, subdomains, and IP addresses that collectively define your attack surface.

Why Complete Asset Inventory Matters

You cannot protect what you do not know exists. Organizations typically underestimate their external footprint by 30-40%. Shadow IT deployments, forgotten development servers, acquired company assets, and cloud sprawl create blind spots that attackers actively exploit. The Asset Inventory eliminates these blind spots by automatically discovering and tracking every asset tied to your organization, whether or not it was provisioned through official channels.

A complete inventory enables your security team to:

  • Prioritize remediation by understanding which assets carry the most risk (open ports, expired certificates, known CVEs)
  • Detect unauthorized assets such as rogue subdomains, shadow cloud instances, or unauthorized web applications
  • Track asset lifecycle from first discovery through decommissioning, ensuring nothing falls through the cracks
  • Measure attack surface growth over time and correlate it with organizational changes

How Asset Discovery Works

ShadowMap combines six complementary discovery techniques to build and maintain your asset inventory. Each method catches assets the others miss, producing a comprehensive view that no single technique could achieve alone.

Discovery MethodWhat It FindsHow It Works
DNS EnumerationSubdomains, mail servers, name serversPassive DNS collection and targeted resolution against known wordlists and zone data
Certificate Transparency (CT) LogsSubdomains with SSL certificatesMonitors public CT log streams for any certificate issued to your domains
Web CrawlingLinked applications, related domainsFollows links, form actions, and JavaScript references across your web properties
Cloud Source ImportCloud-hosted IPs, services, bucketsConnects to AWS, Azure, and Cloudflare APIs to import infrastructure directly (see Cloud Sources)
Reverse DNSIP-to-hostname mappingsResolves PTR records to identify which hostnames point to your IP addresses
WHOIS EnrichmentRegistration data, expiry dates, registrarQueries WHOIS databases to enrich domain records with ownership and lifecycle data

Discovery runs continuously. New assets typically appear within hours of creation.

Modules

ModuleWhat It ShowsKey Use Cases
DomainsRoot domains registered to or associated with your organizationDomain expiry monitoring, WHOIS tracking, DNS record auditing
SubdomainsAll discovered subdomains across your domain portfolioTakeover detection, shadow IT discovery, stale asset cleanup
IP AddressesIP addresses hosting your organization's servicesPort exposure review, geolocation verification, ASN analysis

Asset Status Tracking

Every asset in the inventory carries an Online or Offline status based on the most recent scan. Status changes are tracked over time, so you can identify assets that have recently gone offline (potential decommissioning) or come online (new deployments). Filtering by status across any module helps you maintain a clean inventory by surfacing assets that may need attention.

Data Export

All Asset Inventory views support CSV export for offline analysis, compliance reporting, or integration with third-party tools. Exports respect your current filter state, so you can export a targeted subset (e.g., only offline subdomains, or IPs in a specific country).

Common Workflows

  • Onboarding audit -- after adding your domains, review the full inventory to establish your baseline attack surface
  • Merger and acquisition -- add acquired company domains and let ShadowMap discover the inherited infrastructure
  • Compliance reporting -- export filtered views to demonstrate asset coverage to auditors
  • Incident response -- use the IP and subdomain detail views to quickly assess what a compromised asset exposes
  • Periodic review -- filter for stale or offline assets to identify cleanup candidates

ShadowMap by Security Brigade