Skip to main content

Activate Internet Perimeter Engagement

Assess your organization’s external security posture and identify high-risk vulnerabilities.

Updated over 5 months ago

Overview

The Internet Perimeter Engagement helps you understand how your organization appears from the outside — just like an attacker would see it. This assessment identifies high-risk vulnerabilities across your internet-facing assets and provides a prioritized list of remediation steps. It typically follows the Asset Discovery engagement and is activated by the CYE services team.


What This Engagement Does

This assessment:

  • Analyzes the security level of your external-facing infrastructure

  • Identifies vulnerable entry points

  • Recommends initial mitigation actions

  • Helps prioritize risks based on CYE’s proprietary risk rating methodology


How to Set Up the Engagement

Step 1: Create the Engagement

  1. Go to the Engagements page from the left navigation.

  2. Click + New Engagement.

  3. In the General Details tab, choose Internet Perimeter as the engagement type:

  4. Complete the required fields.


Step 2: Define the Assessment Scope

  1. Go to the Assessment Scope tab.

  2. Add at least one top-level domain to be scanned.

    • This is required to begin the perimeter scan.

  3. You can refine the scope by selecting specific assets on the Assets page.

Note: You can also import assets to define the scope more efficiently.


Step 3: Select Relevant Assets

  1. Go to the Assets page via the left navigation.

  2. Filter the list by your top-level domain:

  3. Review the results and select the assets you want to include.

  4. Click the Edit icon, mark the selected assets as Relevant, and save.

If you mark a domain as Not Relevant, its sub-entities will also be marked that way.
Marking an asset as Not Relevant will delete it from your system.


Step 4: Add Assets to the Engagement Scope

  1. In the Engagements area, navigate to Scope > Change Scope within Engagements.

  2. Use the search box to locate your Internet Perimeter engagement.

  3. Select the relevant assets.

  4. Ensure In Scope is selected, then click Update:

These assets will be added to the scope, but the selection won't be visible in the Assessment Scope tab.


Step 5: Finalize

  • Click Create to finish setting up the engagement

  • Add members if you'd like others to collaborate

  • A CYE services team member will activate the engagement


After Activation

Once active, the assessment will run and produce:

  • A prioritized list of security findings

  • Recommended remediation steps, rated using CYE’s risk model

  • New insights into your organization’s external vulnerabilities


Important notes

  • This is an active assessment — it simulates real-world external attacker behavior

  • Must follow a completed Asset Discovery engagement

  • Only CYE can activate this engagement

  • The scope must include at least one valid top-level domain


Wrap-up / Next Steps

This engagement gives you a clear view of how attackers see your organization — and where you're most exposed. Once complete, use the findings to begin mitigation planning and strengthen your external perimeter.

Did this answer your question?