White shape | Hexiosec Logo
Product Updates

New ASM Features and Improvements | March 2026

Lauren Palmer
31 March 2026
|
3 min Read
|
Lauren Palmer

Introduction

It’s been three and a half years since I wrote the first ASM product update. While we’ve posted updates every month since, this is only my second.

Looking back at that first post feels a bit surreal. The product was simpler, the scope smaller (our logo was even red). We had just released the scan overview page. No reports, no notifications. Since then, a lot has changed. We’ve helped build a National Picture of Risk for Jisc across the .ac.uk estate two years in a row, introduced actions to group and prioritise risks, and expanded our detections and discovery to give far deeper visibility into the attack surface.

It’s been a steady build, month by month—but it’s only when I look back at that first blog that I can really see what we’ve built at Hexiosec, and feel proud of it.

Now, let’s look at what we delivered this month.

AWS resource tags now visible in ASM

When discovering assets via Cloud Connector, context is everything. This month, we’ve started extracting tags from AWS resources and surfacing them directly in ASM alongside the seeds we create.

View our Cloud Connector on GitHub 

This means you don’t just see what was discovered, but how it’s described in your environment — whether that’s ownership, environment, or cost centre. It makes it easier to triage findings, understand intent, and route issues to the right place without needing to cross-reference in AWS.

Tags are currently visible on seeds, providing immediate context at the point of discovery.

We’re continuing to build on this in Q2, where we’ll expand tag functionality to support filtering and risk analysis based on tags.

Screenshot of seeds with AWS Tags

security.txt checks now included in ASM

When assessing your external attack surface, clear disclosure matters. This month, we’ve added support for detecting and validating security.txt files.

Screenshot of security.txt check

A security.txt file is a standard way to tell security researchers how to report vulnerabilities. Without it, responsible disclosure becomes harder, slower, or missed entirely.

We now check for the presence of a security.txt file in the expected locations and validate it against RFC 9116. This includes ensuring required fields like contact and expiry are present and correctly formatted, as well as identifying issues that may cause the file to be ignored.

Screenshot of security.txt risks

Where found, the file is surfaced directly in ASM, including its contents and a snapshot of how it appears externally. This gives you immediate visibility into how your disclosure policy is presented to the outside world.

Coming soon

We’re continuing to focus on improving how you prioritise and work through large volumes of data in ASM. Here’s what’s coming next:

  • Tags for results

    When a scan produces a large number of results, it can be difficult to manage and prioritise them effectively. We’ll be introducing tagging, allowing you to organise results, filter more easily, and focus on what matters most.

  • More contextual risk descriptions

    We’re enhancing risk descriptions to include more context about the specific asset they’re raised on. This will make it clearer why something matters and help you take action faster.

  • Improved performance for large scans

    For larger scans, we’re working on improvements to how results are loaded. Initial data will be available sooner, with the rest continuing to load in the background to reduce waiting time.

  • robots.txt checks

    Building on our work with domain policy files, we’ll be adding support for detecting and validating robots.txt, helping you ensure crawler directives are correctly configured and understood.

If there are other features you’d love to see in Hexiosec ASM, or Hexiosec Transfer (our true end-to-end encrypted file transfer app), please let us know.

Related Posts

About Lauren Palmer
Lauren is the Engineering Team Lead at Hexiosec, where she is responsible for a talented development team to solve real-world cyber security challenges. She is driven by a love for problem-solving and building practical solutions that make a tangible difference. Lauren holds an MEng in Electronic and Software Engineering, which fuels her passion for creating robust, efficient systems.
Lauren Palmer

See your real external attack surface - without the noise

Book a demo
Book a demo