Perfecting imperfections with one to ONE

Glossary

Attack Surface

An attack surface includes all potential points, or "attack vectors," where unauthorized users can access data or systems. It is divided into three domains: network, software, and human surfaces.

Reducing the attack surface is a key security principle, accomplished by closing unnecessary ports, minimizing active code, and enforcing strict access controls to limit adversaries' opportunities.

To effectively manage these vulnerabilities, cybersecurity professionals utilize specific frameworks and technologies designed to map and monitor these exposure points. The following key concepts represent the practical application of attack surface reduction within modern enterprise environments:

  • ASM (Attack Surface Management) tools: Continuous discovery of internet-facing assets.
  • Vulnerability vs. Attack Surface: Distinguishing between specific flaws and general exposure.
  • Zero Trust Architecture principles: Minimizing the surface by verifying every access request.
  • Shadow IT discovery methods: Identifying unauthorized systems that expand the surface.