image

What Is An Attack Surface?

Dec 23, 2019

In 2017, there were over 130 large-scale, targeted breaches in the U.S., and the numbers are growing every year by 27%. Professionals are always saying there is no such thing as perfect security. If this is true, then why aren’t all cyber vulnerabilities being exploited? It all has to do with what it's worth for the attacker. But to make sure the cost to exploit your organization outweighs the benefits, you need to understand the concept of an “attack surface.”

attack Surface

What is “Attack Surface”?

An “attack surface,” in cybersecurity, is defined as the number of vulnerabilities that can be exploited by an attacker. The smaller your attack surface, the less likely your organization will be exploited. Imagine a criminal deciding which building to rob. Between a building with multiple entries and another with just one, which do you think the criminal would choose? The latter would cost more time and energy to find a way to break in. This is how you want your organization to be. Fewer options for entry mean fewer possibilities of exploitation.

How to Minimize Your Points of Entry

  • Reduce coding: The less code you have, the less risk of exploitation. Keep things simple and eliminate any unnecessary features.
  • Clean up the OS: How many services in your OS are you using? Disable anything that is just taking up space.
  • Segmentation within your network: Having all your assets in one network may make things easier for you, but also your attackers. Increase your barriers by splitting things up!
  • Audit: When it comes to reducing your attack surface, the oldest trick in the book is regularly inspecting your software. This allows you to keep up-to-date with everything that goes on and map out any possible vulnerabilities.

Once you reduce your attack surface, remember that this doesn’t mean you’re vulnerability-free. Make sure you’re always aware of the vulnerabilities you still have. And always prioritize the biggest threats and act on them immediately!

image

Written by

Michael Assraf

Recent Posts

  • 1

    Could the Vulnerability Fujiwhara Effect Be the New Normal?

    Kent Weigle January 18, 2021
  • 2

    Six Ways to Improve Your Patch Management Practices

    Kent Weigle January 05, 2021
  • 3

    Top Trending CVEs of January 2021

    Kent Weigle February 01, 2021
  • 4

    So I Really Have to Update Chrome?

    Kent Weigle February 08, 2021
  • 5

    CVSS: The Vulnerability Dartboard

    Kent Weigle December 16, 2020
Roi_default.png

Start Closing Security Gaps

  • Risk reduction from Day 1
  • Fast set-up and deployment
  • Unified platform
  • Full-featured 30-day trial