Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Attack surface

From Wikipedia, the free encyclopedia
Software environment vulnerable to attack
For the 2020 science fiction novel, seeCory Doctorow § Fiction.

Theattack surface of asoftware environment is the sum of the different points (for "attack vectors") where an unauthorized user (the "attacker") can try to enter data to, extract data, control a device or critical software in an environment.[1][2] Keeping the attack surface as small as possible is a basic security measure.[3]

Elements of an attack surface

[edit]
This sectionneeds additional citations forverification. Please helpimprove this article byadding citations to reliable sources in this section. Unsourced material may be challenged and removed.(October 2021) (Learn how and when to remove this message)

Worldwide digital change has accelerated the size, scope, and composition of an organization's attack surface. The size of an attack surface may fluctuate over time, adding and subtracting assets and digital systems (e.g.websites,hosts, cloud and mobile apps, etc.). Attack surface sizes can change rapidly as well. Digital assets eschew the physical requirements of traditional network devices, servers, data centers, and on-premise networks. This leads to attack surfaces changing rapidly, based on the organization's needs and the availability of digital services to accomplish it.

Attack surface scope also varies from organization to organization. With the rise of digital supply chains, interdependencies, and globalization, an organization's attack surface has a broader scope of concern (viz. vectors for cyberattacks). Lastly, the composition of an organization's attack surface consists of small entities linked together in digital relationships and connections to the rest of the internet and organizational infrastructure, including the scope of third-parties, digital supply chain, and even adversary-threat infrastructure.

An attack surface composition can range widely between various organizations, yet often identify many of the same elements, including:

Understanding an attack surface

[edit]

Due to the increase in the countless potential vulnerable points each enterprise has, there has been increasing advantage for hackers and attackers as they only need to find one vulnerable point to succeed in their attack.[4]

There are three steps towards understanding and visualizing an attack surface:

Step 1: Visualize. Visualizing the system of an enterprise is the first step, by mapping out all the devices, paths and networks.[4]

Step 2: Find indicators of exposures. The second step is to correspond each indicator of a vulnerability being potentially exposed to the visualized map in the previous step. IOEs include "missing security controls in systems and software".[4]

Step 3: Find indicators of compromise. This is an indicator that an attack has already succeeded.[4]

Surface reduction

[edit]

One approach to improvinginformation security is to reduce the attack surface of a system or software. The basic strategies of attack surface reduction include the following: reduce the amount ofcode running, reduce entry points available to untrusted users, and eliminate services requested by relatively few users. By having less code available to unauthorized actors, there tend to be fewer failures. By turning off unnecessary functionality, there are fewersecurity risks. Although attack surface reduction helps prevent security failures, it does not mitigate the amount of damage an attacker could inflict once a vulnerability is found.[5]

Implementing an Attack Surface Management (ASM) program is crucial for organizations aiming to continuously monitor and manage their external digital assets. ASM involves the identification, analysis, and remediation of vulnerabilities across all internet-facing assets, ensuring that potential entry points are secured before they can be exploited by malicious actors.[6][7][8] A well-structured ASM program includes continuous discovery of cloud and on-premise assets, security validation, and real-time risk assessment, enabling organizations to proactively reduce their attack surfaces before cyber threats emerge.[6][8]

See also

[edit]

References

[edit]
  1. ^"Attack Surface Analysis Cheat Sheet". Open Web Application Security Project. Retrieved30 October 2013.
  2. ^Manadhata, Pratyusa (2008).An Attack Surface Metric(PDF).Archived(PDF) from the original on 2016-02-22. Retrieved2013-10-30.
  3. ^Manadhata, Pratyusa; Wing, Jeannette M."Measuring a System's Attack Surface"(PDF).Archived(PDF) from the original on 2017-03-06. Retrieved2019-08-29.{{cite journal}}:Cite journal requires|journal= (help)
  4. ^abcdFriedman, Jon (March 2016)."Attack your Attack Surface"(PDF).skyboxsecurity.com. Archived fromthe original(PDF) on March 6, 2017. RetrievedMarch 6, 2017.
  5. ^Michael, Howard."Mitigate Security Risks by Minimizing the Code You Expose to Untrusted Users". Microsoft.Archived from the original on 2 April 2015. Retrieved30 October 2013.
  6. ^abBuilding An Attack Surface Management Program(PDF). Stratascale.
  7. ^"What is an attack surface? Definition and ways to reduce it | NordStellar".nordstellar.com. Retrieved2025-02-28.
  8. ^ab"How to Build an Attack Surface Management Program".IANS. Retrieved2025-02-28.
Retrieved from "https://en.wikipedia.org/w/index.php?title=Attack_surface&oldid=1278072219"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp