Advanced Security #attack-surface #blast-radius #least-privilege #dependencies

Attack Surface

5 exercises — master attack surface vocabulary: what the attack surface is and how to reduce it, blast radius analysis, unprotected internal east-west APIs, legacy endpoint risk, and the priority level of privilege minimisation and dependency hygiene.

0 / 5 completed
Attack surface quick reference
  • Attack surface — sum of all entry/exit points an attacker can interact with: APIs, ports, inputs, privileged processes, dependencies, admin interfaces.
  • Attack surface reduction — remove unused ports/services/endpoints; restrict network access; least privilege; minimise dependencies.
  • Blast radius — maximum damage if a component is fully compromised; determined by its IAM permissions, network reachability, and secrets held.
  • East-west traffic — internal service-to-service traffic. Without mTLS + authorisation policies, a compromised service can freely call any other internal API.
  • Legacy endpoints — no monitoring, outdated auth, no security testing. Security through obscurity is not a control. Audit and remove them.
  • Privilege minimisation — least-privilege IAM roles, scoped DB users, no wildcard policies. Limits blast radius of any compromise.
  • Dependency hygiene — patch CVEs immediately; use Dependabot/Renovate; maintain SBOM; lock file every project.
1 / 5

A security architect says: "Before we can protect the system, we need to understand our attack surface. What's our attack surface, and why does reducing it matter?"