Attack Surface Reduction
This topic encompasses all the areas where developers can remove unused code/APIs from the app to make it more difficult for attacks to be performed. Ports should be blocked and all external data sources treated as hostile until authenticated.
Click on the paperclip or four line icons to access more information about the source document and provision information.

Download this data
Download a copy of this map