Attack Surface Reduction

This topic encompasses all the areas where developers can remove unused code/APIs from the app to make it more difficult for attacks to be performed. Ports should be blocked and all external data sources treated as hostile until authenticated.

Help on how to navigate around this Mind Map

View a full-screen version of this mapping

Click on the paperclip or four line icons to access more information about the source document and provision information.

Download this data

v1 (CSV) (ODS) (JSON)

v2 (CSV) (ODS) (JSON)

Download a copy of this map

Download Attack-Surface-Reduction.pdf
Download Attack-Surface-Reduction.png
search previous next tag category expand menu location phone mail time cart zoom edit close