

malware injection, social engineering attacks), and there is less focus on insider threats, although the principles remain the same. The focus here is on protecting an application from external attack - it does not take into account attacks on the users or operators of the system (e.g.

It is targeted to be used by developers to understand and manage application security risks as they design and change an application, as well as by application security specialists doing a security risk assessment. This article describes a simple and pragmatic way of doing Attack Surface Analysis and managing an application's Attack Surface. Insecure Direct Object Reference PreventionĪttack Surface Analysis Cheat Sheet ¶ What is Attack Surface Analysis and Why is it Important ¶ Measuring and Assessing the Attack Surface Identifying and Mapping the Attack Surface Microservice and Cloud Native Applications What is Attack Surface Analysis and Why is it Importantĭefining the Attack Surface of an Application
