Skip to main content

Attack Surface Reduction

April 17, 2014

Limiting Exposure: Protecting yourself from the various cybersecurity attacks is more than just implementing the latest and greatest technologies. There should also be a thought process of pro-actively reducing the attack surface to limit what is exposed as well in conjunction implementing these new technologies that can detect the ever elusive new cyberthreats. While there is still a great deal of Zero day malware that is being detected, a great majority of attacks still try to take advantage of known vulnerabilities.

Below are a few recommended tactics to help reduce the attack surface:

  • Reducing the number or ports/services that are open on the firewall and trying to limit this to only what is required for business purposes.
  • Using a next generation firewall to granularly control based on application as opposed to controlling traffic based on ports/services. IE. Port 80 is no longer just web browsing traffic.
  • Eliminating any unnecessary protocols and services running on endpoints or servers.
  • Using identity management to provide granular access to applications based on privilege level. This also provides a way of tracking in logs based on user identity as opposed to just source IP address.
  • Some customers are taking this a step further and segmenting their internal network so the firewall needs to be traversed even for internal traffic. This provides the ability to scan this internal traffic for threats.

Related Blogs

September 04, 2014

Establishing A Zero-Trust Infrastructure

When looking at a security posture, the main concern is usually about blocking a potential attacker who sits outside our network from getting inside o...

See Details

February 03, 2014

HIPAA Compliance

Technology is used today to exchange health information in an electronic environment. The use of this technology will greatly enhance the delivery of ...

See Details

October 22, 2014

How to Reduce Attack Surface

An effective strategy to help protect your organization is to reduce the noise, allowing for easier detection of an exploit; while at the same time in...

See Details

How Can We Help?

Let us know what you need, and we will have an Optiv professional contact you shortly.


Privacy Policy

Related Insights

April 24, 2013

Cyber Security Flaws We All Know and Love

Joseph Belans provided an excellent presentation at BSides titled "Hacking like it's 1999: Security Flaws We All Know and Love." Below is a video rec...

See Details

March 17, 2014

AutoIT Scripting in POS Malware

Over the past few years, using AutoIT scripting language to create and install malware has become more prevalent. This trend has made its way into the...

See Details

December 05, 2014

Know Your Firewall

Firewalls have been around for decades, and many organizations have had the same firewall technology in place for just as long. Even with the evolutio...

See Details

Stay in the Know

For all the latest cybersecurity and Optiv news, subscribe to our blog and connect with us on Social.

Subscribe

Join our Email List

We take your privacy seriously and promise never to share your email with anyone.

Stay Connected

Find cyber security Events in your area.