Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 071

Attack Surface

What is Attack Surface?

Attack SurfaceSum of all points where an attacker can attempt to enter, extract data from, or manipulate a system, including networks, software, identities, supply chain, and people.


An organization's attack surface is the complete set of exposed entry points: internet-facing assets, third-party SaaS, APIs, endpoints, mobile apps, network protocols, source-code repositories, IoT/OT devices, cloud control planes, identities, and human channels susceptible to social engineering. It is dynamic, growing with each new feature, vendor, and configuration change. Attack surface management (ASM) and external attack surface management (EASM) tools continuously discover assets, fingerprint them, and prioritise exposures, while internal attack surface reduction relies on hardening, decommissioning legacy services, minimising privileges, segmenting networks, and removing unused dependencies and accounts.

Examples

  1. 01

    Forgotten dev S3 bucket and a CI/CD admin SaaS each appear in an EASM scan as new exposed assets.

  2. 02

    Disabling an unused VPN appliance reduces the network attack surface.

Frequently asked questions

What is Attack Surface?

Sum of all points where an attacker can attempt to enter, extract data from, or manipulate a system, including networks, software, identities, supply chain, and people. It belongs to the Compliance & Frameworks category of cybersecurity.

What does Attack Surface mean?

Sum of all points where an attacker can attempt to enter, extract data from, or manipulate a system, including networks, software, identities, supply chain, and people.

How does Attack Surface work?

An organization's attack surface is the complete set of exposed entry points: internet-facing assets, third-party SaaS, APIs, endpoints, mobile apps, network protocols, source-code repositories, IoT/OT devices, cloud control planes, identities, and human channels susceptible to social engineering. It is dynamic, growing with each new feature, vendor, and configuration change. Attack surface management (ASM) and external attack surface management (EASM) tools continuously discover assets, fingerprint them, and prioritise exposures, while internal attack surface reduction relies on hardening, decommissioning legacy services, minimising privileges, segmenting networks, and removing unused dependencies and accounts.

How do you defend against Attack Surface?

Defences for Attack Surface typically combine technical controls and operational practices, as detailed in the full definition above.

Related terms