Why Learn It? Glossary
 

2. Reducing the Attack Surface

Previous previous|next Next Page

If an interface is not available to an attacker, it is clearly not available to be abused. Thus the first, and arguably most important, line of defense is to reduce the exposed interfaces to only those absolutely required.

Use invoker's rights to reduce SQL injection vulnerability
Reduce arbitrary inputs
Strengthen database security