Proactive reduction of attack surface across infrastructure layers through systematic configuration hardening, least-privilege enforcement, and automated security controls. Applies industry-standard CIS Benchmarks and zero-trust principles to operating systems, containers, cloud configurations, networks, and databases.
Default Deny, Explicit Allow Start with all access denied, explicitly permit only required operations. Apply default-deny firewall rules and network policies, then allow specific traffic.
Least Privilege Access Grant minimum permissions required for operation. Use RBAC, IAM policies with specific resources, and database roles with limited permissions (no DELETE or DDL unless required).
Riduce la superficie di attacco a livello di sistema operativo, contenitore, cloud, rete e database utilizzando benchmark CIS e principi Zero Trust. Da utilizzare per rafforzare l'infrastruttura di produzione, soddisfare i requisiti di conformità o implementare una sicurezza di difesa approfondita. Fonte: ancoleman/ai-design-components.