AS-301f · Module 2
Attack Surface Reduction
4 min read
This is the part most people skip. This is the part that matters.
Mapping the attack surface is necessary. Reducing it is the goal. Every component that can be removed, every integration that can be eliminated, every permission that can be revoked, and every port that can be closed reduces the number of paths an attacker can take. Surface reduction is not about adding more defenses — it is about having fewer things that need defending.
- Unused Integration Removal Audit every integration for actual usage. An API connection that was created for a proof-of-concept six months ago and never used in production is still an attack surface. If it is not used, disconnect it. If it might be needed later, disconnect it now and reconnect it when "later" arrives.
- Permission Minimization Review every agent's tool access, database permissions, and API scopes. Remove anything not used in the past 30 days. Permission accumulation is surface expansion — every additional permission is an additional capability that a compromised agent inherits.
- Component Consolidation Multiple agents running the same model separately create multiple attack surfaces for the same function. Consolidating into a shared service with proper access control reduces the surface while maintaining the capability. Fewer components means fewer things to patch, monitor, and defend.