Build and Deployment -> Patch Management: Reduction of the attack surface
Risk and Opportunity
Risk: Components, dependencies, files or file access rights might have vulnerabilities, but the they are not needed.
Opportunity: Removal of not needed components, dependencies, files or file access rights. For container images the usage of distroless images is recommended.
Exploit details
Usefullness: Medium
Required knowledge: Medium (two disciplines)
Required time: Medium
Required resources (systems): Low
Additional Information
OWASP SAMM 2 Mapping: o-environment-management|B|1
ISO27001:2017 Controls Mapping:
- hardening is missing in ISO 27001
- 14.2.1