Skip to main content
Microsoft Security
placeholder text for image

Anatomy of an external attack surface

April 19, 2022

Traditionally, the security strategy of most organizations has been a defense-in-depth approach starting at the perimeter and layering back to the assets that should be protected. However, there are disconnects between that kind of strategy and the attack surface, as presented in this report. In today’s world of digital engagement, users sit outside the perimeter—as do an increasing number of exposed corporate digital assets and many of the malicious actors. Applying Zero Trust principles across corporate resources can help secure today’s workforce—protecting people, devices, applications, and data no matter their location or the scale of threats faced. Microsoft Security offers a series of targeted evaluation tools to help you assess the Zero Trust maturity stage of your organization.

Download PDF

left arrow

Threat infrastructure is more than what’s on the network

Ransomware-as-a-service: The new face of industrialized cybercrime

right arrow