Fluid Attacks logo
Login
Contact Us
Young hacker smiling
Zero false positives

Expert intelligence + effective automation

Contact logo Contact Us
GET A DEMO

REQ.060 Identify attack components

This document details the security guidelines and requirements related to the management of the attack surface components of a system. In this case, it is recommended that the the attack surface components be identified by the company performing the analysis.

Requirement

The company performing the security analysis must identify the attack surface components. These are the entry points accessed without authentication.


Service status - Terms of Use