Further reading
To learn more about the topics that were covered in this chapter, look at the following resources:
- [1] Attack surface definition: https://en.wikipedia.org/wiki/Attack_surface
- [2] Twitter attack: https://blog.twitter.com/en_us/topics/company/2020/an-update-on-our-security-incident
- [3] OPA: https://www.openpolicyagent.org/
- [4] SSO: https://en.wikipedia.org/wiki/Single_sign-on
- [5] Cisco Stealthwatch: https://www.cisco.com/c/en_hk/products/security/stealthwatch/index.html
- [6] CrowdStrike Falcon: https://www.crowdstrike.com/products/data-protection/
- [7] Network segmentations (VPCs): https://maturitymodel.security.aws.dev/en/2.-foundational/vpcs/
- [8] OWASP threat modeling cheatsheet: https://cheatsheetseries.owasp.org/cheatsheets/Threat_Modeling_Cheat_Sheet.html
- [9] Target breach of 2013: https://www.nytimes.com/2014/02/27/business/target-reports-on-fourth-quarter-earnings.html
- [10] SSRF definition: https://en.wikipedia.org/wiki...