{"id":29026,"date":"2024-06-06T15:56:08","date_gmt":"2024-06-06T19:56:08","guid":{"rendered":"https:\/\/netfoundry.io\/?p=29026"},"modified":"2024-09-17T22:08:23","modified_gmt":"2024-09-18T02:08:23","slug":"the-metrics-manifesto-attack-surface-visibility-vs-invisibility","status":"publish","type":"post","link":"https:\/\/netfoundry.io\/zero-trust\/the-metrics-manifesto-attack-surface-visibility-vs-invisibility\/","title":{"rendered":"The Metrics Manifesto: Attack Surface Visibility vs \u2018Invisibility\u2019"},"content":{"rendered":"\n<p>In today\u2019s digital landscape, where cybersecurity threats are ever-evolving and becoming more sophisticated, organizations face significant challenges in protecting their sensitive data and infrastructure. The ultimate goal is to reduce the visible attack surface. In fact, the holy grail of security on the internet is <a href=\"https:\/\/netfoundry.io\/products\/netfoundry-platform\/netfoundry-appnets\/\">invisibility<\/a>.<\/p>\n\n\n\n<p>Two approaches gaining traction in reducing attack surface visibility are the Metrics Manifesto, a framework proposed by Richard Seiersen, and the implementation of zero trust networking (ZTN). Not all ZTN is born equal, so we will specifically focus on ZTN, which allows us to make our attack surface \u2018Invisible\u2019 to the internet, including no inbound firewall ports. Using the Metrics Manifesto\u2019s principles and Invisible ZTN, we will see how to reduce the attack surface massively and breach risk while increasing business value.<\/p>\n\n\n\n<p><br><strong>Understanding the Metrics Manifesto &amp; Frameworks<\/strong><\/p>\n\n\n\n<p>The Metrics Manifesto (MM), devised by Richard Seiersen, outlines principles to improve an organization\u2019s security posture by leveraging metrics and data-driven decision-making. The manifesto emphasizes the importance of quantifying security risks and implementing actionable metrics to gain insights into an organization\u2019s security posture \u2013 it makes me think of Six Sigma (6\u03c3) for Security (6\u03c3 as an application of engineering principles to improve business processes by reducing defects and errors, minimizing variation, and increasing quality and efficiency). By adopting this approach, organizations can better understand and address vulnerabilities, allocate resources effectively, and continually improve security defenses. To understand more, <a href=\"https:\/\/www.youtube.com\/watch?v=Sy-xcy6sodo&amp;ab_channel=RSAConference\" target=\"_blank\" rel=\"noreferrer noopener\">I recommend watching his 2019 RSA presentation, The Metrics Manifesto<\/a>.<\/p>\n\n\n\n<p>The MM incorporates frameworks, including the <a href=\"https:\/\/www.nist.gov\/cyberframework\" target=\"_blank\" rel=\"noreferrer noopener\">NIST Cybersecurity Framework (CSF)<\/a>, to map the \u2018Control State\u2019 and \u2018Exposure State\u2019. In the YouTube video, Richard discusses applying zero trust controls to \u2018Protect\u2019 as part of the \u2018Control State\u2019 (see diagram) but not making the Attack Surface \u2018Invisible\u2019.<br><\/p>\n\n\n\n<div style=\"height:32px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><a href=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/07\/netfoundry-the-metrics-manifesto-incorporating-frameworks.jpg\"><img decoding=\"async\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/06\/netfoundry-the-metrics-manifesto-incorporating-frameworks.svg\" alt=\"NetFoundry | The Metrics Manifesto: Incorporating Frameworks\" class=\"wp-image-32608\" style=\"width:838px\"\/><\/a><\/figure>\n\n\n\n<div style=\"height:32px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Earlier in the presentation, Richard does set out the key observations and beliefs of the Metrics Manifesto, including:<\/p>\n\n\n\n<p>\u201cWe believe shrinking the attack surface, while not slowing value exposure, is the new job #1 for security\u201d<\/p>\n\n\n\n<p>This is part of Richard\u2019s observation: \u201cMost metrics count, the best ones confront\u201d. The metric I believe is most important, which confronts our whole view of cyber security, is:<\/p>\n\n\n\n<p>\u201cHow many open inbound firewall ports do you have\u201d?<\/p>\n\n\n\n<p>What\u2019s wrong with holes in our firewall?<\/p>\n\n\n\n<p>A firewall is a fire-resistant barrier used to prevent the spread of fire. We took the idea of firewalls (FW) and applied them to computing in the 1980s. We place them between two networks and monitor incoming and outgoing traffic based on predetermined security rules. To do this, we \u2018punch holes\u2019 through them, and large enterprises have thousands to 100s of thousands of firewall rules.&nbsp; For example, to the left is a diagram from a security vendor with recommended open FW holes (red circles). While these open inbound ports allow users and systems to connect, attackers can see them too. Tools like <a href=\"https:\/\/www.shodan.io\/\" target=\"_blank\" rel=\"noreferrer noopener\">Shodan<\/a> and <a href=\"https:\/\/censys.io\/\" target=\"_blank\" rel=\"noreferrer noopener\">Censys<\/a> scan the internet to provide a \u2018Search Engine of Everything for Internet-connected devices\u2019. This allows attackers to see bugs, misconfigurations, business logic gaps, and similar vulnerabilities. While FWs try to differentiate between legitimate use and attackers and terminate unauthorized connections, this is too late. The <a href=\"https:\/\/www.ibm.com\/reports\/threat-intelligence\" target=\"_blank\" rel=\"noreferrer noopener\">2023 IBM Security X-Force Threat Intelligence Index<\/a> identified the back door systems access these firewall holes provide as ransomware\u2019s #1 attack vector (i.e., exploiting outbound FW ports). The #2 attack vector is exploiting public-facing apps (i.e., using inbound FW ports). We suffer trillions of dollars of cyberattack damage yearly, as it\u2019s impossible to win a race against the entire Internet.&nbsp;<\/p>\n\n\n\n<p>What if, instead of having open FW ports, we could make everything \u2018Invisible\u2019 to the internet? Threat actors can\u2019t attack what they can\u2019t see, so having no inbound FW ports would be a metric that confronts. This requires a new approach called \u2018Zero Trust\u2019.<\/p>\n\n\n\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-zero-trust-networking-an-introduction\">Zero Trust Networking: An Introduction<\/h3>\n\n\n\n<p>The term \u2018zero trust\u2019 was born in 2010 when John Kindervag popularized it while working for Forrester Research when he presented the idea that an organization should not extend trust to anything inside or outside its perimeters. I was first introduced to Zero Trust ideas when I joined NetFoundry. In my first year, massively improved my knowledge of Zero Trust when I read <a href=\"https:\/\/www.oreilly.com\/library\/view\/zero-trust-networks\/9781491962183\/\" target=\"_blank\" rel=\"noreferrer noopener\">Zero Trust Networks, O\u2019Reilly<\/a>, which included the idea that:<\/p>\n\n\n\n<p>\u201c<em>all<\/em> hosts be <em>treated<\/em> as if they\u2019re internet-facing. The <em>networks<\/em> they reside in must be considered <em>compromised and hostile<\/em>.\u201d<\/p>\n\n\n\n<p>This idea was also incorporated into <a href=\"https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-207.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">NIST 800-207<\/a>, the Special Publication on Zero Trust Architecture. We can see this maps nicely to the Metrics Manifesto. If our resources are publicly facing, they are more exposed. If we do not introduce extra controls, our attack surface and risk of breach increases. The naughty little secret is that many control systems (VPNs, Firewalls, Zero Trust solutions, etc.) have inbound ports that listen for internet connections. They can be (and are frequently) compromised through vulnerability or misconfiguration. At the same time, these extra controls to increase security reduce agility and value to the business \u2013 it\u2019s an age-old <a href=\"https:\/\/www.securitymagazine.com\/articles\/98927-balancing-security-and-agility-in-todays-networks-is-a-continuous-effort\" target=\"_blank\" rel=\"noreferrer noopener\">security balancing act<\/a>.<\/p>\n\n\n\n<p>What if we could close all inbound ports and effectively change \u2018Public Proximity\u2019 from public to private? This would massively reduce our attack surface and breach risk. No inbound ports would mean no access to any applications unless on a private, physical network\u2026 this would slow value exposure and business opportunities.<\/p>\n\n\n\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-magical-zero-trust-networking-ziti-invisibility\">Magical Zero Trust Networking: Ziti Invisibility<\/h3>\n\n\n\n<p>Returning to the questions, What is your attack surface visibility\u201d and \u201cHow many open inbound firewall ports do you have?\u201d, we must understand that not all Zero Trust Networking solutions are equal. Some allow us to close all inbound ports on our firewall while using the public internet \u2013 i..e, making it Invisible and invisible to external malicious actors. This utilizes the concept of <a href=\"https:\/\/en.wikipedia.org\/wiki\/Software-defined_perimeter\" target=\"_blank\" rel=\"noreferrer noopener\">Software-Defined-Perimeters<\/a>, popularised by the <a href=\"https:\/\/cloudsecurityalliance.org\/artifacts\/software-defined-perimeter-and-zero-trust\" target=\"_blank\" rel=\"noreferrer noopener\">Cloud Security Alliance<\/a>, specifically ABC, Authenticate\/Authorise-Before-Connect, using cryptographic identity and outbound-only connections. I wrote a blog last year exploring this by <a href=\"https:\/\/netfoundry.io\/ziti-openziti\/demystifying-the-magic-of-zero-trust-networking-with-my-daughter\/\">comparing zero trust networking solutions using analogies from Harry Potter<\/a> (hint, it\u2019s like making your app magical with an \u2018invisibility cloak\u2019 and a \u2018port key\u2019).<\/p>\n\n\n\n<p>Even better, ZTN with ABC is available as an open-source solution called OpenZiti. NetFoundry, the company I work for, maintains OpenZiti and provides a SaaS version called NetFoundry Cloud. You can <a href=\"https:\/\/netfoundry.io\/products\/netfoundry-pricing\/\">try it out for free today<\/a>.<\/p>\n\n\n\n<p>Ziti also introduces a radical possibility called embedded zero-trust networking with ABC. This makes your application \u2018Invisible\u2019 to all hostile and compromised networks, including WAN, LAN, and host OS. It is the logical conclusion of zero trust, assuming all networks are compromised and hostile. It is for all these reasons that many have said:<\/p>\n\n\n\n<p>\u201c<em>Ziti provides the best NIST 800-207 adherence across all architectures<\/em>\u201d.&nbsp;<\/p>\n\n\n\n<p><strong>The Metrics Manifesto &amp; Ziti:<\/strong><\/p>\n\n\n\n<p>By utilizing Ziti and ZTN with ABC, we make our attack surface Invisible and massively reduce our risk of breach. Further, as we are replacing bolt-on security and networking solutions with built-in, using software and APIs, we can increase business velocity and innovation to drive more business opportunities. We have created a high-level (an area for more quantified research) overview of these reductions in risk according to deployment type:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>ZTN with ABC at the Network Level (ZTNA):\n<ul class=\"wp-block-list\">\n<li>Close all inbound FW ports \u2013 this will stop all external network attacks, including brute force, CVE, port scans, DDoS, etc. \u2013 for a massive reduction in the attack surface.&nbsp;<\/li>\n\n\n\n<li>Optionally close all outbound ports, except to ZTN \u2013 stopping connections to C&amp;C or data exfiltration \u2013 for another order of magnitude reduction risk by breaking the breach chain.<br><br><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>ZTN with ABC at the Host Level (ZTHA): This extends zero trust to the host. Even if the network is compromised, the hosts cannot be for another order of magnitude reduction in attack surface.<br><br><\/li>\n\n\n\n<li>ZTN with ABC at the App Level (ZTAA): Extends zero trust to the app. Even malicious SW on a host cannot easily break into the app and its ZTN for another order of magnitude reduction in the attack surface.<\/li>\n<\/ul>\n\n\n\n<p><br><strong>The Holy Grail of Security: Zero Trust Invisibility<\/strong><\/p>\n\n\n\n<p>The Metrics Manifesto and zero trust networking with authenticate-before-connect present compelling strategies for shrinking the attack surface while not slowing value exposure. By implementing Ziti or comparable technology, organizations can close all inbound firewall ports and potentially more to deliver the best adherence to NIST 800-207 and treat all networks as compromised and hostile.&nbsp;<\/p>\n\n\n\n<p>MM and ZTN with ABC help us reduce breach risk by orders of magnitude and drive greater business opportunities. In the spirit of Richard and his wonderful metrics-based approach, we need to develop a more quantified analysis of how much ZTN with ABC can reduce risk, with careful analysis of different implementations across ZTNA, ZTHA, and ZTAA.<\/p>\n\n\n\n<p>Organizations that embrace the Metrics Manifesto and adopt ZTN with ABC gain a comprehensive security approach beyond traditional perimeter-based defenses. By leveraging data-driven decision-making and \u2018magical zero trust\u2019, organizations can proactively protect their valuable assets, safeguard sensitive data, and stay one step ahead of the ever-evolving threat landscape.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In today\u2019s digital landscape, where cybersecurity threats are ever-evolving and becoming more sophisticated, organizations face significant challenges in protecting their sensitive data and infrastructure. The ultimate goal is to reduce the visible attack surface. In fact, the holy grail of security on the internet is invisibility. Two approaches gaining traction in reducing attack surface visibility [&hellip;]<\/p>\n","protected":false},"author":92,"featured_media":32398,"comment_status":"closed","ping_status":"open","sticky":false,"template":"elementor_theme","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[477],"tags":[554,555],"class_list":["post-29026","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zero-trust","tag-dark-mode","tag-invisibility"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Invisiblity: Eliminate Your Attack Surface<\/title>\n<meta name=\"description\" content=\"Explore how Zero Trust Networking (ZTN) and Metrics Manifesto reduce attack surface visibility and achieve invisibility, enhancing AI security and compliance.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/netfoundry.io\/zero-trust\/the-metrics-manifesto-attack-surface-visibility-vs-invisibility\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Metrics Manifesto: Attack Surface Visibility vs \u2018Invisibility\u2019\" \/>\n<meta property=\"og:description\" content=\"Explore how Zero Trust Networking (ZTN) and Metrics Manifesto reduce attack surface visibility and achieve invisibility, enhancing AI security and compliance.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/netfoundry.io\/zero-trust\/the-metrics-manifesto-attack-surface-visibility-vs-invisibility\/\" \/>\n<meta property=\"og:site_name\" content=\"NetFoundry\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/netfoundry.io\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-06T19:56:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-18T02:08:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-empower-zero-trust-designed-in.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1536\" \/>\n\t<meta property=\"og:image:height\" content=\"804\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Philip Griffiths\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@netfoundry\" \/>\n<meta name=\"twitter:site\" content=\"@netfoundry\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Philip Griffiths\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/zero-trust\\\/the-metrics-manifesto-attack-surface-visibility-vs-invisibility\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/zero-trust\\\/the-metrics-manifesto-attack-surface-visibility-vs-invisibility\\\/\"},\"author\":{\"name\":\"Philip Griffiths\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#\\\/schema\\\/person\\\/2020f6a86319585ac99dc3262fb40673\"},\"headline\":\"The Metrics Manifesto: Attack Surface Visibility vs \u2018Invisibility\u2019\",\"datePublished\":\"2024-06-06T19:56:08+00:00\",\"dateModified\":\"2024-09-18T02:08:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/zero-trust\\\/the-metrics-manifesto-attack-surface-visibility-vs-invisibility\\\/\"},\"wordCount\":1502,\"publisher\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/zero-trust\\\/the-metrics-manifesto-attack-surface-visibility-vs-invisibility\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/netfoundry-the-metrics-manifesto-attack-surface-visibility-vs-invisibility.jpg\",\"keywords\":[\"Dark mode\",\"Invisibility\"],\"articleSection\":[\"Zero Trust\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/zero-trust\\\/the-metrics-manifesto-attack-surface-visibility-vs-invisibility\\\/\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/zero-trust\\\/the-metrics-manifesto-attack-surface-visibility-vs-invisibility\\\/\",\"name\":\"Invisiblity: Eliminate Your Attack Surface\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/zero-trust\\\/the-metrics-manifesto-attack-surface-visibility-vs-invisibility\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/zero-trust\\\/the-metrics-manifesto-attack-surface-visibility-vs-invisibility\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/netfoundry-the-metrics-manifesto-attack-surface-visibility-vs-invisibility.jpg\",\"datePublished\":\"2024-06-06T19:56:08+00:00\",\"dateModified\":\"2024-09-18T02:08:23+00:00\",\"description\":\"Explore how Zero Trust Networking (ZTN) and Metrics Manifesto reduce attack surface visibility and achieve invisibility, enhancing AI security and compliance.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/zero-trust\\\/the-metrics-manifesto-attack-surface-visibility-vs-invisibility\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/netfoundry.io\\\/zero-trust\\\/the-metrics-manifesto-attack-surface-visibility-vs-invisibility\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/zero-trust\\\/the-metrics-manifesto-attack-surface-visibility-vs-invisibility\\\/#primaryimage\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/netfoundry-the-metrics-manifesto-attack-surface-visibility-vs-invisibility.jpg\",\"contentUrl\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/netfoundry-the-metrics-manifesto-attack-surface-visibility-vs-invisibility.jpg\",\"width\":1536,\"height\":804,\"caption\":\"NetFoundry | The Metrics Manifesto: Attack Surface Visibility vs \u2018Invisibility\u2019\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/zero-trust\\\/the-metrics-manifesto-attack-surface-visibility-vs-invisibility\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/netfoundry.io\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Metrics Manifesto: Attack Surface Visibility vs \u2018Invisibility\u2019\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#website\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/\",\"name\":\"NetFoundry\",\"description\":\"Identity-First\u2122 Networking\",\"publisher\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/netfoundry.io\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#organization\",\"name\":\"NetFoundry\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/netfoundry-icon-color.png\",\"contentUrl\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/netfoundry-icon-color.png\",\"width\":512,\"height\":512,\"caption\":\"NetFoundry\"},\"image\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/netfoundry.io\",\"https:\\\/\\\/x.com\\\/netfoundry\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/netfoundry\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCGN6PFj1rZu50yme9YsICmg\",\"https:\\\/\\\/www.instagram.com\\\/netfoundry.io\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#\\\/schema\\\/person\\\/2020f6a86319585ac99dc3262fb40673\",\"name\":\"Philip Griffiths\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/dca9b7a1e6d3a47ce3440cd0d6e3d5362df9613f48558fd1dd0ce8816f7c70af?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/dca9b7a1e6d3a47ce3440cd0d6e3d5362df9613f48558fd1dd0ce8816f7c70af?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/dca9b7a1e6d3a47ce3440cd0d6e3d5362df9613f48558fd1dd0ce8816f7c70af?s=96&d=mm&r=g\",\"caption\":\"Philip Griffiths\"},\"url\":\"https:\\\/\\\/netfoundry.io\\\/author\\\/philip-griffiths\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Invisiblity: Eliminate Your Attack Surface","description":"Explore how Zero Trust Networking (ZTN) and Metrics Manifesto reduce attack surface visibility and achieve invisibility, enhancing AI security and compliance.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/netfoundry.io\/zero-trust\/the-metrics-manifesto-attack-surface-visibility-vs-invisibility\/","og_locale":"en_US","og_type":"article","og_title":"The Metrics Manifesto: Attack Surface Visibility vs \u2018Invisibility\u2019","og_description":"Explore how Zero Trust Networking (ZTN) and Metrics Manifesto reduce attack surface visibility and achieve invisibility, enhancing AI security and compliance.","og_url":"https:\/\/netfoundry.io\/zero-trust\/the-metrics-manifesto-attack-surface-visibility-vs-invisibility\/","og_site_name":"NetFoundry","article_publisher":"https:\/\/www.facebook.com\/netfoundry.io","article_published_time":"2024-06-06T19:56:08+00:00","article_modified_time":"2024-09-18T02:08:23+00:00","og_image":[{"width":1536,"height":804,"url":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-empower-zero-trust-designed-in.jpg","type":"image\/jpeg"}],"author":"Philip Griffiths","twitter_card":"summary_large_image","twitter_creator":"@netfoundry","twitter_site":"@netfoundry","twitter_misc":{"Written by":"Philip Griffiths","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/netfoundry.io\/zero-trust\/the-metrics-manifesto-attack-surface-visibility-vs-invisibility\/#article","isPartOf":{"@id":"https:\/\/netfoundry.io\/zero-trust\/the-metrics-manifesto-attack-surface-visibility-vs-invisibility\/"},"author":{"name":"Philip Griffiths","@id":"https:\/\/netfoundry.io\/#\/schema\/person\/2020f6a86319585ac99dc3262fb40673"},"headline":"The Metrics Manifesto: Attack Surface Visibility vs \u2018Invisibility\u2019","datePublished":"2024-06-06T19:56:08+00:00","dateModified":"2024-09-18T02:08:23+00:00","mainEntityOfPage":{"@id":"https:\/\/netfoundry.io\/zero-trust\/the-metrics-manifesto-attack-surface-visibility-vs-invisibility\/"},"wordCount":1502,"publisher":{"@id":"https:\/\/netfoundry.io\/#organization"},"image":{"@id":"https:\/\/netfoundry.io\/zero-trust\/the-metrics-manifesto-attack-surface-visibility-vs-invisibility\/#primaryimage"},"thumbnailUrl":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/06\/netfoundry-the-metrics-manifesto-attack-surface-visibility-vs-invisibility.jpg","keywords":["Dark mode","Invisibility"],"articleSection":["Zero Trust"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/netfoundry.io\/zero-trust\/the-metrics-manifesto-attack-surface-visibility-vs-invisibility\/","url":"https:\/\/netfoundry.io\/zero-trust\/the-metrics-manifesto-attack-surface-visibility-vs-invisibility\/","name":"Invisiblity: Eliminate Your Attack Surface","isPartOf":{"@id":"https:\/\/netfoundry.io\/#website"},"primaryImageOfPage":{"@id":"https:\/\/netfoundry.io\/zero-trust\/the-metrics-manifesto-attack-surface-visibility-vs-invisibility\/#primaryimage"},"image":{"@id":"https:\/\/netfoundry.io\/zero-trust\/the-metrics-manifesto-attack-surface-visibility-vs-invisibility\/#primaryimage"},"thumbnailUrl":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/06\/netfoundry-the-metrics-manifesto-attack-surface-visibility-vs-invisibility.jpg","datePublished":"2024-06-06T19:56:08+00:00","dateModified":"2024-09-18T02:08:23+00:00","description":"Explore how Zero Trust Networking (ZTN) and Metrics Manifesto reduce attack surface visibility and achieve invisibility, enhancing AI security and compliance.","breadcrumb":{"@id":"https:\/\/netfoundry.io\/zero-trust\/the-metrics-manifesto-attack-surface-visibility-vs-invisibility\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/netfoundry.io\/zero-trust\/the-metrics-manifesto-attack-surface-visibility-vs-invisibility\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/netfoundry.io\/zero-trust\/the-metrics-manifesto-attack-surface-visibility-vs-invisibility\/#primaryimage","url":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/06\/netfoundry-the-metrics-manifesto-attack-surface-visibility-vs-invisibility.jpg","contentUrl":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/06\/netfoundry-the-metrics-manifesto-attack-surface-visibility-vs-invisibility.jpg","width":1536,"height":804,"caption":"NetFoundry | The Metrics Manifesto: Attack Surface Visibility vs \u2018Invisibility\u2019"},{"@type":"BreadcrumbList","@id":"https:\/\/netfoundry.io\/zero-trust\/the-metrics-manifesto-attack-surface-visibility-vs-invisibility\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/netfoundry.io\/"},{"@type":"ListItem","position":2,"name":"The Metrics Manifesto: Attack Surface Visibility vs \u2018Invisibility\u2019"}]},{"@type":"WebSite","@id":"https:\/\/netfoundry.io\/#website","url":"https:\/\/netfoundry.io\/","name":"NetFoundry","description":"Identity-First\u2122 Networking","publisher":{"@id":"https:\/\/netfoundry.io\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/netfoundry.io\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/netfoundry.io\/#organization","name":"NetFoundry","url":"https:\/\/netfoundry.io\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/netfoundry.io\/#\/schema\/logo\/image\/","url":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-icon-color.png","contentUrl":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-icon-color.png","width":512,"height":512,"caption":"NetFoundry"},"image":{"@id":"https:\/\/netfoundry.io\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/netfoundry.io","https:\/\/x.com\/netfoundry","https:\/\/www.linkedin.com\/company\/netfoundry\/","https:\/\/www.youtube.com\/channel\/UCGN6PFj1rZu50yme9YsICmg","https:\/\/www.instagram.com\/netfoundry.io"]},{"@type":"Person","@id":"https:\/\/netfoundry.io\/#\/schema\/person\/2020f6a86319585ac99dc3262fb40673","name":"Philip Griffiths","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/dca9b7a1e6d3a47ce3440cd0d6e3d5362df9613f48558fd1dd0ce8816f7c70af?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/dca9b7a1e6d3a47ce3440cd0d6e3d5362df9613f48558fd1dd0ce8816f7c70af?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/dca9b7a1e6d3a47ce3440cd0d6e3d5362df9613f48558fd1dd0ce8816f7c70af?s=96&d=mm&r=g","caption":"Philip Griffiths"},"url":"https:\/\/netfoundry.io\/author\/philip-griffiths\/"}]}},"_links":{"self":[{"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/posts\/29026","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/users\/92"}],"replies":[{"embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/comments?post=29026"}],"version-history":[{"count":0,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/posts\/29026\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/media\/32398"}],"wp:attachment":[{"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/media?parent=29026"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/categories?post=29026"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/tags?post=29026"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}