1. National Institute of Standards and Technology (NIST) Special Publication 800-53
Revision 5
Security and Privacy Controls for Information Systems and Organizations. Control CM-7 (Least Functionality)
Page 138. The control states
"The organization: a. Configures the system to provide only essential capabilities; and b. Prohibits or restricts the use of... functions
ports
protocols
and/or services..." This directly describes the core activity of attack surface reduction.
2. National Institute of Standards and Technology (NIST) Special Publication 800-160
Volume 1
Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems. Section 3.3.3.2 (Attack Surface Reduction)
Page 68. This section defines the principle: "Attack surface reduction is a means of reducing risk by giving attackers less opportunity to exploit a potential weakness or vulnerability. This can be achieved by running only essential services
removing unnecessary software
disabling unnecessary user accounts
and eliminating unused or unnecessary system capabilities or functions."
3. Purdue University
Center for Education and Research in Information Assurance and Security (CERIAS)
Introduction to Systems and Network Security. This courseware emphasizes attack surface minimization as a primary defense strategy. It defines the attack surface as the "set of ways in which an adversary can enter a system and potentially cause damage
" and its reduction as the first step in hardening a system by removing all but the necessary services. (Reference to general principles taught in foundational cybersecurity courses at institutions like Purdue).