That’s a long list, yet short in so far as it gives us the context of what we have to be aware of as regards “common” ones. Elsewhere in my pages here you can see I have a narrow focus on ransomeware, which is because there is no real time (that means right now, immediate, instant) defence yet. Zero-day is a bit worrying, but we have to rely on our confidence in our suppliers - which means that also needs our attention.
ok so that’s what “vectors” look like and now also copied from the wikipedia entry for Attack surface entry:
An attack surface [4] composition can range widely between various organizations, yet often identify many of the same elements, including:
Autonomous System Numbers (ASNs) - vast numbers of i p addresses are managed by typical ASNs, as in hundreds of thousands and they supply the suppliers that supply us.
IP Address and IP Blocks - still huge blocks of i p addresses, but managed by our direct suppliers, such as Heart Internet or 123-Reg.
Domains and Sub-Domains (direct and third-parties) - The registrant (i.e. you) so we manage registration details and maybe DNS.
SSL Certificates and Attribution - We validate and buy from them.
WHOIS Records, Contacts, and History - We manage these.
Host and Host Pair Services and Relationship unknown.
Internet Ports and Services - Firewall manager, me/you.
NetFlow - I think this is above our pay grade, i.e. an enterprise matter.
Web Frameworks (PHP, Apache, Java, etc.) - Web server manager.
Web Server Services (email, database, applications) - ditto esp email
Public and Private Cloud - Again us, but typically at the level of dropbox, gdrive and onedrive type of things, running your own cloud is out of my scope here.
I have not split the above because they are I think all computer matters, not human. However, we do of course have a human role that is usually responsible so I will have a crack at adding what I think these are, by reference to who is “hands on” as opposed to carries responsibiity, as that’s the IT director or similar name or maybe just you with that hat on.