The Linux Attack Surface refers to all the points of interaction in a Linux system where an adversary might attempt to exploit vulnerabilities to gain unauthorized access or carry out malicious activities.
Understanding the incident surface is key to efficiently responding to an ongoing attack, mitigating damage, recovering affected systems, and applying lessons learned to prevent future incidents.
Some key points to investigate in the incident surface include process IDs, CPU and memory usage, terminal associations, process states, start times, and commands.
Examining logs, disk areas, cronjobs, and system configurations are important for identifying incident traces and potential security issues.