From AI to Supply Chain: Why Attack Surface Reduction is No Longer Optional

Security Days 2025 Fall

23 October 2025

Presentation

Presentation Overview

C3-12 | Oct 23 (Thu) 18:30-19:30 [Simultaneous Translation] Night Session with Light Refreshments!

Note: This session was delivered in English with simultaneous translation services provided.

AI is lowering the barriers for attackers, supply chains are becoming more complex with invisible dependencies, and security incidents are increasingly bypassing traditional defenses by exploiting misconfigurations and vulnerabilities in abstraction layers.

This presentation connects the dots of recent cyber trends, from LLM-powered reconnaissance to CI/CD abuse and cloud-based over-exposure, making a compelling case for attack surface reduction as a fundamental security principle rather than an afterthought.

In a world where threats automatically expand and risks lurk in the shadows, reducing exposure may be the most effective countermeasure we can implement.

Speaker Profile

Anant Shrivastava | Cyfinoid Research

Anant Shrivastava is the founder of Cyfinoid Research. He has extensive experience in security (both offensive and defensive), development, and operations.

He has a rich track record as a trainer and speaker at prestigious conferences including Black Hat (USA, Asia, EU), Nullcon, and c0c0n. He also leads the open source project CodeVigilant and curates the Hacking Archives of India.

Outside of his official work, he contributes to open communities such as null community, Garage4Hackers, hasgeek, and OWASP, all with the common goal of spreading information security knowledge.

Event Information


日本語版 / Japanese Version

講演概要

C3-12|10.23(木) 18:30-19:30【同時通訳あり】軽食付きのナイトセッション!

注:このセッションは英語で実施され、同時通訳サービスが提供されました。

AIは攻撃者の障壁を下げ、サプライチェーンは目に見えない依存関係で複雑化し、セキュリティインシデントは誤設定や抽象化レイヤーの脆弱性を突くことで従来の防御をすり抜けることが増えている。

本講演では、LLMを活用したリコンからCI/CDの乱用、クラウドベースの過剰な露出まで、近年のサイバー・トレンドを点と点で結び付け、攻撃対象領域の削減を後回しにするのではなく、セキュリティの基本原則とする説得力のあるケースを紹介する。

脅威が自動的に拡大し、リスクが見え隠れする世界において、露出を減らすことは私たちにできる最も効果的な対策かもしれない。

講演者プロフィール

Anant Shrivastava | Cyfinoid Research

Anant Shrivastavaは、Cyfinoid Researchの創設者である。セキュリティ(攻撃および防御)、開発、運用の分野で経験を積む。

Black Hat(USA, アジア, EU)、Nullcon、c0c0nをはじめとする著名なカンファレンスで、トレーナーおよびスピーカーとして豊富な実績を持つ。また、オープンソースプロジェクトのCodeVigilantを主導し、Hacking Archives of Indiaをキュレーションしている。

公式の業務以外では、null community、Garage4Hackers、hasgeek、OWASPといった、情報セキュリティの知識普及を共通の目標とするオープンコミュニティに貢献している。

イベント情報

AI Generated Summary

AI Generated Content Disclaimer

Note: This summary is AI-generated and may contain inaccuracies, errors, or omissions. If you spot any issues, please contact the site owner for corrections. Errors or omissions are unintended.

This presentation at Security Days Tokyo argues that the traditional approach of layering more security tools, scanners, and dashboards on top of growing complexity is fundamentally insufficient. Anant Shrivastava makes the case that in the age of AI-accelerated development and opaque supply chains, organizations must adopt an Attack Surface Reduction (ASR) philosophy — building systems that are simpler, smaller, and inherently less attackable through subtraction rather than accumulation. The talk covers AI’s dual impact on security, the breadth of modern supply chain risks, and a structured manifesto for reducing attack surface across software, identity, infrastructure, and data.

Key Topics Covered

The Modern Developer Workflow — Then and Now:

Defining the Attack Surface:

The Failure of Current Security Approaches:

AI’s Impact on Security:

Software Supply Chain Reality:

The Attack Surface Reduction Manifesto:

Four Areas of Attack Surface Reduction:

Convincing Management:

Actionable Takeaways

  1. Adopt the Attack Surface Reduction mindset: “Build less. Expose less. Trust less.” — every system, service, identity, and data store that doesn’t need to exist is one less thing to defend.
  2. Audit and reduce your software footprint: eliminate unused features, APIs, and endpoints; prefer internal code reuse over adding external dependencies; minimize build toolchain complexity.
  3. Address IAM sprawl systematically: enforce least privilege, discover shadow access, control role explosion, and manage the secret lifecycle proactively.
  4. Prune infrastructure: decommission zombie resources and orphaned services, expose nothing by default, adopt minimal container images, and enforce infrastructure-as-code discipline.
  5. Collect and retain less data: every piece of data you store expands your attack surface and compliance burden — minimize collection, shorten retention, and limit propagation.
  6. Account for Shadow AI: establish policies for AI IDE usage, monitor for unsanctioned deployments by non-technical staff, and bring shadow IT into governance.
  7. Make the business case with cost savings: translate attack surface reduction into reduced licensing, operational, compliance, and infrastructure costs to secure management buy-in.
  8. Visit reducetheattacksurface.com and use the ASR Manifesto as a framework for systematically reducing exposure across software, identity, infrastructure, and data.