⚠
BowTie Risk
Assessments
Hazards
Library
Implementations
Guide
← Back
Edit Barrier
Name
Type
Prevention
Mitigation
General
Category
Tags
(comma-separated)
Description
Disable or remove unnecessary and potentially vulnerable software, features, or services to reduce the attack surface and prevent abuse by adversaries. This involves identifying software or features that are no longer needed or that could be exploited and ensuring they are either removed or properly disabled. This mitigation can be implemented through the following measures: Remove Legacy Software: - Use Case: Disable or remove older versions of software that no longer receive updates or securit
Save changes
Cancel