{"id":12020,"date":"2026-04-20T13:10:56","date_gmt":"2026-04-20T18:10:56","guid":{"rendered":"https:\/\/www.carahsoft.com\/wordpress\/?p=12020"},"modified":"2026-04-20T13:10:56","modified_gmt":"2026-04-20T18:10:56","slug":"walacor-minimizing-the-attack-surface-blog-2026","status":"publish","type":"post","link":"https:\/\/www.carahsoft.com\/wordpress\/walacor-minimizing-the-attack-surface-blog-2026\/","title":{"rendered":"Minimizing the Attack Surface: The Onion Model vs. Core-First Protection"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Historical Context of Layered Security<\/h2>\n\n\n\n<p>The onion model emerged during the growth of enterprise IT when organizations responded to new threats by adding new defensive layers. Each incident or compliance requirement led to another perimeter or middleware control. While effective in the short term, this layered approach produced patchwork systems with overlapping functionality, inconsistent policies and gaps that attackers could exploit.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a>The Onion Model and Its Vulnerabilities<\/h2>\n\n\n\n<p>The traditional &#8220;onion model&#8221; of cybersecurity layers defenses concentrically around a central database. Each layer is intended to provide a barrier against intrusion, but the cumulative effect is often an expanded and more complex attack surface. From the inside out, the layers typically include:<\/p>\n\n\n\n<ol>\n<li><strong>Database (Data) <\/strong>\u2013 the core asset containing customer records, financial transactions, intellectual property, logs and other sensitive information.<\/li>\n\n\n\n<li><strong>Schema &amp; Validation <\/strong>\u2013 enforcement of data formats, constraints and integrity checks designed to prevent malformed or malicious inputs from reaching the core.<\/li>\n\n\n\n<li><strong>Application Logic &amp; APIs <\/strong>\u2013 business rules and access methods that determine how applications interact with the database, often exposing numerous interfaces.<\/li>\n\n\n\n<li><strong>Access Controls &amp; Identity (IAM) <\/strong>\u2013 authentication and authorization services (passwords, tokens, SSO, MFA) that regulate who can reach protected resources.<\/li>\n\n\n\n<li><strong>Encryption Services <\/strong>\u2013 cryptographic mechanisms for protecting data at rest and in transit, including key management, TLS\/SSL and disk-level encryption.<\/li>\n\n\n\n<li><strong>Firewalls \/ Perimeter Security <\/strong>\u2013 network boundary defenses, intrusion detection systems, packet filtering and monitoring services designed to repel external threats.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a>Why the Attack Surface Expands<\/h2>\n\n\n\n<p>While each layer aims to protect the core, collectively they create new opportunities for exploitation:<\/p>\n\n\n\n<ul>\n<li><strong>Integration Points <\/strong>\u2013 every interface or protocol boundary becomes a seam that can be misconfigured or attacked.<ul><li><strong>Configuration Complexity <\/strong>\u2013 with more interdependent systems, administrators must manage extensive policy sets and security rules, increasing the likelihood of mistakes.<\/li><\/ul><ul><li><strong>Expanded Targets <\/strong>\u2013 each layer (firewalls, IAM, middleware, encryption appliances) presents its own vulnerabilities, requiring constant patching and monitoring.<\/li><\/ul>\n<ul>\n<li><strong>Dependency Chains <\/strong>\u2013 the failure of a single outer system can cascade inward, leaving the core exposed despite the presence of other controls.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p>In practice, adding more layers often enlarges the attack surface instead of shrinking it. Attackers exploit this complexity, probing for the weakest link among numerous entry points.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a>Operational Cost of a Typical Attack Surface<\/h2>\n\n\n\n<p>Beyond theoretical weaknesses, a large attack surface carries real operational costs. Tool sprawl burdens administrators with dozens of systems to configure and maintain.<\/p>\n\n\n\n<p>Overlapping monitoring layers generate alert fatigue, obscuring genuine threats. Security budgets become diluted, funding maintenance of redundant defenses rather than reinforcing the integrity of the data itself.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a>Modern Threat Landscape<\/h2>\n\n\n\n<p>Today\u2019s adversaries exploit weaknesses that layered defenses cannot easily address. Lateral movement bypasses layers once attackers are inside a network. Supply chain compromises enter through trusted applications, neutralizing perimeter filters. Zero-day exploits render outer walls ineffective overnight. Core-first security, with protection embedded at the data level, ensures confidentiality and integrity even in the face of these modern tactics.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a>Architectural Simplicity as Security<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2026\/04\/Walacor-Attack-Surface-Onion-Blog_Embedded-in-Blog.jpg\" alt=\"\" class=\"wp-image-12022\" style=\"object-fit:cover;width:300px;height:300px\" srcset=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2026\/04\/Walacor-Attack-Surface-Onion-Blog_Embedded-in-Blog.jpg 300w, https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2026\/04\/Walacor-Attack-Surface-Onion-Blog_Embedded-in-Blog-150x150.jpg 150w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/figure><\/div>\n\n\n<p>Simpler architectures are inherently more secure. Each removed integration point reduces the trusted computing base and the probability of misconfiguration. By embedding protections directly into the data layer, Walacor collapses overlapping controls, producing a system that is easier to audit, verify and trust. This simplicity is itself a security multiplier.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a>The Core-First Alternative<\/h2>\n\n\n\n<p>A core-first security model inverts the paradigm by embedding protections at the data layer itself rather than relying primarily on external systems:<\/p>\n\n\n\n<ul>\n<li><strong>Record-Level Encryption and Validation <\/strong>\u2013 each data element carries its own cryptographic safeguards, ensuring confidentiality and authenticity.<ul><li><strong>Immutable Integrity Proofs <\/strong>\u2013 cryptographic hashes and proofs guarantee that tampering is detectable, independent of outer defenses.<\/li><\/ul><ul><li><strong>Minimized Trust Dependencies <\/strong>\u2013 fewer external layers are required for assurance, reducing the number of systems that must be defended and configured.<\/li><\/ul>\n<ul>\n<li><strong>Resilience Under Breach <\/strong>\u2013 even if outer controls fail, the data itself remains cryptographically protected and resistant.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p>This approach shrinks the attack surface by concentrating security at the point of greatest value: the data. Instead of expanding outward with additional complexity, it reduces potential vectors for compromise.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a>Walacor and Core-First Protection<\/h2>\n\n\n\n<p>Walacor implements the core-first philosophy by embedding immutability, cryptographic enforcement and schema validation directly into the data layer. Rather than building outward layers that expand the attack surface, Walacor collapses unnecessary perimeter complexity and anchors protection where it cannot be bypassed: the data itself.<\/p>\n\n\n\n<ul>\n<li><strong>Data-Level Cryptography <\/strong>\u2013 each record is encrypted and bound to proofs of authenticity, eliminating reliance on external encryption appliances.<ul><li><strong>Immutable Storage <\/strong>\u2013 records are tamper-evident at the core, reducing the need for overlapping monitoring systems.<\/li><\/ul><ul><li><strong>Integrated Validation <\/strong>\u2013 schema and policy checks occur at write-time, blocking invalid or hostile data without middleware add-ons.<\/li><\/ul>\n<ul>\n<li><strong>Shrinking the Attack Surface <\/strong>\u2013 because Walacor renders many outer layers redundant, there are fewer interfaces to defend, fewer seams to misconfigure and fewer targets for attackers.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p>Walacor demonstrates that the most effective way to minimize the attack surface is to concentrate defenses in the core, ensuring data integrity and confidentiality regardless of the state of external systems.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a>Agents, AI and the Attack Surface<\/h2>\n\n\n\n<p>The emergence of intelligent agents and AI-driven systems adds a new dimension to the attack surface discussion. Agents interact with data across multiple contexts\u2014querying, transforming and making autonomous decisions. In a traditional layered model, each of these interactions multiplies the integration points and potential vulnerabilities. Malicious prompts, poisoned training data or compromised connectors can all bypass outer defenses to reach sensitive information.<\/p>\n\n\n\n<p>A core-first model directly addresses this risk. By cryptographically securing and validating data at the record level, Walacor ensures that even AI agents cannot be tricked into handling falsified or tampered records. Every data element carries its own assurance, creating a trustworthy substrate for automated reasoning and machine learning pipelines.<\/p>\n\n\n\n<p>In this way, AI becomes a consumer of verifiable data rather than a potential vector for hidden compromise, aligning intelligent agents with the same guarantees that protect human operators.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a>Forward-Looking Implications<\/h2>\n\n\n\n<p>A core-first approach lays the groundwork for enduring benefits. Immutable, verifiable data strengthens sovereignty in federated and multicloud environments. Compliance becomes easier, as audit trails and integrity proofs are inherent to the system rather than bolted on. This architecture future-proofs sensitive systems, ensuring resilience against evolving threats.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a>Reinforcing the Core-First Premise<\/h2>\n\n\n\n<p>The onion model reflects a reactionary philosophy that often results in excessive complexity and a sprawling attack surface. A core-first strategy simplifies the architecture by embedding protection directly into the data layer, eliminating unnecessary exposure and ensuring that sensitive information remains secure even in hostile conditions.<\/p>\n\n\n\n<p><strong><em>To learn more about a core-first approach to cybersecurity, contact <a href=\"https:\/\/www.walacor.com\/contact-us\/\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"Walacor Onion Blog 2026 - Bottom CTA\">Walacor.<\/a><\/em><\/strong><\/p>\n\n\n\n<p><em>Carahsoft Technology Corp. is The Trusted Government IT Solutions Provider, supporting Public Sector organizations across Federal, State and Local Government agencies and Education and Healthcare markets. As the Master Government Aggregator\u202ffor our vendor partners, including\u00a0Walacor, we deliver\u202f<\/em><a href=\"https:\/\/www.carahsoft.com\/solve\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"Walacor Onion Blog 2026 - Carahsoft Solve\"><em>solutions<\/em><\/a><em>\u202ffor Geospatial, Cybersecurity, MultiCloud, DevSecOps, Artificial Intelligence, Customer Experience and Engagement, Open Source and more. Working with resellers, systems integrators and consultants, our sales and marketing teams provide industry leading IT products, services and training through hundreds of contract vehicles. Explore the\u00a0<\/em><a href=\"https:\/\/www.carahsoft.com\/blog\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"Walacor Onion Blog 2026 - Carahsoft Blog\"><em>Carahsoft Blog<\/em><\/a><em>\u00a0to learn more about the latest trends in Government technology markets and solutions, as well as Carahsoft\u2019s ecosystem of partner thought-leaders.<\/em><\/p>\n<head><meta name=\"url\" property=\"og:url\" content=\"https:\/\/www.carahsoft.com\/blog\/walacor-minimizing-the-attack-surface-blog-2026\"><\/head>","protected":false},"excerpt":{"rendered":"<p>Historical Context of Layered Security The onion model emerged during the growth of enterprise IT when organizations responded to new threats by adding new defensive layers. Each incident or compliance requirement led to another perimeter or middleware control. While effective &hellip; <a href=\"https:\/\/www.carahsoft.com\/wordpress\/walacor-minimizing-the-attack-surface-blog-2026\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":9,"featured_media":12021,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2,1493],"tags":[605,545,1697],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Minimizing the Attack Surface: Core-First Protection | Carahsoft<\/title>\n<meta name=\"description\" content=\"Explore the history of layered security, how the onion model expands attack surfaces, and why core-first protection offers a simpler, stronger alternative.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.carahsoft.com\/wordpress\/walacor-minimizing-the-attack-surface-blog-2026\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Minimizing the Attack Surface: Core-First Protection | Carahsoft\" \/>\n<meta property=\"og:description\" content=\"Explore the history of layered security, how the onion model expands attack surfaces, and why core-first protection offers a simpler, stronger alternative.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.carahsoft.com\/wordpress\/walacor-minimizing-the-attack-surface-blog-2026\/\" \/>\n<meta property=\"og:site_name\" content=\"| Carahsoft\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-20T18:10:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2026\/04\/Walacor-Attack-Surface-Onion-Blog_Post-Preview.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"875\" \/>\n\t<meta property=\"og:image:height\" content=\"635\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"caduncan@carahsoft.com\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"caduncan@carahsoft.com\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/walacor-minimizing-the-attack-surface-blog-2026\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/walacor-minimizing-the-attack-surface-blog-2026\/\"},\"author\":{\"name\":\"caduncan@carahsoft.com\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/7ef36b93fd236bf4ee76ab49a9105ef5\"},\"headline\":\"Minimizing the Attack Surface: The Onion Model vs. Core-First Protection\",\"datePublished\":\"2026-04-20T18:10:56+00:00\",\"dateModified\":\"2026-04-20T18:10:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/walacor-minimizing-the-attack-surface-blog-2026\/\"},\"wordCount\":1179,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/walacor-minimizing-the-attack-surface-blog-2026\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2026\/04\/Walacor-Attack-Surface-Onion-Blog_Post-Preview.jpg\",\"keywords\":[\"Artificial Intelligence\",\"Cybersecurity\",\"Walacor\"],\"articleSection\":[\"Cybersecurity\",\"Partners\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.carahsoft.com\/wordpress\/walacor-minimizing-the-attack-surface-blog-2026\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/walacor-minimizing-the-attack-surface-blog-2026\/\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/walacor-minimizing-the-attack-surface-blog-2026\/\",\"name\":\"Minimizing the Attack Surface: Core-First Protection | Carahsoft\",\"isPartOf\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/walacor-minimizing-the-attack-surface-blog-2026\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/walacor-minimizing-the-attack-surface-blog-2026\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2026\/04\/Walacor-Attack-Surface-Onion-Blog_Post-Preview.jpg\",\"datePublished\":\"2026-04-20T18:10:56+00:00\",\"dateModified\":\"2026-04-20T18:10:56+00:00\",\"description\":\"Explore the history of layered security, how the onion model expands attack surfaces, and why core-first protection offers a simpler, stronger alternative.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/walacor-minimizing-the-attack-surface-blog-2026\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.carahsoft.com\/wordpress\/walacor-minimizing-the-attack-surface-blog-2026\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/walacor-minimizing-the-attack-surface-blog-2026\/#primaryimage\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2026\/04\/Walacor-Attack-Surface-Onion-Blog_Post-Preview.jpg\",\"contentUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2026\/04\/Walacor-Attack-Surface-Onion-Blog_Post-Preview.jpg\",\"width\":875,\"height\":635},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/walacor-minimizing-the-attack-surface-blog-2026\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.carahsoft.com\/wordpress\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Minimizing the Attack Surface: The Onion Model vs. Core-First Protection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#website\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/\",\"name\":\"| Carahsoft\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.carahsoft.com\/wordpress\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\",\"name\":\"Carahsoft\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png\",\"contentUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png\",\"width\":3184,\"height\":846,\"caption\":\"Carahsoft\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/7ef36b93fd236bf4ee76ab49a9105ef5\",\"name\":\"caduncan@carahsoft.com\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/170e441354efb33164baf70f4f675d15?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/170e441354efb33164baf70f4f675d15?s=96&d=mm&r=g\",\"caption\":\"caduncan@carahsoft.com\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Minimizing the Attack Surface: Core-First Protection | Carahsoft","description":"Explore the history of layered security, how the onion model expands attack surfaces, and why core-first protection offers a simpler, stronger alternative.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.carahsoft.com\/wordpress\/walacor-minimizing-the-attack-surface-blog-2026\/","og_locale":"en_US","og_type":"article","og_title":"Minimizing the Attack Surface: Core-First Protection | Carahsoft","og_description":"Explore the history of layered security, how the onion model expands attack surfaces, and why core-first protection offers a simpler, stronger alternative.","og_url":"https:\/\/www.carahsoft.com\/wordpress\/walacor-minimizing-the-attack-surface-blog-2026\/","og_site_name":"| Carahsoft","article_published_time":"2026-04-20T18:10:56+00:00","og_image":[{"width":875,"height":635,"url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2026\/04\/Walacor-Attack-Surface-Onion-Blog_Post-Preview.jpg","type":"image\/jpeg"}],"author":"caduncan@carahsoft.com","twitter_misc":{"Written by":"caduncan@carahsoft.com","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.carahsoft.com\/wordpress\/walacor-minimizing-the-attack-surface-blog-2026\/#article","isPartOf":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/walacor-minimizing-the-attack-surface-blog-2026\/"},"author":{"name":"caduncan@carahsoft.com","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/7ef36b93fd236bf4ee76ab49a9105ef5"},"headline":"Minimizing the Attack Surface: The Onion Model vs. Core-First Protection","datePublished":"2026-04-20T18:10:56+00:00","dateModified":"2026-04-20T18:10:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/walacor-minimizing-the-attack-surface-blog-2026\/"},"wordCount":1179,"commentCount":0,"publisher":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/walacor-minimizing-the-attack-surface-blog-2026\/#primaryimage"},"thumbnailUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2026\/04\/Walacor-Attack-Surface-Onion-Blog_Post-Preview.jpg","keywords":["Artificial Intelligence","Cybersecurity","Walacor"],"articleSection":["Cybersecurity","Partners"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.carahsoft.com\/wordpress\/walacor-minimizing-the-attack-surface-blog-2026\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.carahsoft.com\/wordpress\/walacor-minimizing-the-attack-surface-blog-2026\/","url":"https:\/\/www.carahsoft.com\/wordpress\/walacor-minimizing-the-attack-surface-blog-2026\/","name":"Minimizing the Attack Surface: Core-First Protection | Carahsoft","isPartOf":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/walacor-minimizing-the-attack-surface-blog-2026\/#primaryimage"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/walacor-minimizing-the-attack-surface-blog-2026\/#primaryimage"},"thumbnailUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2026\/04\/Walacor-Attack-Surface-Onion-Blog_Post-Preview.jpg","datePublished":"2026-04-20T18:10:56+00:00","dateModified":"2026-04-20T18:10:56+00:00","description":"Explore the history of layered security, how the onion model expands attack surfaces, and why core-first protection offers a simpler, stronger alternative.","breadcrumb":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/walacor-minimizing-the-attack-surface-blog-2026\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.carahsoft.com\/wordpress\/walacor-minimizing-the-attack-surface-blog-2026\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/walacor-minimizing-the-attack-surface-blog-2026\/#primaryimage","url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2026\/04\/Walacor-Attack-Surface-Onion-Blog_Post-Preview.jpg","contentUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2026\/04\/Walacor-Attack-Surface-Onion-Blog_Post-Preview.jpg","width":875,"height":635},{"@type":"BreadcrumbList","@id":"https:\/\/www.carahsoft.com\/wordpress\/walacor-minimizing-the-attack-surface-blog-2026\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.carahsoft.com\/wordpress\/"},{"@type":"ListItem","position":2,"name":"Minimizing the Attack Surface: The Onion Model vs. Core-First Protection"}]},{"@type":"WebSite","@id":"https:\/\/www.carahsoft.com\/wordpress\/#website","url":"https:\/\/www.carahsoft.com\/wordpress\/","name":"| Carahsoft","description":"","publisher":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.carahsoft.com\/wordpress\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization","name":"Carahsoft","url":"https:\/\/www.carahsoft.com\/wordpress\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/","url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png","contentUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png","width":3184,"height":846,"caption":"Carahsoft"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/7ef36b93fd236bf4ee76ab49a9105ef5","name":"caduncan@carahsoft.com","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/170e441354efb33164baf70f4f675d15?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/170e441354efb33164baf70f4f675d15?s=96&d=mm&r=g","caption":"caduncan@carahsoft.com"}}]}},"_links":{"self":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/12020"}],"collection":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/comments?post=12020"}],"version-history":[{"count":2,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/12020\/revisions"}],"predecessor-version":[{"id":12026,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/12020\/revisions\/12026"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/media\/12021"}],"wp:attachment":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/media?parent=12020"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/categories?post=12020"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/tags?post=12020"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}