5 practical steps to strengthen attack resilience with attack surface management