Breaking Boundaries, Securing Perimeters: A pragmatic approach to Attack Surface Management