Users and components should have only the access they require to do their job
Reduce the Attack Surface
- Use Least Privilege Principle
- Remove Obsoletes Software
- Limit Access
- Remove Cluster Services
- Restrict Obsolete Kernel Modules
- Identify and Fix Open Ports