Minimizing the Attack Surface

Removing unused features and disabling unneeded network services reduces the parts of the system that can be attacked.