Some good security practices when hardening a Linux server are:
Removing unnecessary packages (B) to reduce the attack surface and eliminate potential vulnerabilities
Disabling the SSH root login possibility (E) to prevent unauthorized access and brute-force attacks on the root account References:
[CompTIA Linux+ Study Guide], Chapter 9: Securing Linux, Section: Hardening Linux
[How to Harden Your Linux Server]
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit