Security
10.1 Guidelines
Best practices for security include the following tasks:
• Identify and disable unnecessary functionality and software.
• Identify interfaces that are not needed or wanted (VMCI).
• Remove all unnecessary accounts.
• Follow the principle of least privilege for service and administrator accounts.
• Disable unnecessary network services.
• Audit list of open ports and uses.
• Harden virtual machines.