3.1.13. Disable all unneeded services on hosts and separate critical




 

3.1.13. Disable all unneeded services on hosts and separate critical services.

Every service that is running presents another potential opportunity for compromise. Separating critical services is important because if an attacker compromises a host that is running a critical service, immediate access should be gained only to that one service.