Hardening techniques
Removing unneeded services
Disabling unused accounts
Images/templates
Remove end-of-life devices
Remove end-of-support devices
Local drive encryption
Enable no execute (NX)/execute never (XN) bit
Disabling central processing unit (CPU) virtualization support
Secure encrypted enclaves/memory encryption
Shell restrictions
Address space layout randomization (ASLR)
Processes
Patching
Firmware
Application
Logging
Monitoring
Mandatory access control
Security-Enhanced Linux (SELinux)/Security-Enhanced Android (SEAndroid)
Kernel vs. middleware
Trustworthy computing
Secure Boot
Attestation services
Hardware security module (HSM)
Measured boot
Self-encrypting drives (SEDs)
Compensating controls
Antivirus
Application controls
Host-based intrusion detection system (HIDS)/Host-based intrusion prevention system (HIPS)
Host-based firewall
Endpoint detection and response (EDR)
Redundant hardware
Self-healing hardware
User and entity behavior analytics (UEBA)