15.3 Reducing Attack Surface on Endpoints, Servers, and Devices

Key Takeaways

  • Attack surface is reduced by removing or disabling unnecessary services, software, ports, accounts, protocols, and interfaces.
  • Endpoint hardening commonly includes disk encryption, host firewall, endpoint protection, least privilege, screen lock, and controlled applications.
  • Server hardening emphasizes minimal roles, protected administration, logging, patching, service accounts, and restricted inbound access.
  • Network device hardening includes secure management, disabled unused interfaces, protected configurations, logging, and limited administrator access.
  • Hardening decisions should preserve required business function while removing avoidable exposure.
Last updated: April 2026

Reducing Attack Surface on Endpoints, Servers, and Devices

Attack surface is the set of ways a system can be reached, used, or abused. Hardening reduces that surface. The goal is not to make a system useless; the goal is to keep required business functions while removing avoidable exposure. For CC scenarios, look for unnecessary services, default accounts, broad access, old protocols, missing logging, and weak administration paths.

Endpoints

Endpoints include laptops, desktops, tablets, and sometimes mobile devices. Endpoint hardening often includes full-disk encryption, screen lock, strong authentication, host firewall, endpoint detection or anti-malware, automatic updates, least privilege for users, controlled installation of software, secure browser settings, and remote wipe for managed devices.

A practical example is a sales laptop used while traveling. If it is stolen from a car, full-disk encryption and strong sign-in reduce the chance that customer files are exposed. If the user normally works without local administrator rights, malware has fewer easy paths to install drivers or disable tools. If the device reports logs and health status, the security team can see whether it was compliant before the theft.

Servers

Servers should run only the roles they need. A database server should not also host random file shares, test web apps, unused remote desktop exposure, and old sample services. Each extra service adds code, configuration, accounts, logs, and vulnerabilities. Server hardening includes minimal installation, patching, host firewall rules, protected management access, service account least privilege, secure logging, time sync, backup configuration, and removal of sample files or default content.

Administration paths deserve special attention. Remote admin should be limited to management networks, VPNs, jump hosts, or privileged access systems. Shared administrator accounts weaken accountability. Administrative tools should use secure protocols such as SSH or HTTPS-based consoles rather than insecure legacy protocols.

Network Devices

Routers, switches, firewalls, wireless controllers, and other network devices need hardening too. Common actions include changing default credentials, disabling unused management protocols, using secure management such as SSH or HTTPS, restricting admin access by source network, disabling unused physical interfaces, applying firmware updates, backing up configurations securely, sending logs to a central collector, and using SNMPv3 if SNMP is required.

Unused interfaces are a simple scenario clue. A switch port in a public lobby that connects directly to the internal network creates risk. If it is not needed, disable it. If it is needed, apply appropriate network access control, VLAN assignment, monitoring, and physical protection.

Removing Unnecessary Services

Removing or disabling unnecessary services is one of the clearest hardening actions. If a server does not need FTP, disable it. If a printer does not need internet-facing management, block it. If a workstation does not need a local web server, remove it. This reduces vulnerabilities, simplifies monitoring, and makes suspicious activity easier to notice.

Be careful with production dependencies. A service that looks unused may support backups, monitoring, licensing, or an old integration. Good hardening confirms ownership and purpose before removal, then documents the change and rollback plan.

Scenario Reasoning

A vulnerability scan finds Telnet enabled on several switches. The better response is to disable Telnet, enable secure management, restrict administrative access, and verify that administrators can still manage the switches through approved paths. A workstation image includes games, trial software, local admin rights for every user, and no host firewall. The hardening answer is to remove unapproved software, enforce least privilege, enable protective controls, and validate the image before deployment.

The exam often rewards practical least functionality: keep what the business needs, remove what it does not need, and monitor what remains.

High-Yield Checkpoints

  • Attack surface is reduced by removing or disabling unnecessary services, software, ports, accounts, protocols, and interfaces.
  • Endpoint hardening commonly includes disk encryption, host firewall, endpoint protection, least privilege, screen lock, and controlled applications.
  • Server hardening emphasizes minimal roles, protected administration, logging, patching, service accounts, and restricted inbound access.
  • Network device hardening includes secure management, disabled unused interfaces, protected configurations, logging, and limited administrator access.
  • Hardening decisions should preserve required business function while removing avoidable exposure.
Test Your Knowledge

A server does not require FTP, but the FTP service is installed and listening. What is the best hardening action?

A
B
C
D
Test Your Knowledge

Which endpoint control best protects data if a managed laptop is stolen while powered off?

A
B
C
D
Test Your Knowledge

Which network device hardening step is most appropriate for a switch port in a public lobby that is not needed?

A
B
C
D