Server hardening and attack surface reduction
Your production servers are probably over-exposing themselves That fresh server deployment you just spun up? It's likely running dozens of services you didn't ask for, listening on ports you don't ...

Source: DEV Community
Your production servers are probably over-exposing themselves That fresh server deployment you just spun up? It's likely running dozens of services you didn't ask for, listening on ports you don't need, and giving applications way more privileges than necessary. Welcome to the wonderful world of default configurations, where convenience beats security every single time. As engineers, we know this intellectually, but the pressure to ship fast means hardening often gets pushed to "later." The problem is that attackers aren't waiting for later. The real cost of "we'll secure it tomorrow" I've seen teams lose entire weekends rebuilding compromised systems because someone exploited a default SSH configuration. Others have faced regulatory fines when attackers moved laterally through their network via unnecessary services running as root. The pattern is always the same: default installation, rushed deployment, eventual compromise through something that should never have been running in produ