While we administrate controls over various layers, having a secured configuration for services that are running on the system is very important.
The services that are accessible outside of network pose various threats related to denial of service, intense brute forcing, exploits, and many more.
We need to make sure that even the services are configured in a way that can mitigate these attacks at a certain level.