Hardening the host operative system
There are many paths to harden a given operating system deployment. The specifics on these steps are outside of the scope of this book. I recommend referring to a hardening guide specific to your operating system.
For example, the Security Technical Implementation Guides (STIG) and the NSA guides are useful starting places along with the OS vendor documentation.