Security implementation (unix)
Disable services
Restrict services
Keep up to date
Sources of information
Monitoring