The process of securing a system by reducing its surface of vulnerability, i.e. removing all un-necessary applications.