The network security team of a company wants to reduce the system attack surface to limit the ways an attacker can connect to the network. How can the team achieve this to harden the network