Digital systems have vulnerabilities. The many ways a server or application can be configured could result in an equal number of possible attack vectors. Hardening them makes them tougher to crack. The steps involved in hardening might involve configuring settings to values that restrict access. It could also be other best practices related to users, access management and policies.
- NIST Special Publication 800-123
- Center for Internet Security Benchmarks