From an information security perspective, the process of securing a computer’s administrative functions or inactivating those features not needed for the computer’s intended business purpose. Adapted from: FFIEC IT Examination Handbook, Information Security. 2021. https://ithandbook.ffiec.gov/glossary.aspx