Lesson 5.4 — Unnecessary software, services and system utilities: reducing attack surface

This lesson helps the learner identify, review and remove or disable unnecessary software, applications, system utilities and network services across in-scope devices and systems.

What You'll Be Able to Do

By the end of this lesson, you will be able to:

  • identify unnecessary applications
  • system utilities and network services
  • decide whether to keep
  • remove or disable them
  • collect appropriate evidence
  • record any software or service risks that need to be carried into security update management

Why This Matters

It explains how unnecessary software increases attack surface, update workload and Cyber Essentials Plus failure risk, and gives learners a practical way to create a software and service clean-up record.

The most common problems are:

  • reviewing only visible desktop applications;
  • forgetting services running in the background;
  • forgetting browser extensions;
  • forgetting SaaS integrations and OAuth apps;

The Core Rule

Cyber Essentials expects organisations to regularly remove or disable unnecessary software, including applications, system utilities and network services.

Unnecessary software increases attack surface, creates update work and can introduce avoidable vulnerabilities.

What the CE Assessor Looks For

A strong position shows:

  • software inventory exists for main device groups;
  • standard builds exist for common device types;
  • unnecessary applications are removed;
  • unnecessary system utilities are removed or restricted;
  • unnecessary network services are disabled;
  • old remote access tools are removed;

Common Mistakes

  • reviewing only visible desktop applications;
  • forgetting services running in the background;
  • forgetting browser extensions;
  • forgetting SaaS integrations and OAuth apps;
  • forgetting cloud-hosted servers;
  • removing server services blindly without dependency checks;

Copy This

Keep this rule visible:

If it is not required for the device or system to do its job, remove it or disable it.

Quick Checklist

Before moving on, make sure you can say yes to these:

  • [ ] What does Cyber Essentials require regarding unnecessary software?
  • [ ] What is attack surface?
  • [ ] Why should unnecessary software be removed?
  • [ ] What is the difference between removing and disabling?
  • [ ] Why should server services not be removed blindly?

Your Action

Do this now — it takes 10–20 minutes.

List unnecessary software, services, or features that are installed but not needed. Plan which to remove. Add to Section SC.

Key Takeaway

If it is not required for the device or system to do its job, remove it or disable it.

Your Workbook Activity

Complete: Unnecessary software and services review record

Next Lesson

In the next lesson: Auto-run and automatic execution: stopping files running without user authorisation