Features

Exploit mitigation

Filling holes in the linux security posture

Security by default

Reduce information leakage

Attack surface reduction

Security ease-of-use