Description: Hardened refers to systems that have been secured by reducing vulnerabilities. This process involves implementing various security measures to protect technological infrastructure from external and internal threats. In the context of configuration as code, ‘hardening’ translates to creating scripts and configurations that ensure development and production environments are secured from the outset. Regarding technological regulations, ‘hardening’ is essential for compliance with security and privacy standards, ensuring that sensitive data is protected. In a continuous integration pipeline, ‘hardening’ ensures that each stage of the development process is shielded from potential attacks, allowing for a more secure and reliable software delivery. The main characteristics of ‘hardening’ include the removal of unnecessary services, the application of security patches, the configuration of firewalls, and the implementation of strict access controls. The relevance of this approach lies in the increasing sophistication of cyber threats, making proactive security a priority for organizations looking to protect their digital assets.