A blockchain network administrator is hardening a new full node to minimize its attack surface. Which of the following is the MOST critical first step to protect the node from known software vulnerabilities?
-
A
Implementing a host-based intrusion detection system (HIDS).
-
B
Ensuring the blockchain client software and operating system are fully patched and up to date.
-
C
Configuring strict role-based access control (RBAC) for administrative access.
-
D
Encrypting the blockchain data at rest using AES-256.