Is there something similar to device hardening best practices for ACI?
This is what I am referring to for NX-OS - https://www.cisco.com/c/en/us/about/security-center/securing-nx-os.html
Looking for some best practices on securing the ACI infrastructure, but does it even apply to ACI?