Please consider hardening dbus.service
On systems running systemd, dbus-daemon is usually started using dbus.service. Currently, the service runs as root and without any kind restrictions.
Does dbus-daemon really need to run with such high privileges? If not, I would suggest adding some hardening options to dbus.service. systemd-analyze security dbus.service
currently reports an exposure level of 9.6, and gives hints at what could be done to improve the situation.
Thanks!