Might as well eliminate the attack surface entirely, and ban computing.
In a way yes that’s how enterprise endpoint software works.