RPC-based services are notorious as entry-points for intruders. So these services, in particular, should be wrapped as described above.