There isn't a simple list. It depends on what daemons and services you are running. There is an excellent checklist here.
This should be a good starting point. There are also a number of excellent resources available online and in books that you should be able to find via Google. You could also have a look at the guides and standards at theCenter for Internet Security.
This was first published in January 2006