C-I-A triad: Confidentiality, Integrity, Availability.
A dead system is confidential, and if that's your criterion, then fine, but legitimate users may require access to intact data and services.
A dead machine is difficult to infect with malware. You'd have to go out of your way to do so.