I have not much time at the moment so I just “throw” some often-underestimated points at you sine I have some relations to these topics; forgive me if I repeat something that was already mentioned, I didn’t read the whole topic
(and forgive me that some of the below is copy-pasted from another text of mine
)
You can make Fedora a fortress by using confined user accounts of SELinux [1]. This can add security to your environment that can compete with containerization, and it can also protect applications from each other within user realms. I found out it even limits copy-paste to user-triggered events (e.g., copy-pasting with middle mouse) while applications get hindered to access the origin of the content or the content while transferred. This can be highly relevant for password managers, where it is often forgotten that in GUIs, a lot applications can have related access (e.g., when copy-pasting without caching such as middle mouse + confined users make it more or less impossible that a third application/tool can access the password).
However, currently, confined user accounts break some things. I work with it on KDE since January. But it has some issues (a timeout makes the login idle for 30 seconds, video conferencing is currently blocked). GNOME seems to be more stable but I saw that file roller has issues with it. Yet, an account can be easily confined and unconfined. Optimizing the SELinux classifications of files and users shall not be super relevant here, since the confinement itself makes the most major difference and should remain compatible with and without confinement.
I have started to collaborate with the SIG/WG and the selinux related team, but there had been no time yet to get that fixed in order to get fully supported. I hope in the short-/mid term, we get Fedora as “confinable” as CentOS or RHEL.
Additionally, be aware that the packages that are shipped with Workstation WG and KDE SIG are “cross-checked” since these WG/SIG carefully select what they ship (and they keep doing so). This means if you keep preferring using such packages over others, you can rely on these packages getting critical updates immediately. Unfortunately, as in most operating systems, packaging can end up in “single points of failures” (the maintainer). This is already security relevant. Personally, I carefully select packages I install and check who keeps checking and working with them, and if they remain updated on time (you can do that in bodhi and koji).
(To avoid confusions: flatpak will not solve the above mentioned issues but maybe even increases them since most flatpaks disable all containerization possibilities anyway while they add much heterogeneous software/builds from various unknown environments).
Generally, if you want to keep secure: do not add patches or so yourself, and rely on what is build+tested in the Fedora community. Keep your kernel tainted = 0
A major security and stability advantage of Fedora is that it keeps the vanilla kernel, which means that it keeps all security and stability guarantees of the official Linux kernel. Any change in the kernel breaks that. Unfortunately, this also includes third party drivers.
Concerning disk encryption, yeah it makes a difference as Jeff already noted. Use Anaconda If you have an AES-NI on your machine → check with lscpi | grep aes
(no output means you have none; if the “Flags” are output you have it; today mostly phones, tablets, raspberry and such have none but “normal” computers have already for long). If you have none, you might pre-create adiantum disks instead of using the Anaconda encryption default to achieve an acceptable performance and battery life time. A compromise before adiantum gets introduced in Anaconda (this change relies on storaged) is on its way (AES128 instead of AES256 makes a difference on non-AES-NI machines), but might need some releases before introduction as well 
Also, keep using a secure browser (which also means “secure on Fedora” not just “at all”), a major issue on average machines: Firefox remains the best supported, cross-checked and immediately updated on Fedora (also with regards to my above comments about keeping in our own homogeneous repos and focus on cross-checked packages).
I leave out the firewalling (which seems to have been discussed already anyway), since firewalld shall be configured in a well compromise of security and usability in Workstation and KDE Spin.
Lastly, as indicated in the last paragraph, it might be noted that GNOME- and KDE-based systems are best supported (practically, you can consider KDE as WG, except that it does not contain release blockers), while others tend to lack cross-checks and maintenance (including of packages) because they are often just projects of a few people. So if you focus on security, I suggest to stick with GNOME or KDE Fedoras.
Although it might feel like giving you more power, I suggest to avoid the netinstaller
because it does not incorporate the careful/thoughtful considerations and pre-configurations of the WG/SIG but is widely “blank”.
[1] Some illustrative pages about SELinux confined user accounts:
Chapter 3. Managing confined and unconfined users Red Hat Enterprise Linux 8 | Red Hat Customer Portal
Confining the User with SELinux: danwalsh — LiveJournal
Difference between a Confined User (staff_u) and a Confined Administrator.: danwalsh — LiveJournal
#358 KDE Spin/components not properly aligned with SELinux (this can be verified with SELinux confined user accounts)
( If someone is playing with confined user accounts and has questions, feel free to open a topic here and trigger me with @py0xc3 ) → I am already seeking potential collaborators for testing when this gets to the next stage
)
After all, don’t forget to consider physical access (Jeff already indicated that), add BIOS passwords, and also don’t forget that video capturing of keyboards and screens is possible as well (underestimated at public places). I guess I forgot a lot, but maybe this adds some incentives to the considerations
If there are questions about my points or so, feel free to trigger me with @py0xc3 as I will maybe not get your post otherwise 
Btw, Anaconda will hopefully give you more possibilities to adjust/customize things within the graphical installer (also with regards to security things) in future once the WebUI is introduced (although this will still take some time)