Difference between revisions of "Choose a hosting provider"

(High Technical)
(High Technical)
Line 123: Line 123:
 
</li>
 
</li>
 
</ol>
 
</ol>
<ol>
+
<ul>
 
'''Apache hardening'''
 
'''Apache hardening'''
 +
 +
As well as considering the physical server and it's operating system users must thinking in terms of application security. Especially for those applications which either contain sensitive data or those that provide access routes to the machine for an attacker.
 +
 +
Below is a set of guides for Apache webserver hardening.
 
<li>
 
<li>
 +
[http://www.tecmint.com/apache-security-tips/| 13 Apache Web Server Security and Hardening Tips]
 +
<li>
 +
[http://xianshield.org/guides/apache2.0guide.html| Apache 2.0 Hardening Guide]
 
</li>
 
</li>
</ol>
+
</ul>
 
<ol>
 
<ol>
 
'''Database'''
 
'''Database'''

Revision as of 19:37, 18 May 2014

Criteria

  • Price - relative services offered
  • Reputation - are they well known, have they had security breaches or reports of poor support, do they adhere to certain principles inline with that of your organisation - such as data privacy or protection of human rights defenders.
  • Specialisation - do they work in the field of human rights, software applications or general hosting
  • Is mail provided
  • Hardware specifications
  • Operating systems offered
  • Supported provided
  • Readily discusses your security concerns and which security features and processes they offer with their hosting.
  • Provides the most recent stable versions of all server software.
  • Provides reliable methods for backup and recovery.
  • Provides encryption options for hosting of sites or mail

Secure hosting setups

Depending on available skill level the following secure system setups are possible:

 [Expand

High Technical

 [Expand

Intermediary Technical

 [Expand

Basic Technical

 [Expand

Comparison Matrix


Back to front page