Difference between revisions of "Choose a hosting provider"

(High Technical)
(High Technical)
Line 135: Line 135:
 
</li>
 
</li>
 
</ul>
 
</ul>
<ol>
+
<ul>
'''Database'''
+
'''Database hardening'''
 +
 
 +
A key approach discussed elsewhere in protecting data, both at rest - on disk - and in use - in memory, is to encrypt these data stores either as part of full disk encryption or as individual restricted encrypted mount points.
 +
 
 +
Below are further guides for specific hardening techniques for the MySQL database system.
 
<li>
 
<li>
 +
[http://www.greensql.com/content/mysql-security-best-practices-hardening-mysql-tips| MySQL Security Best Practices]
 +
</li>
 +
<li>
 +
[http://rochakchauhan.com/blog/2013/11/19/security-and-hardening-tips-for-mysql/| Security and Hardening Tips for MySQL]
 +
</li>
 +
<li>
 +
[http://www.securethelock.com/2014/01/09/12-steps-for-hardening-mysql-from-attackers/| 12 steps for Hardening MySQL from Attackers]
 
</li>
 
</li>
 
</ol>
 
</ol>
<ol>
+
<ul>
 
'''Web app'''
 
'''Web app'''
 
<li>
 
<li>

Revision as of 19:41, 18 May 2014

Criteria

  • Price - relative services offered
  • Reputation - are they well known, have they had security breaches or reports of poor support, do they adhere to certain principles inline with that of your organisation - such as data privacy or protection of human rights defenders.
  • Specialisation - do they work in the field of human rights, software applications or general hosting
  • Is mail provided
  • Hardware specifications
  • Operating systems offered
  • Supported provided
  • Readily discusses your security concerns and which security features and processes they offer with their hosting.
  • Provides the most recent stable versions of all server software.
  • Provides reliable methods for backup and recovery.
  • Provides encryption options for hosting of sites or mail

Secure hosting setups

Depending on available skill level the following secure system setups are possible:

 [Expand

High Technical