Difference between revisions of "Choose a hosting provider"

(High Technical)
(Mitigation)
Line 134: Line 134:
 
<li>
 
<li>
 
To protect the server it is important to audit the open ports on the machine. To check listening ports you can run
 
To protect the server it is important to audit the open ports on the machine. To check listening ports you can run
 
+
<br>
 
  netstat -tulpn
 
  netstat -tulpn
  
Line 147: Line 147:
 
<li>
 
<li>
 
[http://selinuxproject.org/page/Main_Page| Security Enhanced Linux(SELinux)] is a kernel level security control mechanism, which enforces a set of rules and procedures for the system. SELinux provides fine grained control for access rights and permissions.
 
[http://selinuxproject.org/page/Main_Page| Security Enhanced Linux(SELinux)] is a kernel level security control mechanism, which enforces a set of rules and procedures for the system. SELinux provides fine grained control for access rights and permissions.
 
+
<br>
 
To check if it is enabled run
 
To check if it is enabled run
 
+
<br>
 
  sestatus
 
  sestatus
 
+
<br>
 
To enable run
 
To enable run
 
+
<br>
 
  setenforce enforcing
 
  setenforce enforcing
 
+
<br>
 
To adjust the SELinux config is available at
 
To adjust the SELinux config is available at
 
+
<br>
 
  /etc/selinux/config  
 
  /etc/selinux/config  
 
</li>
 
</li>

Revision as of 18:10, 25 May 2014

Criteria

There are several aspects which should be considered when selecting a service host. Below is a general list, this document gives detailed information on each area.

  • Price - relative services offered
  • Reputation - are they well known, have they had security breaches or reports of poor support, do they adhere to certain principles inline with that of your organisation - such as data privacy or protection of human rights defenders.
  • Specialisation - do they work in the field of human rights, software applications or general hosting
  • Is mail provided
  • Hardware specifications
  • Operating systems offered
  • Supported provided
  • Readily discusses your security concerns and which security features and processes they offer with their hosting.
  • Provides the most recent stable versions of all server software.
  • Provides reliable methods for backup and recovery.
  • Provides encryption options for hosting of sites or mail

Features

It is quite important to consider the possibilities offered by your provider's control panel. If you need to write a support ticket everytime the server has to reboot, it wont be an efficient process, especially during a crises. Possible features to look out for include

  • Automated operating system installs
  • Server boot and reboot
  • Remote console (sometimes known as KVM)
  • Server and network statistics
  • Dynamic components (e.g. adding extra disk space, RAM without rebuilding the machine or having to order a new service)
  • Server access (varies between SSH, SFTP or web based)

Secure hosting setups

Depending on available skill level the following secure system setups are possible:

 [Expand

High Technical

 [Expand

Intermediary Technical

 [Expand

Basic Technical

 [Expand

Comparison Matrix


Back to front page