Difference between revisions of "Access Restrictions"

Bill (Talk | contribs)
(Dedicated/VPS Hosting)
Bill (Talk | contribs)
 
(2 intermediate revisions by 2 users not shown)
Line 5: Line 5:
 
==Dedicated/VPS Hosting==
 
==Dedicated/VPS Hosting==
  
'''Password Management''' is the core of any security strategy. For Dedicated and VPS hosting options, there are several modes of control that administrator can apply.
+
'''Password Management''' is the core of any security strategy. For dedicated and VPS hosting options, there are several modes of control that administrator can apply.
 
<ol>
 
<ol>
 
<li>
 
<li>
Enforce strong password - a strong password should contain Upper and Lower case characters, Numbers and Special Characters and should be long; greater than 20 characters. It is also possible to restrict the use of previously used passwords. On Linux systems the following command can be used to force complex passwords for users:
+
Enforce strong password - a strong password should contain upper and lower case characters, numbers and special characters and should be long; greater than 20 characters. It is also possible to restrict the use of previously used passwords. On Linux systems the following command can be used to force complex passwords for users:
 
</li>
 
</li>
 
  password required pam_cracklib.so minlen=12 lcredit=1 ucredit=1 dcredit=2 ocredit=1
 
  password required pam_cracklib.so minlen=12 lcredit=1 ucredit=1 dcredit=2 ocredit=1
  
For more detail, refer to the guide [http://www.linux-faqs.info/security/force-strong-passwords| Force strong passwords]
+
For more detail, refer to the guide [http://www.linux-faqs.info/security/force-strong-passwords Force strong passwords]
 
<li>
 
<li>
Use password aging, the chaging command on Linux servers allows checking of password age by user and setting of password aging parameters[http://linoxide.com/linux-command/password-expire-chage-command/| link].
+
Use password aging, the chaging command on Linux servers allows checking of password age by user and setting of password aging parameters [http://linoxide.com/linux-command/password-expire-chage-command/ link].
 
</li>
 
</li>
 
<li>
 
<li>
Failed login attempts should result in the locking of the associated user account. On Linux systems, the faillog command can be used to check failures and to set failure limits. For more details see [http://www.cyberciti.biz/tips/rhel-centos-fedora-linux-log-failed-login.html| Faillog]
+
Failed login attempts should result in the locking of the associated user account. On Linux systems, the faillog command can be used to check failures and to set failure limits. For more details see [http://www.cyberciti.biz/tips/rhel-centos-fedora-linux-log-failed-login.html Faillog]
 
</li>
 
</li>
 
<li>
 
<li>
Use Password Management software - a tool such as Keepass, or KeepassX for Linux and Mac, allows users to easily generate, store and mange complex difficult to crack passwords. Refer to this guide for details on [https://securityinabox.org/en/keepass_main| Keepass]
+
Use Password Management software - a tool such as Keepass, or KeepassX for Linux and Mac, allows users to easily generate, store and mange complex difficult to crack passwords. Refer to this guide for details on [https://securityinabox.org/en/keepass_main Keepass]
 
</li>
 
</li>
 
</ol>
 
</ol>
Line 32: Line 32:
 
</li>
 
</li>
 
<li>
 
<li>
Private keys should be used for SSH login access. The following guide gives details on generating and setting up public/private keys for SSH login, [http://support.suso.com/supki/SSH_Tutorial_for_Linux| SSH tutorial]
+
Private keys should be used for SSH login access. The following guide gives details on generating and setting up public/private keys for SSH login, [http://support.suso.com/supki/SSH_Tutorial_for_Linux SSH tutorial]
 
</li>
 
</li>
 
<li>
 
<li>
File permissions should be restricted for critical files. User should only be allowed access to files relevant to their work. Execution as root should be restricted. Discussion of [http://www.linux.com/learn/tutorials/309527-understanding-linux-file-permissions| linux file permissions].
+
File permissions should be restricted for critical files. User should only be allowed access to files relevant to their work. Execution as root should be restricted. Discussion of [http://www.linux.com/learn/tutorials/309527-understanding-linux-file-permissions linux file permissions].
 
</li>
 
</li>
 
</ol>
 
</ol>
Line 44: Line 44:
 
For shared hosting password managment is a core defence against attack. The administrator password should fit the criteria above for a strong password - long, variance in characters containing no dictionary words.
 
For shared hosting password managment is a core defence against attack. The administrator password should fit the criteria above for a strong password - long, variance in characters containing no dictionary words.
  
As above [https://securityinabox.org/en/keepass_main| Keepass] can be used to generate and store a complex admin password. This has the secondary advantage of limiting access to the admin password to those who are trusted with the Keepass store.
+
As above [https://securityinabox.org/en/keepass_main Keepass] can be used to generate and store a complex admin password. This has the secondary advantage of limiting access to the admin password to those who are trusted with the Keepass store.
 
</li>
 
</li>
 
<li>
 
<li>
 
'''Restrict IP addresses'''
 
'''Restrict IP addresses'''
  
Depending on what version of CPanel your provider offers, it is possible to lock down access via [http://docs.cpanel.net/twiki/bin/view/AllDocumentation/WHMDocs/DenyAccess| Host Access Control] option. This allows you limit access to very specific IP addresses.
+
Depending on what version of CPanel your provider offers, it is possible to lock down access via [http://docs.cpanel.net/twiki/bin/view/AllDocumentation/WHMDocs/DenyAccess Host Access Control] option. This allows you limit access to very specific IP addresses.
 
</li>
 
</li>
 
<li>
 
<li>

Latest revision as of 15:22, 26 May 2014

Dedicated/VPS Hosting

Shared Hosting

Last modified 11 years ago
Cancel

Help improve this page!

Cancel

Keep track of this page and all changes to it.