Difference between revisions of "Choose a hosting provider"

Bill (Talk | contribs)
(Features)
Bill (Talk | contribs)
 
(One intermediate revision by the same user not shown)
Line 7: Line 7:
 
*Reputation - are they well known, have they had security breaches or reports of poor support, do they adhere to certain principles inline with that of your organisation - such as data privacy or protection of human rights defenders.
 
*Reputation - are they well known, have they had security breaches or reports of poor support, do they adhere to certain principles inline with that of your organisation - such as data privacy or protection of human rights defenders.
 
*Specialisation - do they work in the field of human rights, software applications or general hosting
 
*Specialisation - do they work in the field of human rights, software applications or general hosting
*Is mail provided - for many organisation it is not an option to run their own mail server, however, is they do not wish to sue a free service such as [riseup.net Riseup] or [gmail.com gmail], or if they wish to have domain specific email - such as info@mywebsite.org - then it is worth considering services that provide free email accounts.
+
*Is mail provided - for many organisation it is not an option to run their own mail server, however, is they do not wish to sue a free service such as [https://riseup.net Riseup] or [https://gmail.com gmail], or if they wish to have domain specific email - such as info@mywebsite.org - then it is worth considering services that provide free email accounts.
 
*Hardware specifications - does the server fits my needs? For most websites basic servers are enough but websites with high traffic can demand more stable or dedicated hardware.
 
*Hardware specifications - does the server fits my needs? For most websites basic servers are enough but websites with high traffic can demand more stable or dedicated hardware.
 
*Operating systems offered - different operating systems provide different functionality and integration with other applications. They also have different degrees of vulnerability and support.
 
*Operating systems offered - different operating systems provide different functionality and integration with other applications. They also have different degrees of vulnerability and support.
Line 92: Line 92:
 
For more details see [[Access_Restrictions#Dedicated/VPS_HOSTING| see]]
 
For more details see [[Access_Restrictions#Dedicated/VPS_HOSTING| see]]
  
'''System and Software Management'''
+
'''System and Software Management''' is primarily concerned with ensuring that the physical system and its software is setup in the most mangeable, maintainable way and that attention is paid to keeping everything up to date to avoid potential vulnerabilities.
  
 
For more details see [[System_Management| see]]
 
For more details see [[System_Management| see]]
  
'''Webserver Setup'''
+
'''Webserver Setup''' is an important consideration when hosting a website. There are a variety of steps that can be taken to lock down a webserver and to make sure that no vulnerabilities or accidental leaks occur.
  
 
For more details [[Webserver_setup| see]]
 
For more details [[Webserver_setup| see]]
Line 109: Line 109:
 
===Hosted platform===
 
===Hosted platform===
 
For organisation that wish to setup their own custom site based on an existing platform such as Wordpress.com, there are a setup of steps that should be taken to ensure a good level of security. The [[Choosing_A_Host | choosing a hosting provider]] guide should also be consulted.
 
For organisation that wish to setup their own custom site based on an existing platform such as Wordpress.com, there are a setup of steps that should be taken to ensure a good level of security. The [[Choosing_A_Host | choosing a hosting provider]] guide should also be consulted.
 +
 +
'''Benefits'''
 +
* Hardware is managed and maintained by the hosting provider
 +
* There is no need to build custom software
 +
* Using an install of an existing platform, such as Wordpress.com, means that software patching and bug fixing is handled by a dedicated group 
 +
* Once the solution is setup, secured and configured management is minimal
 +
* The software platform will provide support for the core functionalities of managing a website such as user creation, content uploading and provide mechanisms for exporting/backup
 +
 +
'''Downsides'''
 +
* The provider must be carefully chosen based on the information in this [https://pad.riseup.net/p/rh_ispq document]
 +
* Software updates must be performed by the organisation
 +
* Backup is the organisations responsibility
 +
* No support is provided for configuring or managing the platform
  
 
'''Platform Security'''
 
'''Platform Security'''
Line 114: Line 127:
 
<li>
 
<li>
 
Limiting access - Making smart choices that reduce possible entry points available to a malicious person.
 
Limiting access - Making smart choices that reduce possible entry points available to a malicious person.
 +
 +
For more details see [[Access_Restrictions#Dedicated/VPS_HOSTING| see]]
 
</li>
 
</li>
 
<li>Containment - Your system should be configured to minimize the amount of damage that can be done in the event that it is compromised.
 
<li>Containment - Your system should be configured to minimize the amount of damage that can be done in the event that it is compromised.
Line 120: Line 135:
 
</li>
 
</li>
 
<li>
 
<li>
Passwords
+
Password management - the core component of any digital security strategy is control and management of passwords.
 +
 
 +
For more details [[Access_Restrictions#Dedicated/VPS_Hosting| see]]
 
</li>
 
</li>
 
<li>
 
<li>
File Permissions
+
Software updates and system control - allows the user to lock down the system and restrict what applications are running.
</li>
+
 
<li>
+
For more details see [[System_Management| see]]
Admin user
+
</li>
+
<li>
+
SSL
+
</li>
+
<li>
+
SFTP client
+
</li>
+
<li>
+
Platform updates
+
 
</li>
 
</li>
 
</ol>
 
</ol>
Hosting install of pre-built software platform, such as Wordpress,
 
  
 
===Shared Hosting===
 
===Shared Hosting===
Line 147: Line 153:
 
* http://www.dreamhost.com/web-hosting/
 
* http://www.dreamhost.com/web-hosting/
 
* http://wpengine.com/ (wordpress only)
 
* http://wpengine.com/ (wordpress only)
 +
 +
'''Benefits'''
 +
* Host provided support for software and hardware
 +
* Reduced technical needs for organisation
 +
* Standardised software components
 +
 +
'''Downsides'''
 +
* Heavily relies on the hosting providers technical and support abilities
 +
* Danger that compromise to another unrelated site could compromise user's site.
 +
* Your security is tied to that of others using the same system
 +
* Limited or no control over security procedures - relies heavily on abilities of hosting provider
  
 
===Threat Mitigation===
 
===Threat Mitigation===
Line 158: Line 175:
 
For a basic setup providing a content distribution platform such as a blog users have the option of using existing free services such as Wordpress, Journoportfolio or similar.
 
For a basic setup providing a content distribution platform such as a blog users have the option of using existing free services such as Wordpress, Journoportfolio or similar.
  
 +
'''Examples:'''
 +
* [http://wordpress.com/ Wordpress]
 +
* [https://www.tumblr.com/ Tumblr]
 +
* [https://www.journoportfolio.com/ Journo Portfolio]
 +
* [http://www.joomla.org/ Joomla]
 +
 +
'''Benefits'''
 +
* Host provided support for software and hardware
 +
* Very low technical needs for organisation
 +
* Easy setup and quick start
 +
 +
'''Downsides'''
 +
* Heavily relies on the hosting providers technical and support abilities
 +
* No control over system software or hardware
 +
* Limited security options
  
 
===Threat Mitigation===
 
===Threat Mitigation===

Latest revision as of 19:06, 28 May 2014

Secure hosting setups

Last modified 11 years ago
Cancel

Help improve this page!

Cancel

Keep track of this page and all changes to it.