Difference between revisions of "Choose a hosting provider"

(High Technical)
Line 130: Line 130:
 
<ol>
 
<ol>
 
<li>
 
<li>
Firewall, iptables
+
Firewall can be enabled via [http://www.netfilter.org/projects/iptables/| iptables] the guides [http://www.tecmint.com/basic-guide-on-iptables-linux-firewall-tips-commands/| here] and [http://www.cyberciti.biz/faq/category/iptables/| here] describe iptables configuration.
 
</li>
 
</li>
 
<li>
 
<li>
Check listening ports
+
To protect the server it is important to audit the open ports on the machine. To check listening ports you can run
 +
 
 +
netstat -tulpn
 +
 
 +
 
 
</li>
 
</li>
 
<li>
 
<li>
Line 142: Line 146:
 
</li>
 
</li>
 
<li>
 
<li>
SELinux
+
[http://selinuxproject.org/page/Main_Page| Security Enhanced Linux(SELinux)] is a kernel level security control mechanism, which enforces a set of rules and procedures for the system. SELinux provides fine grained control for access rights and permissions.
 +
 
 +
To check if it is enabled run
 +
 
 +
sestatus
 +
 
 +
To enable run
 +
 
 +
setenforce enforcing
 +
 
 +
To adjust the SELinux config is available at
 +
 
 +
/etc/selinux/config
 
</li>
 
</li>
 
<li>
 
<li>
fail2ban
+
[http://www.fail2ban.org/wiki/index.php/Main_Page| Fail2ban] is an excellent tool that can be used both to combat simple DDoS attacks but also to detect and block brute force login attempts.
 
</li>
 
</li>
 
</ol>
 
</ol>

Revision as of 18:08, 25 May 2014

Criteria

There are several aspects which should be considered when selecting a service host. Below is a general list, this document gives detailed information on each area.

  • Price - relative services offered
  • Reputation - are they well known, have they had security breaches or reports of poor support, do they adhere to certain principles inline with that of your organisation - such as data privacy or protection of human rights defenders.
  • Specialisation - do they work in the field of human rights, software applications or general hosting
  • Is mail provided
  • Hardware specifications
  • Operating systems offered
  • Supported provided
  • Readily discusses your security concerns and which security features and processes they offer with their hosting.
  • Provides the most recent stable versions of all server software.
  • Provides reliable methods for backup and recovery.
  • Provides encryption options for hosting of sites or mail

Features

It is quite important to consider the possibilities offered by your provider's control panel. If you need to write a support ticket everytime the server has to reboot, it wont be an efficient process, especially during a crises. Possible features to look out for include

  • Automated operating system installs
  • Server boot and reboot
  • Remote console (sometimes known as KVM)
  • Server and network statistics
  • Dynamic components (e.g. adding extra disk space, RAM without rebuilding the machine or having to order a new service)
  • Server access (varies between SSH, SFTP or web based)

Secure hosting setups

Depending on available skill level the following secure system setups are possible:

 [Expand

High Technical

 [Expand

Intermediary Technical

 [Expand

Basic Technical

 [Expand

Comparison Matrix


Back to front page