Access Restrictions

Revision as of 20:45, 15 May 2014 by Bill (Talk | contribs)

Restricting access to data based on roles, rights and responsibilities is an integral part of any security policy. It is equally true in the framing of secure hosting.

In this circumstance, access should be clearly separated into roles at different levels. When hosting a web application a separate password and user should be used for database access by the web application. The web application should never have root access to any other domain. In a similar way, real world users should be divided into roles and categories and non-should be granted full root access.

Dedicated/VPS Hosting

Shared Hosting

Last modified 11 years ago
Cancel

Help improve this page!

Cancel

Keep track of this page and all changes to it.