Changes

Secure hosting guide

359 bytes added, 9 years ago
/* Useful References */
__NOTOC__
 
This document is the result of a collaborative project between [http://www.huridocs.org/ Huridocs] and [https://equalit.ie eQualit.ie].
 
==Useful References==
* [https://github.com/OpenInternet/MyWebsiteIsDown/blob/master/MyWebsiteIsDown.md What to do when your website goes down]
* [http://en.flossmanuals.net/wordpress/ Building a Wordpress site] and then [http://moz.com/blog/the-definitive-guide-to-wordpress-security Guide to secure Wordpress set-up]* The Engine Room's [[Responsible Data Forum on Hosting]]* [http://en.flossmanuals.net/video-hosting-guide-t/index/ Independent video hosting]
=Introduction=
 Hosting a website that can withstand various malicious attacks and unauthorised access attempts is not an easy task. There are several approaches to mitigating digital threats and reducing your site's vulnerabilities. There is no one-fits-all solution however and the site's owners or administrators should plan for various contingencies well in advance, in lieu of their financial situation and technical expertise. This guide attempts to describe several scenarios and various approaches for secure hosting.
==Step 1: Decide on your level of technical expertise==
*'''Basic Technical''' - no experience with server management. Can use software management interfaces such as CPanel
*'''CompulsoryRequired''' - basic knowledge about Internet infrastructure and addressing is required should you want to maintain anything on the Internet (Facebook, twitter, other social networks exempted) that is bound to last the test of time. Please read through [httphttps://learn.equalit.ie/esecmanwiki/appendix_b.html Appendix B - Internet explainedHow_does_the_Internet_actually_work%3F HOW DOES THE INTERNET ACTUALLY WORK?] to get the basics and go on from there . You need to know a little bit about architecture before building your house.
==Step1: What are you planning to host?==
*[[Website]] - standalone website, blog, forum
*[[Internet Server]] - mail server, VPN, proxy, VoIP server
*[[Web_application | Web Application]] - custom database, in-browser application
==Step 2: What are your hosting options==
*[[Choose a hosting provider]]
*[[Choose a DNS providername registrar]]*[[Data location Geography, lesgislation and terms of service]]
==Step 3: Plan for contingency and threat mitigation==
For each form of system use relevant threats and strategies to mitigate them are include. These approaches are ordered in terms of technical ability requirements. The following topics are relevant to all setups:
*[[System_Management|System Management]]*[[ Data_Backup | Data backup and recovery]]*[[Password_Management | Password managementAccess Restrictions]]*[[Data_Encryption | Data Encryption]]*[[Secure_Communications | Monitoring]]*[[Webserver setup]]*[[Secure communicationsconnections]]*[[Brute_Force_DDOS | Brute force and Denial of Service and Brute Force attacks]]
Bureaucrat, emailconfirmed, administrator, translator
662
edits