• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here: Home » Secure Cloud Hosting : Tips for Websites

By Abhishek Ghosh September 12, 2014 8:07 pm Updated on September 12, 2014

Secure Cloud Hosting : Tips for Websites

Advertisement

Some readers are complaining that we are only writing on SSL stuffs! Cloud and Photography is becoming faint! Not really, actually we are also busy in the process of front end optimization. Here is a handy checklist to ensure secure cloud hosting on Public Cloud for the websites. Security on cloud means divided responsibilities. Six Steps for Cloud Security is our personal favorite article. When we are talking about a Website on Cloud, more points should be considered. The hosting security is guaranteed if you have the foresight to adopt some strategies to manage the account and the whole Web site. Nowadays, even the Shared Hosting providers use OpenStack based platform. They can be well performer than before, but must carry more risk.

 

Secure Cloud Hosting : Tips for Websites

 

For the most users, relying on a provider for a shared hosting service is synonymous with disregard for a secure hosting, because you are convinced that such an element and configurations appropriate to ensure the safety of the account and are a burden on the provider.

The activates of a shared hosting does not care too much about what might happen to the site and the files stored online if it becomes the victim of a hacker’s attack. If the hypothesis of an attack become real, you are likely to find yourself with a nasty surprise and proceeds to the provider asking for helps that sometimes returns quite odd responses.

Advertisement

---

If it is true that the most of the incumbency regard to safety is the responsibility of the hosting provider, it is also true that the users can still seriously jeopardize the integrity of the service with some misconfigurations and risky behavior, thus transforming their account to a security breach capable of jeopardizing the whole activity of the other users of the server and hosting to the fullest. Preventing this from happening is the job of the security team of the hosting provider. In short, the security issue is therefore a responsibility which is jointly held by the provider and the user.

In fact, the hosting security is guaranteed if, together with the work of the provider, the user follows some basic rules, easy to apply and simple to understand. Thus, there are some things that you can put in place to avoid becoming a victim of cyber attacks unleashed by hackers of the Net.

Secure-Cloud-Hosting-Tips-for-Websites

 

First Step to Secure Cloud Hosting Tips for Websites is To Diversify Password

 

Many people have the bad habit of associating the same password on different aspects of the management of a hosting, such as FTP access, SSH access, access to control panel, access to the configuration of email, access the management of the database, access to the backend of the CMS and so on. The first rule to be applied is very simple – diversify password. For each type of access associated with your hosting, whatever it is, it is helpful to set up a unique password, which is dedicated to a single service. In this way, if a hacker manages to steal an access key, he/she is prevented from moving freely between different accounts of different services, thus improving the security. Passwords must be longer and complex enough to avoid easy detection and none of the files stored on the hosting must contain these passwords, especially those have administrative panels like cPanel.

 

apt-get update && rm -r not-useful*

 

Always discard everything that is no longer useful. Sometimes, this is the most difficult advice to follow, because by the time we forget the file abandoned which is no longer in use. For this reason, it is important to carry out a periodic inspection on the files unnecessary to operate the site and remove them. The same applies to the unused scripts, which are often the target of hackers to get access to the control account. The maintenance and cleaning of the site must also go through the deactivation of all accounts ( email , FTP, etc.) which are still active, but that are no longer used by anyone, as they may be forced and used by unauthorized persons.

Whatever the applications are integrated into the website (CMS, chat, forums, etc.), you must always be sure that these are installed at the latest version, updated especially with regard to safety aspects. We must avoid waiting for automated update prompts i.e. by checking the availability of new security patches and updates directly from the official sources.

/root can be a dangerous place with executable scripts. Public directories must not have any executables. File ownership of Public directory must be enough tight. No compromise should be done to bargain security with ease – we should not chown ownership to only www-data or chmod to 777 the core files like /etc/nginx/sites-available/default in Nginx, just because W3 Total Cache in WordPress needs it to be writable. Changes must be done manually. With default settings, Nginx and WordPress has enough good ownerships and permissions. Some not useful files of a web software like WordPress, like the HTML file must be deleted. Forms, better to avoid except on special pages. Can you see any form on this webpage except the search field? No. That Google search form can not do a SQL injection. It is possibly a bad idea to have a self hosted form particularly on WordPress with any cache plugin.

Webmin, PHPMyAdmin must not be on the same server.

 

Give Attention To CMS, CDN and Code (C3)

 

Any CMS such as WordPress, Joomla, Drupal, Magento, Prestashop are very popular for the ease, which enable anyone to manage any complex website. This popularity, on the other hand, is also their disadvantage. In fact, these platforms are often a favorite target for the hackers that are facilitated in the attacks, because the majority of installations allows to reach in an easy interface for access to the administrative backend and also because the prefix of the tables used in the database are always the standard ones.

In addition, many CMS expose the themes and plugins used by the user and these, together with the standardization that CMS aim to make life easier for the users, becomes an instrument for facilitating the intrusion of the hacker. Script Kiddies, novice hackers can practice on a Live website. When working with CMS, therefore, must follow some precautions to guarantee the secure hosting.

Scripts, in general and Java applications enable the developers to create custom functions and thus make the Web much more interactive. Thus, it is not advisable to use the script, as it is important to monitor them and keep them under control, always make sure they work in accordance with originally they do. Sometimes you just need to make sure that they are updated and protected from hacker attacks.

This Article Has Been Shared 620 Times!

Facebook Twitter Pinterest

Abhishek Ghosh

About Abhishek Ghosh

Abhishek Ghosh is a Businessman, Surgeon, Author and Blogger. You can keep touch with him on Twitter - @AbhishekCTRL.

Here’s what we’ve got for you which might like :

Articles Related to Secure Cloud Hosting : Tips for Websites

  • WordPress 3.6 on Rackspace Cloud Sites and W3 Total Cache 0.9.3 Plugin

    WordPress 3.6 on Rackspace Cloud Sites and W3 Total Cache 0.9.3 Plugin with perfect configuration demands quite good idea on many aspects,here are some for you.

  • Business Intelligence Software in Healthcare

    Increased desire for more and better information by different industries resulted in increased sales of BI software solutions including Healthcare.

  • Photo Gallery Hosting : Free or Nearly Free Practical Options

    Photo gallery hosting can be Free or nearly Free with various Cloud based and Free Softwares. It is possible to run a website that has your photos with no cost.

  • Cloud Computing and Actions Against Hackers

    Cloud Computing IT executives at least theoretically now know about “distributed denial of service” attacks. Sales and destruction of brand image annoys the users.

  • OpenShift Node.js Tutorial with Video

    OpenShift Node.js Tutorial with Video is an excellent guide for anyone! You can create your own instance of Node.js Application within few minutes.

Additionally, performing a search on this website can help you. Also, we have YouTube Videos.

Take The Conversation Further ...

We'd love to know your thoughts on this article.
Meet the Author over on Twitter to join the conversation right now!

If you want to Advertise on our Article or want a Sponsored Article, you are invited to Contact us.

Contact Us

Subscribe To Our Free Newsletter

Get new posts by email:

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (24.3K Followers)
  • Twitter (5.8k Followers)
  • Facebook (5.7k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.3k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • What is Voice User Interface (VUI) January 31, 2023
  • Proxy Server: Design Pattern in Programming January 30, 2023
  • Cyberpunk Aesthetics: What’s in it Special January 27, 2023
  • How to Do Electrical Layout Plan for Adding Smart Switches January 26, 2023
  • What is a Data Mesh? January 25, 2023

About This Article

Cite this article as: Abhishek Ghosh, "Secure Cloud Hosting : Tips for Websites," in The Customize Windows, September 12, 2014, February 1, 2023, https://thecustomizewindows.com/2014/09/secure-cloud-hosting-tips-for-websites/.

Source:The Customize Windows, JiMA.in

PC users can consult Corrine Chorney for Security.

Want to know more about us? Read Notability and Mentions & Our Setup.

Copyright © 2023 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie SettingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT