• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here: Home » Secure Cloud Hosting : Tips for Websites

By Abhishek Ghosh September 12, 2014 8:07 pm Updated on September 12, 2014

Secure Cloud Hosting : Tips for Websites

Advertisement

Some readers are complaining that we are only writing on SSL stuffs! Cloud and Photography is becoming faint! Not really, actually we are also busy in the process of front end optimization. Here is a handy checklist to ensure secure cloud hosting on Public Cloud for the websites. Security on cloud means divided responsibilities. Six Steps for Cloud Security is our personal favorite article. When we are talking about a Website on Cloud, more points should be considered. The hosting security is guaranteed if you have the foresight to adopt some strategies to manage the account and the whole Web site. Nowadays, even the Shared Hosting providers use OpenStack based platform. They can be well performer than before, but must carry more risk.

 

Secure Cloud Hosting : Tips for Websites

 

For the most users, relying on a provider for a shared hosting service is synonymous with disregard for a secure hosting, because you are convinced that such an element and configurations appropriate to ensure the safety of the account and are a burden on the provider.

The activates of a shared hosting does not care too much about what might happen to the site and the files stored online if it becomes the victim of a hacker’s attack. If the hypothesis of an attack become real, you are likely to find yourself with a nasty surprise and proceeds to the provider asking for helps that sometimes returns quite odd responses.

Advertisement

---

If it is true that the most of the incumbency regard to safety is the responsibility of the hosting provider, it is also true that the users can still seriously jeopardize the integrity of the service with some misconfigurations and risky behavior, thus transforming their account to a security breach capable of jeopardizing the whole activity of the other users of the server and hosting to the fullest. Preventing this from happening is the job of the security team of the hosting provider. In short, the security issue is therefore a responsibility which is jointly held by the provider and the user.

In fact, the hosting security is guaranteed if, together with the work of the provider, the user follows some basic rules, easy to apply and simple to understand. Thus, there are some things that you can put in place to avoid becoming a victim of cyber attacks unleashed by hackers of the Net.

Secure-Cloud-Hosting-Tips-for-Websites

 

First Step to Secure Cloud Hosting Tips for Websites is To Diversify Password

 

Many people have the bad habit of associating the same password on different aspects of the management of a hosting, such as FTP access, SSH access, access to control panel, access to the configuration of email, access the management of the database, access to the backend of the CMS and so on. The first rule to be applied is very simple – diversify password. For each type of access associated with your hosting, whatever it is, it is helpful to set up a unique password, which is dedicated to a single service. In this way, if a hacker manages to steal an access key, he/she is prevented from moving freely between different accounts of different services, thus improving the security. Passwords must be longer and complex enough to avoid easy detection and none of the files stored on the hosting must contain these passwords, especially those have administrative panels like cPanel.

 

apt-get update && rm -r not-useful*

 

Always discard everything that is no longer useful. Sometimes, this is the most difficult advice to follow, because by the time we forget the file abandoned which is no longer in use. For this reason, it is important to carry out a periodic inspection on the files unnecessary to operate the site and remove them. The same applies to the unused scripts, which are often the target of hackers to get access to the control account. The maintenance and cleaning of the site must also go through the deactivation of all accounts ( email , FTP, etc.) which are still active, but that are no longer used by anyone, as they may be forced and used by unauthorized persons.

Whatever the applications are integrated into the website (CMS, chat, forums, etc.), you must always be sure that these are installed at the latest version, updated especially with regard to safety aspects. We must avoid waiting for automated update prompts i.e. by checking the availability of new security patches and updates directly from the official sources.

/root can be a dangerous place with executable scripts. Public directories must not have any executables. File ownership of Public directory must be enough tight. No compromise should be done to bargain security with ease – we should not chown ownership to only www-data or chmod to 777 the core files like /etc/nginx/sites-available/default in Nginx, just because W3 Total Cache in WordPress needs it to be writable. Changes must be done manually. With default settings, Nginx and WordPress has enough good ownerships and permissions. Some not useful files of a web software like WordPress, like the HTML file must be deleted. Forms, better to avoid except on special pages. Can you see any form on this webpage except the search field? No. That Google search form can not do a SQL injection. It is possibly a bad idea to have a self hosted form particularly on WordPress with any cache plugin.

Webmin, PHPMyAdmin must not be on the same server.

 

Give Attention To CMS, CDN and Code (C3)

 

Any CMS such as WordPress, Joomla, Drupal, Magento, Prestashop are very popular for the ease, which enable anyone to manage any complex website. This popularity, on the other hand, is also their disadvantage. In fact, these platforms are often a favorite target for the hackers that are facilitated in the attacks, because the majority of installations allows to reach in an easy interface for access to the administrative backend and also because the prefix of the tables used in the database are always the standard ones.

In addition, many CMS expose the themes and plugins used by the user and these, together with the standardization that CMS aim to make life easier for the users, becomes an instrument for facilitating the intrusion of the hacker. Script Kiddies, novice hackers can practice on a Live website. When working with CMS, therefore, must follow some precautions to guarantee the secure hosting.

Scripts, in general and Java applications enable the developers to create custom functions and thus make the Web much more interactive. Thus, it is not advisable to use the script, as it is important to monitor them and keep them under control, always make sure they work in accordance with originally they do. Sometimes you just need to make sure that they are updated and protected from hacker attacks.

This Article Has Been Shared 851 Times!

Facebook Twitter Pinterest
Abhishek Ghosh

About Abhishek Ghosh

Abhishek Ghosh is a Businessman, Orthopaedic Surgeon, Author and Blogger. You can keep touch with him on Twitter - @AbhishekCTRL.

Here’s what we’ve got for you which might like :

Articles Related to Secure Cloud Hosting : Tips for Websites

  • WordPress 3.6 on Rackspace Cloud Sites and W3 Total Cache 0.9.3 Plugin

    WordPress 3.6 on Rackspace Cloud Sites and W3 Total Cache 0.9.3 Plugin with perfect configuration demands quite good idea on many aspects,here are some for you.

  • Business Intelligence Software in Healthcare

    Increased desire for more and better information by different industries resulted in increased sales of BI software solutions including Healthcare.

  • Photo Gallery Hosting : Free or Nearly Free Practical Options

    Photo gallery hosting can be Free or nearly Free with various Cloud based and Free Softwares. It is possible to run a website that has your photos with no cost.

  • Cloud Computing and Actions Against Hackers

    Cloud Computing IT executives at least theoretically now know about “distributed denial of service” attacks. Sales and destruction of brand image annoys the users.

  • OpenShift Node.js Tutorial with Video

    OpenShift Node.js Tutorial with Video is an excellent guide for anyone! You can create your own instance of Node.js Application within few minutes.

Additionally, performing a search on this website can help you. Also, we have YouTube Videos.

Take The Conversation Further ...

We'd love to know your thoughts on this article.
Meet the Author over on Twitter to join the conversation right now!

If you want to Advertise on our Article or want a Sponsored Article, you are invited to Contact us.

Contact Us

Subscribe To Our Free Newsletter

You can subscribe to our Free Once a Day, Regular Newsletter by clicking the subscribe button below.

Click To Subscribe

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (20K Followers)
  • Twitter (4.9k Followers)
  • Facebook (5.8k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.2k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • Arduino : Independently Blink Multiple LED January 18, 2021
  • What is a Loosely Coupled System? January 17, 2021
  • How To Repack Installed Software on Debian/Ubuntu January 16, 2021
  • Components of Agile Software Development January 15, 2021
  • What is Conway’s Law? January 14, 2021

 

About This Article

Cite this article as: Abhishek Ghosh, "Secure Cloud Hosting : Tips for Websites," in The Customize Windows, September 12, 2014, January 18, 2021, https://thecustomizewindows.com/2014/09/secure-cloud-hosting-tips-for-websites/.

Source:The Customize Windows, JiMA.in

 

This website uses cookies. If you do not want to allow us to use cookies and/or non-personalized Ads, kindly clear browser cookies after closing this webpage.

Read Cookie Policy.

PC users can consult Corrine Chorney for Security.

Want to know more about us? Read Notability and Mentions & Our Setup.

Copyright © 2021 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy