Actions

Category

Difference between revisions of "Security Checklist"

From Joomla! Documentation

m (cat info template)
 
(12 intermediate revisions by 5 users not shown)
Line 1: Line 1:
'''Welcome to the Joomla! Administrators Security Checklist.'''
+
{{cat info|'''Welcome to the Joomla! Administrators Security Checklist.'''
  
: Security is a vast and fast-moving subject. No one document can cover it all. This checklist is designed to help you with only two things.
+
: Internet security is a vast and fast-moving topic. No one set of rules can cover all possible situations. These checklists will point you in the right direction. At a minimum they will do two things:
  
# Alert you to important security issues
+
# Inform you of typical security issues
# Point you in the right direction to learn more
+
# Point you in the right direction for more information
  
: Not all security techniques are appropriate for both versions of Joomla. Where a technique applies to only one version, an image is added. For example:
+
Please also take a look at the list of [[Vulnerable Extensions List|Vulnerable Extensions]].}}
  
:'''Joomla! 1.0.x Example'''
+
[[Category:FAQ]]
 
+
[[Category:Security_FAQ]]
: [[Image:Compat_10.png]] Set Joomla! Register Globals Emulation OFF.
+
 
+
:'''Joomla! 1.5.x Example'''
+
 
+
: [[Image:Compat_15.png]] To take full advantage of new security features, ensure that all third party extensions are Joomla! 1.5 native.
+
 
+
: Download extensions from trusted sites, and compare the file's MD5 hash to detect download errors. This suggestions applies to both versions, so no compatibility image is used.
+

Latest revision as of 21:46, 25 September 2012

Welcome to the Joomla! Administrators Security Checklist.

Internet security is a vast and fast-moving topic. No one set of rules can cover all possible situations. These checklists will point you in the right direction. At a minimum they will do two things:
  1. Inform you of typical security issues
  2. Point you in the right direction for more information

Please also take a look at the list of Vulnerable Extensions.