Difference between revisions of "Security Checklist"

From Joomla! Documentation

m (continuing to improve)
(Corrected a URL.)
 
(23 intermediate revisions by 2 users not shown)
Line 1: Line 1:
<includeonly>
+
<noinclude><languages /></noinclude>
{{Navbox
+
<translate><!--T:11-->
|style  = float:right; width:200px; margin-left: 10px;
+
Internet security is a vast and fast-moving topic. No one set of rules can cover all the possible situations.<br />
|name      = Joomla! Security
+
The articles below will point you in the right direction. At a minimum they will do two things:
|state      = off
+
#Inform you of typical security issues
|navbar    = off
+
#Point you in the right direction for more information</translate>
|title      = Security Checklist {{JVer|CMS}}
+
{{tip|<translate><!--T:1-->
|titlestyle = font-weight:bold; font-size:1.10em;
+
See also the [[S:MyLanguage/Security|Joomla! Security]] and the list of [https://extensions.joomla.org/vulnerable-extensions/about/ Vulnerable Extensions].</translate>|title=<translate><!--T:2-->
|above      = __TOC__
+
For more articles and information:</translate>}}  
|abovestyle = width:200px; background-color:darkgray;
+
<div class="large-6 column">
|list1      = {{Navbox|child
+
{{section portal heading|icon=check-square|title=<translate><!--T:3-->
|style      = width:99%; max-width:220px;
+
Security Checklist Articles</translate>}}{{:Security_Checklist/contents/<translate><!--T:4-->
|name      = Joomla! Help Screen child
+
en</translate>}}
|state      = off
+
</div>
|navbar    = off
+
<div class="large-6 column">{{section portal heading|icon=book|title=<translate><!--T:5-->
|title     = ''Articles in this series''
+
Recommended Reading</translate>}}
|titlestyle = font-weight:bold; font-size:.90em; width:99%;
+
<translate><!--T:8-->
|list1    =
+
*[[S:MyLanguage/How do UNIX file permissions work?|How do UNIX file permissions work?]]
*[[Security Checklist/Getting Started|Getting Started]]  
+
*[[S:MyLanguage/How do Windows file permissions work?|How do Windows file permissions work?]]
*[[Security Checklist/Hosting and Server Setup|Hosting and Server Setup]]
+
*[[S:MyLanguage/How do phpSuExec file permissions work?|How do phpSuExec file permissions work?]]
*[[Security Checklist/Testing and Development|Testing and Development]]
+
*[[S:MyLanguage/Magic quotes and security|Magic quotes and security]]
*[[Security Checklist/Joomla! Setup|Joomla Setup]]
+
*[[S:MyLanguage/Securing Joomla extensions|Securing Joomla extensions]]</translate>
*[[Security Checklist/Site Administration|Site Administration]]
+
{{tip|<translate><!--T:9-->
*[[Security Checklist/Site Recovery|Site Recovery]]
+
See also the [[S:MyLanguage/Category:Security_Checklist|Category for the Security Checklist]].</translate>|title=<translate><!--T:10-->
*[[Security Checklist/You have been hacked or defaced|You have been hacked or defaced]]
+
For more articles and information:</translate>}}
|list1style  = background-color: cornsilk; padding:2px; font-size:.92em; text-align:left; width:100%;
+
</div>
}}
+
 
}}</includeonly>
 
 
<noinclude>
 
<noinclude>
Internet security is a vast and fast-moving topic. No one set of rules can cover all possible situations. These checklists will point you in the right direction. At a minimum they will do two things:
+
<translate>
 
+
<!--T:7-->
# Inform you of typical security issues
 
# Point you in the right direction for more information
 
 
 
 
 
{{Navbox
 
|state=off
 
|navbar=off
 
|title={{#if:{{{1|}}}|{{{1|}}}|'''{{PAGENAME}}''' is a series of Articles on Joomla! Security}}
 
|titlestyle=font-weight:normal; padding:5px;
 
|image=[[File:Joomla vert logo.png|120px]]
 
|group1= Articles in this Series
 
|group1style=font-size:1.1em; width:18%;
 
|list1=
 
*[[Security Checklist/Getting Started|Getting Started]]
 
*[[Security Checklist/Hosting and Server Setup|Hosting and Server Setup]]
 
*[[Security Checklist/Testing and Development|Testing and Development]]
 
*[[Security Checklist/Joomla! Setup|Joomla Setup]]
 
*[[Security Checklist/Site Administration|Site Administration]]
 
*[[Security Checklist/Site Recovery|Site Recovery]]
 
*[[Security Checklist/You have been hacked or defaced|You have been hacked or defaced]]
 
|list2=
 
'''Please also take a look at the list of [[Vulnerable Extensions List|Vulnerable Extensions]]'''.
 
|list1style=padding-left:10px; font-size:1.2em;
 
|list2style=padding:10px; font-size:1.2em;
 
}}
 
 
 
 
[[Category:Security Checklist]]
 
[[Category:Security Checklist]]
 +
[[Category:Security]]
 +
</translate>
 
</noinclude>
 
</noinclude>

Latest revision as of 11:01, 23 August 2022

Other languages:
Bahasa Indonesia • ‎Deutsch • ‎English • ‎Nederlands • ‎eesti • ‎español • ‎français • ‎português • ‎português do Brasil • ‎Ελληνικά • ‎русский • ‎العربية • ‎فارسی • ‎ไทย • ‎中文(台灣)‎ • ‎日本語

Internet security is a vast and fast-moving topic. No one set of rules can cover all the possible situations.
The articles below will point you in the right direction. At a minimum they will do two things:

  1. Inform you of typical security issues
  2. Point you in the right direction for more information
For more articles and information:

See also the Joomla! Security and the list of Vulnerable Extensions.