Security - Before you go live

From Joomla! Documentation

Revision as of 03:23, 18 August 2010 by Mandville (Talk | contribs)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Documentation all together tranparent small.png
Under Construction

This article or section is in the process of an expansion or major restructuring. You are welcome to assist in its construction by editing it as well. If this article or section has not been edited in several days, please remove this template.
This article was last edited by Mandville (talk| contribs) 4 years ago. (Purge)

== Security FAQ - before you go live


This security list has been compiled from several sources, some of these sources are linked at the bottom of this article, as such you may find duplicate suggestions. DON'T skip anything because of this!

This list for the main part does not provide instructions it is only a list for you to check off each item as you perform the tasks.

I Know this list will generate MANY questions, so please post to the forum:

1) Change username "admin" to anything else in Joomla, PhpBB, and anywhere else it used.

2) Change database tables prefix from "jos_" to anything else.

3) Change username or add password to username "root" in PhpMyAdmin. Default is NO password! This is not usually an issue on remote servers however if you have a local server it may be.

4) It does not matter if your host does backups. Do it yourself too, and store them anywhere else other than the server.

5) Backup up often! You would be amazed at how many sites NEVER perform regular backups.

6) Did I mention to BACKUP your site?

7) Remove unused templates, extensions and unneeded files from your site. This includes compressed archives.

8) Check Vulnerable Extensions List (VEL)

9) Check regularly for updates for Joomla, PHP, SQL and EVERY extension you use.

10) Avoid encrypted code in extensions.

11) Use some form of intrusion detection either through a cron job or an extension (like Eyesite).

12) Check your log files OFTEN for unusual activity.

13) Test your site for weaknesses or hire someone to perform this for you. Make sure you tell your host first what you are doing or you may get your site removed from the server!!!

14) Ask your server if they offer PHPsuExec, php_suexec or suPHP

15) Use php.ini files if your server allows. With this you can disable functions that are not needed or dangerous

16) Register_Globals = 0 (off) Many servers deafult this to ON.

17) allow_url_fopen = 0 (off)

18) expose_php = 0 (off)

19) safe_mode = 0 (off)

20) Use .htaccess to add extra protection to your administrator directory or use an extension (like kSecure)

21) Move configuration.php outside of your public directory.

22) Get an SSL certificate for financial transactions and other sensitive data exchange.

23) Use open_basedir , it limits which files/folders can be opened.

24) Change the paths (directories) where your log, temp (tmp) files are stored. Don't just move them, you have to change the setting in Global Config as well. You also have to ensure your new paths fall under the scope of open_basedir

25) If your administrator password is changed by hackers (or you forget it) follow this procedure to restore it:

7 Great tips from Marco Folio (Some with instructions):

How to prevent an SQL injection by Marco Folio:

Joomla Security Primer by Tom Canavan: Security Checklist Wiki: Vulnerable Extensions List:

Ripose 07:31, 17 August 2010 (UTC)