Difference between revisions of "Security FAQ"

From Joomla! Documentation

(Added verify that backups work. Punctuation and spelling corrections. Added list numbering.)
m (→‎More Tips: updating links)
Line 44: Line 44:
  
 
Joomla.org Security Checklist Wiki:
 
Joomla.org Security Checklist Wiki:
http://docs.joomla.org/Category:Security_Checklist
+
[[:Category:Security Checklist|Security Checklist]]
  
 
Joomla.org Vulnerable Extensions List:
 
Joomla.org Vulnerable Extensions List:
http://docs.joomla.org/Vulnerable_Extensions_List
+
[http://vel.joomla.org Vulnerable Extensions List]

Revision as of 14:19, 15 January 2014

This security list has been compiled from several sources. Some of these sources are linked at the bottom of this article. As such you may find duplicate suggestions. DON'T skip anything because of this!

This list for the main part does not provide instructions. It is only a list for you to check off each item as you perform the tasks.

I know this list will generate MANY questions; please post to the joomla.org forum: http://forum.joomla.org/viewforum.php?f=432&sid=81c2aa9b5a4a88574ae79a6b176111cc

Security Checklist[edit]

  1. Change username "admin" to anything else in Joomla, PhpBB, and anywhere else it used.
  2. Change database tables prefix from "jos_" to anything else.
  3. Change username or add password to username "root" in PhpMyAdmin. Default is NO password! This is not usually an issue on remote servers however if you have a local server it may be.
  4. It does not matter if your host does backups. Do it yourself too, and store them anywhere else other than the server.
  5. Backup up often! You would be amazed at how many site owners never perform regular backups. Don't be one of those persons.
  6. Test your backup. Verify that your backup procedure works.
  7. Remove unused templates, extensions and unneeded files from your site. This includes compressed archives.
  8. Check joomla.org Vulnerable Extensions List (VEL)
  9. Check regularly for updates for Joomla, PHP, SQL and EVERY extension you use.
  10. Avoid encrypted code in extensions.
  11. Use some form of intrusion detection either through a cron job or an extension (like Eyesite).
  12. Check your log files OFTEN for unusual activity.
  13. Test your site for weaknesses or hire someone to perform this for you. Make sure you tell your host first what you are doing or you may get your site removed from the server!!!
  14. Ask your server if they offer PHPsuExec, php_suexec or suPHP.
  15. Use php.ini files if your server allows. With this you can disable functions that are not needed or dangerous.
  16. Register_Globals = 0 (off) Many servers default this to ON.
  17. allow_url_fopen = 0 (off)
  18. expose_php = 0 (off)
  19. safe_mode = 0 (off)
  20. Use .htaccess to add extra protection to your administrator directory or use an extension (like kSecure).
  21. Move configuration.php outside of your public directory.
  22. Get an SSL certificate for financial transactions and other sensitive data exchange.
  23. Use open_basedir. It limits which files/folders can be opened.
  24. Change the paths (directories) where your log, temp (tmp) files are stored. Don't just move them, you have to change the setting in Global Config as well. You also have to ensure your new paths fall under the scope of open_basedir.
  25. If your administrator password is changed by hackers (or you forget it) follow this procedure to restore it: http://docs.joomla.org/How_do_you_recover_your_admin_password%3F

More Tips[edit]

7 Great Tips from Marco Folio (Some with instructions): http://www.marcofolio.net/joomla/7_tips_to_optimize_joomla_security.html

How to prevent an SQL injection by Marco Folio: http://www.marcofolio.net/features/how_you_can_prevent_an_sql_injection.html

Joomla Security Primer by Tom Canavan: http://www.howtojoomla.net/how-tos/security/joomla-security-primer

Joomla.org Security Checklist Wiki: Security Checklist

Joomla.org Vulnerable Extensions List: Vulnerable Extensions List