In a previous post, we highlighted some crucial security measures you should adopt to keep your dedicated server safe. What follows are five more tips that are of equal or even greater importance.
1. Restrict root – Root, the administrator or super user has full control of your server. Ideally, only one person should be able to elevate their user permissions to root level. You can restrict who is able to use either the su or sudo command to become root, and you should.
2. Separate production from R&D – Production applications should be on one server, and research and development should be on another. At the very least, you should keep R&D on its own separate virtual machine. It would be a shame for something experimental to be the cause of a security exploit on your server.
3. Take advantage of security features – Many applications have security features built into them. For example, some Apache modules are included specifically for security purposes.
4. Tighten web applications – Make sure the code in your web applications is updated and tightly secured. You can also use web applications security tools such as ModSecurity.
5. Monitor and audit – Even if you plan perfectly, some things may slip by you. If you monitor carefully, you can catch those slip ups before they can cause damage. Routine audits can also help reveal vulnerabilities.