Difference between revisions of "Further Security Steps"
From WHMCS Documentation
(64 intermediate revisions by 11 users not shown) | |||
Line 1: | Line 1: | ||
− | + | WHMCS includes many features to help keep your data safe, but you can take recommended additional steps to secure your WHMCS installation further. | |
− | == | + | == Recommended Steps == |
− | + | We recommend: | |
− | + | # Securing the writeable directories by [https://help.whmcs.com/m/installation/l/1650299-securing-writeable-directories moving them to a non-public location]. | |
− | + | # Securing the <tt>configuration.php</tt> file by [https://help.whmcs.com/m/installation/l/1650301-securing-the-configuration-file adjusting its permissions]. | |
− | + | # Securing the <tt>crons</tt> directory by [https://help.whmcs.com/m/installation/l/1650302-moving-the-crons-directory moving it to a non-public location]. | |
+ | # Protecting your Admin Area by [https://help.whmcs.com/m/installation/l/1650303-restricting-access-by-ip-address restricting access to a specific set of IP addresses] and [https://help.whmcs.com/m/installation/l/1650304-renaming-the-whmcs-admin-directory renaming the admin directory]. | ||
+ | # Disabling any unneeded [[System_Environment_Guide#Database_Privileges|database privileges]]. | ||
+ | # Protecting sensitive data by [https://help.whmcs.com/m/installation/l/1650306-enabling-ssl enabling SSL]. | ||
+ | # If you are not using Apache, ensure against [[Nginx Directory Access Restriction|serving requests directly from the vendor directory]]. <div class="docs-alert-info">The <tt>.htaccess</tt> file within the <tt>vendor</tt> directory will suffice to protect against this for servers running on Apache.</div> | ||
+ | # Defending against clickjacking by [https://owasp.org/www-community/attacks/Clickjacking always sending the proper Content Security Policy (CSP) frame-ancestors directive response headers]. | ||
+ | # Performing general server hardening measures (for example, [https://docs.cpanel.net/knowledge-base/security/security-best-practices/ cPanel's] or [https://owasp.org/www-project-top-ten/2017/A6_2017-Security_Misconfiguration OWASP's] best practices). | ||
− | + | == Additional Questions == | |
− | + | If you have additional questions or concerns regarding server security, contact your hosting provider or system administrator. They can review the server, assess the installed software and configuration, and provide tailored recommendations and assistance. | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− |
Latest revision as of 20:04, 14 February 2023
WHMCS includes many features to help keep your data safe, but you can take recommended additional steps to secure your WHMCS installation further.
Recommended Steps
We recommend:
- Securing the writeable directories by moving them to a non-public location.
- Securing the configuration.php file by adjusting its permissions.
- Securing the crons directory by moving it to a non-public location.
- Protecting your Admin Area by restricting access to a specific set of IP addresses and renaming the admin directory.
- Disabling any unneeded database privileges.
- Protecting sensitive data by enabling SSL.
- If you are not using Apache, ensure against serving requests directly from the vendor directory. The .htaccess file within the vendor directory will suffice to protect against this for servers running on Apache.
- Defending against clickjacking by always sending the proper Content Security Policy (CSP) frame-ancestors directive response headers.
- Performing general server hardening measures (for example, cPanel's or OWASP's best practices).
Additional Questions
If you have additional questions or concerns regarding server security, contact your hosting provider or system administrator. They can review the server, assess the installed software and configuration, and provide tailored recommendations and assistance.