Chapter 9. Securing your web server

 

This chapter covers

  • Securing your infrastructure
  • Controlling access to your server using firewalls
  • Using encryption to protect your data
  • Tightening the authentication process
  • Controlling software and processes

The web part of web server is a bit misleading. After all, most of the security tools I’m going to discuss in this chapter are important no matter what kind of server you’re running. In fact, server is also kind of redundant, as all computers need securing. Still, because by definition they’re exposed to significant external traffic, the security of your web servers should be a particularly high priority. So the best way to test the things you’re going to learn about in this chapter is to have an Apache web server running. Consider putting one together right now: apt install apache2.

In an IT context, security is the protection of hardware, software, data, and digital services from unauthorized access and corruption. Given that networked computer resources are designed to be exposed to client users of one sort or another, ensuring that only the right clients are able to perform only the right operations is a challenge.

You can think of security as the fine art of balancing value against risk. When you consider how many kinds of security threats already exist, and how frequently new ones appear, you’ll probably understand that the balance will never be perfect. It will most certainly need to be reassessed often.

9.1. The obvious stuff

9.2. Controlling network access

9.3. Encrypting data in transit

9.4. Hardening the authentication process

9.5. Auditing system resources

Summary

Key terms

Command-line review

Test yourself

sitemap