Network security
Network is an easy entry point for attackers. The first
thing we do is to secure the server network by blocking
all unwanted ports from being accessed from external
network.
We design network systems by segregating confidential
data from the public network. By adjusting the network
settings, we harden it against major attacks such as SYN
flood, DDOS attack, etc.
We monitor the network traffic regularly and block
attacking IPs and port scanning attempts. With the help
of firewalls and other tools, we prevent direct
access to back-end servers.
Other security tasks we perform include blocking spoofed
and malformed connections, rate limiting ping packets,
blocking blacklisted IPs, and so on, to avoid
attacks.
In-depth server hardening
Here, we cover everything from user account protection to
file system security. We secure user accounts with
strong passwords that expire periodically and by
enforcing secure user access policies.
By configuring SSL/TLS in all server services, we
protect the user data and credentials being sniffed out
by hackers. Using secure authentication systems like
Kerberos is another way we foil sniffing attacks. Other
security tips include IP restriction for administrator
access, using 2 factor authentication, locking account
after multiple login failures and exercising other
security practices.
The file system is further secured by controlling the
access privilege of each user, restricting privilege
execution of scripts and blocking malware execution
in vulnerable directories such as /tmp.
System binaries are protected against unauthorised
modifications that can lead to system infection. We also
protect your operating system boot image against all
malware infection.
Web server security
Web server is the most exposed service in any server.
This makes it vulnerable to a wide range of attacks that
can affect the web applications and related databases.
We configure Web Application Firewalls (WAFs) and
malware scanners to block such attacks. All known attack
patterns are blocked and signature databases are used to
block all the common attacks.
With customised security rules such as mod-security, we
restrict web operations to only the required ones. All
processes and uploads are scanned in real-time to detect
and block any malicious ones. Securing the web server
configuration is done to protect it, by
preventing information disclosure, limiting privileges
of web user, disabling obsolete and insecure modules,
etc.
Limiting per-user resource allowance helps to prevent a
single user abusing the whole web server. We also
restrict user permissions to prevent one user from
seeing another user’s data. Deleting malicious files,
enabling DDoS protection, enforcing SSL encryption for
connections, using server hardening patches, etc. are
some major activities we do to protect the web servers.
In addition, we monitor web traffic and log files for
anomalies, keeping the software updated and with latest
security patches. This helps us to prevent any malware
from affecting these servers.
Database server hardening
Database forms a critical part of server as it stores
many vital information. We tweak the database server to
enable it to withstand information disclosure attacks.
Restricting user privileges, securely storing databases
and backups, all these play a vital role in database
server security. Enforcing strong passwords and
restricting connections are other critical aspects. DNS,
SMTP, POP/IMAP, Remote Desktop, SSH, SSL, FTP, etc. are
other critical services in the server which we secure as
a part of our server security services.