Book Image

WordPress 3 Ultimate Security

Book Image

WordPress 3 Ultimate Security

Overview of this book

Most likely – today – some hacker tried to crack your WordPress site, its data and content – maybe once but, with automated tools, very likely dozens or hundreds of times. There's no silver bullet but if you want to cut the odds of a successful attack from practically inevitable to practically zero, read this book. WordPress 3 Ultimate Security shows you how to hack your site before someone else does. You'll uncover its weaknesses before sealing them off, securing your content and your day-to-day local-to-remote editorial process. This is more than some "10 Tips ..." guide. It's ultimate protection – because that's what you need. Survey your network, using the insight from this book to scan for and seal the holes before galvanizing the network with a rack of cool tools. Solid! The WordPress platform is only as safe as the weakest network link, administrator discipline, and your security knowledge. We'll cover the bases, underpinning your working process from any location, containing content, locking down the platform, your web files, the database, and the server. With that done, your ongoing security is infinitely more manageable. Covering deep-set security yet enjoyable to read, WordPress 3 Ultimate Security will multiply your understanding and fortify your site.
Table of Contents (23 chapters)
WordPress 3 Ultimate Security
Credits
About the Author
Acknowledgement
About the Reviewers
www.PacktPub.com
Preface
Index

Security policy for somesite.com


Here's a loosely-worded example that may act as a template for a small team working on a WordPress site. It's littered with ideas for discussion. Rip it apart to end up with a document that everyone is happy to work with. The core principles should never change, but you should fine-tune the details on an ongoing basis.

Aim

To protect somesite.com and its users by securing those assets that may impact upon the website, its data, and user-base.

Goals

This wishlist is the most active element of the document. As you detail and update assets, you'll uncover possible improvements. Key decision-makers should agree on these goals.

Somesite.com

  • Legalese the privacy statement

Personal Computers

  • Implement VPN accounts for privileged users

Server

  • Evaluate grsecurity on test server, comparing to SELinux

Roles and responsibilities

This may be just you, bridled with full responsibility. For small outfits, if there are team members with privileged access, their roles and security responsibilities should be specified. Try not to mention individuals because while people move, roles don't.

Security Manager (SM)

The buck stops with the SM who oversees the policy. This role involves delegating those of the Site and Server Administrators and structuring a reasonable, enforceable policy.

System Administrator

Reporting to the Security Manager, the System Administrator oversees the security of the network and its assets, applies patches, and undertakes file and data backup.

Site Administrator

Again reporting to the Security Manager, the Site Administrator oversees the security of the web files and data, not least by ensuring the updating of WordPress and its plugins.

Site Editors

Reporting to the Site Administrator, Site Editors oversee the security of content and this may include auditing its external use. Authors and Contributors each report to an Editor.

Other roles

Every team member has a responsibility to utilize assets securely. Users with some level of privileged access, at least, should be issued with abbreviated documents outlining, for example, password and secure login procedures. Even junior stakeholders need to know:

  • What is their overall responsibility?

  • What precisely does that entail?

  • ... and, to win their support, they need a darned good reason why

And don't forget to regulate, as far as is practical, user's local devices, their media, and the online risks that we covered in Chapters 1, 3 and 4, else to set out how to isolate the site's immediate network from this third party threatscape which, all too often, is ignored.

Network assets

Now for assets challenging security. List your hardware and, for each item, branch its software, maintenance schedules, and procedures. This info is gold dust for hackers so keep it minimal, in separate documents, and give it to users on a need-to-know basis.

PCs and media

Only PCs, LiveCDs, and other media approved by the System Administrator should gain network access. Pin this down by listing the lot and, for each, specifying what wares should be running with what update procedures, with what extensions and in what modes.

For example, you could stipulate that Firefox is used with NoScript, that Comodo's Defence+ sandbox is enabled, or that Windows' User Access Control is set to paranoid.

And remember, cell phones and other gizmos can be PCs too.

Routing gear

Wireless routers, say, are miniature PCs and a first-line defense tool. Break down their configurations to make the most of the kit and to appraise what maintenance is required.

Server

Break down not only your software requirements, but also how and when penetration testing is performed, the procedure for logs assessment, for user management, and so on.

Website assets

In our case, the website is probably the gist of the policy. Here are some considerations.

Backup

Specify a backup procedure, its structure, where it lives and, pre-empting an emergency, test the reimplementation policy (do that, also, when the guy responsible is off sick!)

Code updates

While adding, say, an untested plugin to a live site is run of the mill for most of us, this direct approach is anathema to the Site Administrator of a monster site. Lay out a beta-to-alpha strategy to test new or revised code on a development server before sending it live.

Database

The database may be the single most important asset. (Your site visitors at least, having given sensitive information, may reckon so.) More rules may involve:

  • The creation of least privilege administrators

  • Data collection and retention

  • The privacy of your user's data

Domain

Don't forget to renew the registration and, as outlined in Chapter 2, lock the domain and consider a private registration.

Further policy considerations

This template's overweight for small sites and barely scratches the surface for others. As I've suggested, it may form the backbone for a series of documents but, in other cases, may itself be an offshoot of a wider policy. You be the judge.

In all cases, though, there are other areas to think about with your overall policy:

  • Content collection

  • Content copyright and enforcement

  • Data encryption

  • Disaster recovery (Appendix B helps here)

  • Information security (from passwords to this document)

  • Internet use

  • Network penetration testing

  • Roles enforcement and violation

Chock-a-block doc, huh? Trust me, this ultra-dull policy set is a boon to security. Try it.