Inherited Site Security Review » History » Version 1
Jon Goldberg, 11/21/2017 10:33 PM
| 1 | 1 | Jon Goldberg | # Inherited Site Security Review |
|---|---|---|---|
| 2 | |||
| 3 | This is a checklist of steps to take when inheriting a site that JMA did not build. This list is not comprehensive, and we should add to it over time. |
||
| 4 | |||
| 5 | * Reset the passwords of server and CMS (encourage client to do latter) |
||
| 6 | * Disable unnecessary logins of server and CMS (encourage client to do latter) |
||
| 7 | * If CiviCRM, check civicrm_contact for API keys. Remove/change them. |
||
| 8 | * If CiviCRM, check for CiviConnect apps. |
||
| 9 | * Remove interactive shell login from legitimate server users who don't need a shell. |
||
| 10 | * Removing all unnecessary public RSA keys for ssh access |
||
| 11 | * Remove unnecessary software from the server. TODO: Explain how to find this (dpkg -l, ps -ef, etc.) |
||
| 12 | * Review all running services on the server with service --status-all or (preferably, if using systemd) systemctl |
||
| 13 | * check listening servers with # netstat -lp |
||
| 14 | * compare that output to an nmap scan of localhost # nmap -sT -O localhost |
||
| 15 | ** they should line up closely. if nmap shows a port open that netstat does not, run a rootkit checker and investigate further. |
||
| 16 | * Compare THAT output to an nmap scan from another computer (your own - or a dev server if your ISP blocks some ports): nmap -sT -O www.example.org |
||
| 17 | * install fail2ban if not already installed. Consider also tripwire and some iptables. |
||
| 18 | * Check for hacks. While this resource is incomplete, it suffices for now. Despite the name, it's useful for Drupal AND WordPress. Be sure to grep a dump of the database and not just the filesystem. |