Introduction

Here you will find useful information related to information security.

Keeping security standards up to date is very important to keep your project’s information integrity and reliability.

Server security

SSH

SSH (Secure Shell) is an encrypted network protocol. Commonly used for remote login to servers.

SSH Guide: SSH Server Configuration

HTTPS

You can read an intro on HTTPS here.

It’s not enough to protect /sensitive/ resources only, all other pages that can directly or indirectly link to said resources must be protected also, so as to prevent man in the middle attacks. MTM

You can read on how to configure HTTPs on some popular servers here:

Certificates for development:

HSTS

You can read an intro Mozilla Strict-Transport-Security

Nginx setup:

Database Security