LAMP security tightening/improvements
- or -
Post a project like this- Posted:
- Proposals: 3
- Remote
- #1718409
- Awarded
Description
Description of requirements/features: General information for the business: n/a
Kind of development: Customization of existing program
Description of requirements/functionality: I am looking for someone to do a complete overhaul of the current security we have on our Linux server. We use a LAMP framework and have the code linked to Github. I want the following issues to be looked at:
1. Prevent hackers from logging into the server
2. Prevent hackers from accessing the CRM (and limit the login to certain IPs or some other login method)
3. Storage of database backup in a safe way
4. Improve LAMP stack with any known methods
OS requirements: Linux
Extra notes:
Extra notes: General information for the business: n/a
Kind of development: Customization of existing program
Description of requirements/functionality: I am looking for someone to do a complete overhaul of the current security we have on our Linux server. We use a LAMP framework and have the code linked to Github. I want the following issues to be looked at:
1. Prevent hackers from logging into the server
2. Prevent hackers from accessing the CRM (and limit the login to certain IPs or some other login method)
3. Storage of database backup in a safe way
4. Improve LAMP stack with any known methods
OS requirements: Linux
Extra notes:
John C.
0% (0)New Proposal
Login to your account and send a proposal now to get this project.
Log inClarification Board Ask a Question
-
Hi John
If your site is on a shared host like GoDaddy there is little I or anyone else can do to assist. If you move site to vps this can be hardened to the extrdene. How are you hosting? -
Hi John,
Where is your server hosted and by whom - do they offer control panels that people could guess or options such as 2FA? Also - what else is running on your stack and how often do you update it (eg: are you running some (old) wordpress sites or other public facing applications that may have vulnerabilities or provide openings to the system)? Depending on those answers will reflect what options you have/should be looking at.
Happy to talk through to help clarify these if needs be.
Thanks,
Jon.