How Secure are RunCloud/Server Pilot out of the box?

Started by john515, Jun 30, 2022, 09:46 AM

Previous topic - Next topic

john515Topic starter

I am planning to launch a simple blog that needs to be hosted on a new platform. Typically, I start with shared hosting and later move on to managed WordPress or VPS if needed.
However, services like Runcloud/Server Pilot have made shared hosting and VPS obsolete. These are SaaS products that automatically configure unmanaged VPS services like Digital Ocean and make them managed.

This includes server resource monitoring and automatic installation of security updates. Since my blog is professional, I want a host that looks more professional than a site on shared hosting with potentially spammy neighbors sharing the same IP. However, my main concern is security. Can I rely on Runcloud/Serverpilot for automatic configuration and security updates, or do I need to take additional measures to secure the blog?
  •  

amitkedia

Regardless of whether you choose shared hosting or an automatic management platform, the security setup is dependent on the provider's configuration. If you opt for a VPS like Digital Ocean, you need to handle optimization and security, as well as bear the costs of software licensing.
but, with a reliable provider that has good security setup and anti-spam protection, there is no need to worry about sharing IP in shared hosting.
  •  

beingchinmay

The decision between shared hosting and a virtual machine (VM)/VPS/cloud VM depends on the amount paid. While some shared hosting providers offer decent performance, there are limits to CPU, RAM, and IO speed with cloudlinux limits. Similarly, a VPS has hypervisor-imposed limits on CPU, RAM, and IO, but with greater power, freedom, and privacy. As you go up the levels and resources assigned, the difference in performance between shared hosting and VPS becomes clearer, with a VPS being better than shared hosting.

ServerPilot is a SaaS service that manages VPS and automatically hardens the server by applying patches and firewall rules. A $5 VPS might not be better than shared hosting, but as you move up the tiers, a VPS will be more performant. Unless you have a bigger budget and need the freedom of root access, stick to shared hosting and ask the provider for the actual cloudlinux lve limits with a critical eye on IO speed and RAM.
  •  

Maksim

There may be general disagreement that it's not safe to run this publicly, but here are some tips:

The statement that any pods that open ports are public by default is fundamentally wrong. each module has its own network namespace, so even if it listens to 0.0.0.0 to capture any traffic, it happens exclusively inside this own namespace, so it is not opened from the outside in any way. Until you configure the kubernetes Node Import or Load Balancer sorting service to explicitly present this service (and supporting module ports) on the network. And you will manage this even to a large extent with the help of network policies.
  •  

the_architect

These are two distinct services, with modern shared hosting being easy to use even for those with little technical knowledge, while dedicated hosting requires users to do everything themselves.

Shared hosting is not dying, but rather transforming into a product that includes separate panels where site owners can easily manage their site without knowing about dedicated servers, clouds or VPS. SSL and FTP are already enabled, so owners don't need to understand them. The question of which hosting service is better depends solely on the provider's business model that ensures good uptime, optimal performance, and a fair price for their service.

For older panels like ISP/CPanel, which have high user density, shared hosting is more profitable than dedicated hosting with high client density. However, for modern dashboards like runcloud/serverpilot, cheaper cloud instances are more profitable.
  •  

DanielFitzherbert

Runcloud and Serverpilot are convenient tools that simplify the management of unmanaged VPS services, like Digital Ocean. They automate server configuration and security updates, which can be beneficial for maintaining a secure blog. However, relying solely on these services may not provide complete security.

While Runcloud and Serverpilot take care of basic security measures, it is always a good practice to adopt additional security measures to further protect your blog. Here are some steps you can consider:

1. Regularly update your CMS and plugins: Keep your blogging platform and its plugins up to date. Vulnerabilities in outdated software can be exploited by attackers.

2. Implement strong login credentials: Use unique and complex passwords for your blog's admin accounts and consider enabling two-factor authentication for added security.

3. Protect against brute-force attacks: Use plugins or server configurations that limit the number of login attempts, protecting against password guessing.

4. Use a firewall: Implement a web application firewall (WAF) to filter out malicious traffic and protect against common attack vectors. You can look into services like Cloudflare or Sucuri.

5. Secure your server: Check your server's firewall configurations, disable unnecessary services, and restrict access to sensitive files and directories. Regularly monitor server logs for any suspicious activity.

6. Perform regular backups: Ensure you have a backup system in place to easily recover your blog in case of any unforeseen incidents.

7. Consider a well-reputed hosting provider: If you want a more professional hosting environment, consider using managed WordPress hosting providers that offer enhanced security features and dedicated support.


additional security measures you can consider implementing for your blog:

1. Use SSL/TLS encryption: Enable HTTPS for your blog to secure data transmission between your users' browsers and your server. This can be done through a free SSL certificate provider like Let's Encrypt.

2. Secure file permissions: Ensure that file and directory permissions are set correctly, allowing only necessary read, write, and execute permissions. Restricting access to sensitive files helps prevent unauthorized access.

3. Implement a content security policy (CSP): A CSP helps protect your blog against cross-site scripting (XSS) attacks by defining the sources from which your site can load content. It can mitigate the impact of any potential vulnerabilities in your website's code.

4. Regularly scan for malware: Utilize security plugins or services that can perform regular malware scans on your blog to detect and remove any malicious code injected into your files.

5. Harden your database: Change the default prefix for database tables and use strong, unique database credentials to minimize the risk of SQL injection attacks.

6. Limit login attempts: Implement rate limiting or CAPTCHA verification to prevent brute-force login attempts.

7. Protect against DDoS attacks: Consider using a service or plugin that offers DDoS protection to safeguard your blog from being overwhelmed by a flood of traffic.

8. Stay informed: Keep up with security best practices and subscribe to security newsletters or blogs to stay updated on the latest threats and vulnerabilities relevant to your blogging platform.


few more security measures you can consider:

1. Implement a web application firewall (WAF): A WAF can help detect and block malicious traffic before it reaches your blog, protecting against common web attacks like SQL injection, cross-site scripting (XSS), and more. Services like Cloudflare and Sucuri offer WAF capabilities.

2. Use a reputable antivirus and anti-malware solution: Install security plugins or software on your server that can scan for malware and viruses in real-time, providing an additional layer of protection.

3. Enable automatic backups: Set up regular automated backups of your blog's files and database. Store backups securely offsite to ensure you can quickly recover your blog in the event of a security incident.

4. Disable unnecessary services and features: Review your blogging platform's settings and disable any unnecessary plugins, themes, or features that could potentially introduce security vulnerabilities.

5. Monitor for suspicious activity: Regularly check your server logs, access logs, and error logs for any indications of unusual or suspicious activity. This can help you identify and respond to any potential security threats.

6. Educate yourself and your team: Stay informed about the latest security practices, vulnerabilities, and best practices for securing your blog. Educate yourself and anyone managing the blog about security risks, phishing attacks, and social engineering techniques.

7. Regularly review and update your security measures: Security is an ongoing process, so it's essential to regularly review and update your security measures as new threats emerge. Keep your blogging platform and security plugins up to date.
  •