How do you protect your server?

Gang Starr

New Member
1) Install hardware firewalls in addition to the software firewall on the hostnode.

2) Configure the hostnode firewall accordingly.

3) Get a good DDoS protection service for your servers.

4) For remote access via SSH use the ssh public key auth method only and set root login to "without-password" (use keys above 4096 Bit with a strong passphrase).

5) Keep your operating system up to date at every point in time.

6) Keep any software you use up to date and take care of installing important security fixes ASAP and AFAP.

7) Monitor your servers for uncommon traffic and actions and stop these instantly (fail2ban and similar software can help here)

8) Don't let anyone else access your servers than you.

9) Encrypt all disks if you have the possibility.

The order is not really right but this are some really important things.


New Member
  1. Change Your Default SSH Login. ...
  2. Use The Latest Software Versions. ...
  3. Monitor Your VPS Server Logs. ...
  4. Set Up Your Firewall. ...
  5. Make Sure Your Server Is Malware-protected. ...
  6. Protect Against Brute-force Attacks. ...
  7. Control User access. ...
  8. Keep Calm And Perform Backups.


There are two ways you can secure your server. They are:
1. Firewall
Even if your services implement security features or are restricted to the interfaces you’d like them to run on, a firewall serves as a base layer of protection by limiting connections to and from your services before traffic is handled by an application.
A properly configured firewall will restrict access to everything except the specific services you need to remain open. Exposing only a few pieces of software reduces the attack surface of your server, limiting the components that are vulnerable to exploitation.

2. SSH keys
SSH, or secure shell, is an encrypted protocol used to administer and communicate with servers. When working with a server, you’ll likely spend most of your time in a terminal session connected to your server through SSH. A more secure alternative to password-based logins, SSH keys use encryption to provide a secure way of logging into your server and are recommended for all users.
With SSH keys, a private and public key pair are created for the purpose of authentication. The private key is kept secret and secure by the user, while the public key can be shared.


New Member
Following tips should be use in protect server

1. Establish and Use a Secure Connection
2. Use SSH Keys Authentication
3. Secure File Transfer Protocol
4. Secure Sockets Layer Certificates
5. Use Private Networks and VPNs
6. Monitor Login Attempts
7. Manage Users
8. Establish Password Requirements
9. Set Password Expiration Policy
10. Use Passphrases For Server Passwords
11. Password Don’ts