Securing OS is as important as your website, web applications, online business.
You may be spending on security plugin, WAF, cloud-based security to protect your site (Layer 7) but leaving OS unhardened can be dangerous.
The trend is changing.
The Web is moving to Cloud from shared hosting for multiple advantages.
- Faster response time as resources are not shared by any other user
- Full control on a tech stack
- Full control of the operating system
- Low cost
“With great power comes great responsibility”
You get higher control in hosting your website on cloud VM, but that requires a little bit of System Admin skills to manage your VM.
Are you ready for it?
Note: if are not willing to invest your time into it then you can choose Cloudways who manage AWS, Google Cloud, Digital Ocean, Linode, Vultr & Kyup VM.
Let’s get into a practical guide to secure Ubuntu and CentOS VM.
Cloud Server Security Tips
Changing SSH Default Port
By default, SSH daemon listens on port number 22. This means if anyone finds your IP can attempt to connect to your server.
They may not be able to get into the server if you have secured with a complex password. However, they can launch brute force attacks to disturb the server operation.
The best thing is to change the SSH port to something else so even though if someone knows the IP, they can’t attempt to connect using default SSH port.
Changing the SSH port in Ubuntu/CentOS is very easy.
- Login to your VM with the root privilege
- Take a backup of sshd_config (/etc/ssh/sshd_config)
- Open the file using VI editor
Look for line which has
Port 22 (usually at the beginning of the file)
# What ports, IPs and protocols we listen for Port 22
- Change 22 to some other number (ensure to remember as you will need that to connect). Let’s say 5000
- Save the file and restart the SSH daemon
service sshd restart
Now, you or anyone won’t be able to connect to your server using SSH default port. Instead, you can use the new port to connect.
If using SSH client or Terminal on MAC then you can use
-p to define the custom port.
ssh -p 5000 [email protected]
Easy, isn’t it?
Protecting from Brute Force Attacks
This can be dangerous if not taken seriously. There are two popular programs you can use to protect Linux from brute force.
SSHGuard monitors the running services from the system log files and blocks repeated bad login attempts.
Initially, it was meant for SSH login protection, but now it supports many others.
- Pure FTP, PRO FTP, VS FTP, FreeBSD FTP
You can get SSHGuard installed with the following commands.
apt-get install SSHGuard
wget ftp://ftp.pbone.net/mirror/ftp5.gwdg.de/pub/opensuse/repositories/home:/hornos:/centos/CentOS_CentOS-6/x86_64/sshguard-1.5-7.1.x86_64.rpm rpm -ivh sshguard-1.5-7.1.x86_64.rpm
Fail2Ban is another popular program to protect SSH. Fail2Ban automatically updates the iptables rule if a failed login attempt reaches the defined threshold.
To install Fail2Ban in Ubuntu:
apt-get install fail2ban
and to install in CentOS:
yum install epel-release yum install fail2ban
SSH Guard and Fail2Ban should be sufficient to protect SSH login. However, if you need to explore more then, you may refer to the following.
Disable Password-based Authentication
If you log in to your server from one or two computers, then you can use SSH key based authentication.
However, if you have multiple users and often log in from multiple public computers then, it might be troublesome to exchange key every time.
So based on the situation, if you opt to disable password-based authentication, you can do it as following.
Note: this assumes you have already set up SSH key exchange.
/etc/ssh/sshd_configusing vi editor
- Add the following line or uncomment it if exist
- Reload the SSH Daemon
Protecting from DDoS Attacks
DDoS (Distributed Denial of Service) can happen at any layer, and this is the last thing you want as a business owner.
Finding the origin IP is possible, and as a best practice, you shouldn’t be exposing your server IP to the public Internet. There are multiple ways to hide the “Origin IP” to prevent the DDoS on your cloud/VPS server.
Use a load balancer (LB) – implement an Internet-facing load balancer, so server IP is not exposed to the Internet. There are many load balancers you can choose from – Google Cloud LB, AWS ELB, Linode Nodebalancer, DO LB, etc.
Use a CDN (Content Delivery Network) – CDN is one of the great ways to improve website performance and security.
When you implement CDN, you configure DNS A record with the anycast IP address provided by the CDN provider. By doing this, you are advertising CDN provider IP for your domain and origin is not exposed.
There is many CDN provider to accelerate the website performance, DDoS protection, WAF & many other features.
So pick the CDN provider who provider performance & security both.
Tweak the Kernel settings & iptables – you can leverage iptables to block suspicious requests, non-SYN, bogus TCP flag, private subnet and more.
Along with iptables, you may also configure the kernel settings. Javapipe has explained it well with the instructions so that I won’t duplicate it here.
Use a firewall – If you afford a hardware-based firewall then excellent otherwise you may want to use a software-based firewall that leverages iptables to protect the incoming network connection to the VM.
Backup is your friend! When nothing works then the backup will rescue you.
Things can go wrong, but what if you don’t have the necessary backup to restore? Most of the cloud or VPS providers offer backup at a little extra charge and one should always consider.
Check with your VPS provider how to enable backup service. I know Linode and DO charge 20% of droplet pricing for the backup.
If you are on Google Compute Engine or AWS, then schedule a daily snapshot.
Having a backup will quickly allow you to restore the entire VM, so you are back in business. Or with the help of a snapshot, you can clone the VM.
Keeping your VM OS up-to-date is one of the essential tasks to ensure your server is not exposed to any latest security vulnerabilities.
In Ubuntu, you can use
apt-get update to ensure the latest packages are installed.
In CentOS, you can use
Don’t leave opened ports
In another word, allow the needed ports only.
Keeping unwanted open ports like an inviting attacker to take advantage. If you are just hosting your website on your VM then most likely you need either port 80 (HTTP) or 443 (HTTPS).
If you are on AWS, then you can create the security group to allow only the required ports and associate them with the VM.
If you are on Google Cloud, then allow the necessary ports using “firewall rules.”
And if you are using VPS then apply basic iptables ruleset as explained in Linode guide.
The above should help you in hardening and secure your server for better protection from online threats.
Alternatively, if you are not ready to manage your VM, then you may prefer Cloudways who manage multiple cloud platforms. And if you are specifically looking for premium WordPress hosting then this one.