Number 2: Security 5 lỗi cần tránh trong Drupal Website

Number 2: Security 5 lỗi cần tránh trong Drupal Website

>>Number 1: Architecture: 5 lỗi cần tránh trong Drupal Website

>>Number 2: Security 5 lỗi cần tránh trong Drupal Website

>>Number 3: Performance - 5 lổi cần tránh trong Drupal Website

>>Number 4: Infrastructure - 5 lỗi cần tránh trong Drupal

>>Number 5: Maintenance - 5 lỗi cần tránh trong Drupal

Good security practices protect your site from hacker attacks. In this article we'll look at some methods for reducing security risks on your site. 

Drupal Security Best Practices

Drupal has good security built in if used correctly. However, once you begin to configure your site you might introduce new security issues. Plan configuration so that only trusted users have permissions that involve security risks.

Keep core and contrib modules updated

You may not opt to do some module updates if the fixes or improvements have no direct effect on your site, however you should always apply security updates as soon as possible. Subscribe to security announcements on Drupal.org.

Use Strong Passwords

Passwords are the most likely candidates for points of failure in your site security. Use the  Password Policy module to devise a set of constraints before your users can set their passwords. You can also set a password expiration.

Limit file uploads and limit what files are served

Limit allowed file types and limit uploads to trusted users only. Check your permissions for specific content types, and files types allowed in field uploads. 

Use the Security Review module and Acquia Insight

The Security Review module will analyze your site configuration and report methods for fixing errors. Only use this module on a staging or test site. Disable and remove the module on production sites.  Our service, Acquia Insight,provides additional site configuration and security checks as well.

Guard against attacks in custom code

Following are three attacks to guard against in custom code in your themes and modules.

Avoid: SQL injection

Mistake: Using SQL queries in code rather than using Drupal API.

Example: The code db_query("select * from table where id=$_GET[‘id’]"); allows for the attack example .com/index .php?id=1 union select * from users;

Solution: Use Drupal’s database abstraction layer. [Seehttp://api.drupal.org/api/drupal/includes%21database%21database.inc/group/database/7]

Avoid: XSS—Cross-site scripting

Mistake: Displaying visitor parameters without checking them allows visitors to inject client-side scripts into pages viewed by other users.

Example: The code <?php echo "Your number is ". $_GET['id']; ?> allows the attack Index.php?id=<script> alert("UAAAT??");</script>

Solution: Clean (sanitize or filter) and input from untrusted users before returning to the browser for render. Read more here: XSS intro http://drupalscout.com/knowledge-base/introduction-cross-site-scripting-xss-and-drupal

Avoid: CSRF—Cross-site request forgery

Mistake: URLs containing wildcards (%) that are not protected and form code entered directly into the site. HTTP Post from forms can allow a request to originate from anywhere, not just your site as you expect. 

Solution: Use Drupal’s Form API, which protects against these attacks by inserting a token in every form. If you render any sort of URL that should be protected, make sure that you either ask for a confirmation with the Form API or use a token with the URL and verify that the token is present and valid on the response handling. Read more here: CSRF introhttp://drupalscout.com/knowledge-base/introduction-cross-site-request-forgery-csrf

 

Bạn thấy bài viết này như thế nào?: 
No votes yet
Ảnh của Khanh Hoang

Khanh Hoang - Kenn

Kenn is a user experience designer and front end developer who enjoys creating beautiful and usable web and mobile experiences.

Tìm kiếm bất động sản

 

Advertisement

 

jobsora

Dich vu khu trung tphcm

Dich vu diet chuot tphcm

Dich vu diet con trung

Quảng Cáo Bài Viết

 
Hướng dẫn phân quyền trong Wordpress 3.4

Hướng dẫn phân quyền trong Wordpress 3.4

Wordpress thực sự mạnh mẽ cho cộng đồng bloger chuyên nghiệp, với những ưu điểm riêng biệt làm cho Wordpress ngày càng lớn mạnh và trở nên phổ biến. Bài viết này sẽ giới thiệu về các loại tài khoản dùng để phần quyền trong việc quản lý nội dung trong Wordpress, hiện tại Wordpress có 4 loại tài khoản chính là Admin, Editer, Author, Contributer, và Subsrciber

Webmaster nói về top 10 thủ thuật SEO cần tránh

Danh sách và những phân tích 10 thủ thuật mà các Webmaster hay những người làm SEO cần tránh sử dụng khi tối ưu hóa Website cho máy tìm kiếm.

Hướng dẫn Colorbox Pop-ups cho Drupal Images và Videos

Hướng dẫn Colorbox Pop-ups cho Drupal Images và Videos

A lot of sites like to show media inside pop-ups. Using pop-ups can make it easier for visitors to quicky browse through multiple images or videos.

Công ty diệt chuột T&C

 

Diet con trung