Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Notes from JD from community slack to integrate #13

Open
talesh opened this issue Jun 7, 2019 · 2 comments
Open

Notes from JD from community slack to integrate #13

talesh opened this issue Jun 7, 2019 · 2 comments
Assignees

Comments

@talesh
Copy link
Owner

talesh commented Jun 7, 2019

`Nothing about content security policy on there. I think that’s a big one. Most important place to have your CSP locked down is on the checkout page.

Recommendation - use a read only filesystem. Use Docker and checksum your images.
Firewall your entire site and make sure it’s not doing any outbound connections (unless you know what those are).
Secure your backups! You don’t need access to the database if you take your backups and put them in a public S3 bucket.
Your backups should have the same security as root access to your database. They should also be encrypted so they can’t just be transferred around.
Be careful with any PII. Don’t be lazy and make a copy of your production database for devs to put on insecure machines (their laptops) that they take on the train, airports, etc. Make a development database. Use mocks. Use test data.
That brings me to the next point - your whole system is completely insecure if the person with all of the keys is running on an insecure computer. Mandate that anyone with production access has an up-to-date anti-virus program, they are trained in how to detect phishing attacks, they have secure passwords/keys, their browsers are up-to-date and all of the plugins on that are up-to-date.`

@talesh talesh self-assigned this Jun 7, 2019
@joshuaadickerson
Copy link

Talk to your vendors. Make them tell you what the URLs are that they’ll be sending requests to. Ask them to give you a npm package instead of hosting assets on their site.

It may sound dismissive and probably arrogant, but if a vendor can’t do that for me, why should I use their service? If a customer’s data is breached on my site, due to a vendor, I’ll be the one getting sued.

@talesh
Copy link
Owner Author

talesh commented Feb 15, 2020

@joshuaadickerson I have added all your notes except the ones regarding outbound connections and vendors pending clarifications. Here are my questions:

  1. Do you have any more details on recommended patterns for determining out bound connections on Magento sites?
  2. Can you explain a little more by what you mean by your comment re: vendors and npm packages? I am unclear what you're recommending here.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants