Keeping Magento secure¶
Magento is a popular e-commerce platform, used by a large number of online shops. As a popular platform, it is often targeted by malicious actors, so it’s important to keep your Magento installations secure.
Warning
Magento is third party software not provided by UKFast, therefore we cannot be responsible in the event of any security breaches due to the Magento application itself, nor can we provide the in-depth forensics which may required should a breach occur.
The advice given here is provided on reasonable endeavours basis, and we recommend you do your own additional research.
If you plan on using Magento as your e-commerce platform, the following resources should provide all the information you need to stay secure:
The official
3rd party tools such as MageReport Scanner let you run scans on your sites, which should help you find and fix potential vulnerabilities, before they become problems.
Some of the key points to consider in order to keep your Magento site secure are:
Keep Magento and any extensions up to date, and make sure to install any security updates available
Change the default
admin
username, and use a strong password. Consider adding a 2-factor authentication extension for added securityConsider securing your file permissions. Magento provide guides for Magento 1.x and Magento 2.0. Do bear in mind that the file permissions you should use depend on which version of Magento you’re running, and whether you’re running on a dedicated Magento host or a shared environment like WHM/cPanel or Plesk. Please do refer to the appropriate official documentation for your setup before making changes.
Have a disaster recovery plan, and make sure to take regular backups which you can restore your site from, should you be attacked. Speak to your UKFast account manager or raise a support ticket via MyUKFast if you need help with establishing an appropriate backup regime.
My Magento site was hacked, what now?¶
In general the first thing you’ll want to do is take the site offline so no further damage can be inflicted. You may wish to first take a copy of the compromised site, should you need to have an investigation done at a later date.
Then the fastest way to get back online is to restore from backups prior to the incident, whether that’s using UKFast-provided backups or your own. Be aware that restoring from a backup might remove the malicious code, but it won’t close the vulnerability which allowed your site to be compromised in the first place.
We would also recommend running an on-demand virus scan just in case there are further issues beyond the compromised site. For Linux-based products we recommend McAfee, or alternatively the open source ClamAV.
And in all cases, we would recommend getting a security expert to review and confirm your site is safe again.