We try to keep our services as secure as possible via the following means:
- Restricting shell access for SSH users
- Preventing password only authentication for SSH
- Restricting permissions on sensitive files (e.g. SSL certificates, NGINX configurations)
We have gone out of our way to patch the following CVE's:
- Shellshock - Patched by upgrading bash (default is fine on Ubuntu 14.04)
- Heartbleed - Patched by upgrading NGINX (default is fine on Ubuntu 14.04)
- POODLE - Patched by restricting SSL methods used by NGINX
- Logjam - Patched by using new Diffie-Hellman group
We rely on the following tools to keep up to date with new vulnerabilities:
- PatrolServer - Monitors server externally