Security for deployment hosts
The purpose of this guide is not so much providing complete cyber-security training, but highlighting some of the system setup aspects that are most important and/or specific to Platform security.
Essential check-list
If hosting in a cloud or VPS provider, disk encryption with a specific ephemeral key is used.
Backups are scheduled, monitored, encrypted and regularly tested.
Latest updates are installed regularly for:
Operating system and core libraries
PHP, Web server and MySQL services
Ushahidi Platform