Security
These FAQs briefly summarise key points regarding securing your Composr site.
For more information, check out these tutorials:
For more information, check out these tutorials:
Question | What are the main security features of Composr? |
---|---|
Answer | Composr has a robust set of security features to protect your website, including: Passwords:
Login Restrictions:
Auditing Systems:
Framework Security:
Other features:
|
Question | What are some tips for secure website maintenance? |
---|---|
Answer |
|
Question | What are the different types of security alerts in Composr? |
---|---|
Answer | Composr has a variety of hack-attack codenames that trigger security alerts and logging. Some common examples include:
You can customize alert handling for each type in data_custom/xml_config/advanced_banning.xml (Admin Zone > Security > Configure advanced banning). |
Question | How does Composr protect against Cross-Site Scripting (XSS) attacks? |
---|---|
Answer | Composr utilizes multiple layers of defense against XSS attacks:
|
Question | How can I enhance the security of my Composr installation on shared hosting? |
---|---|
Answer | Shared hosting environments can be inherently less secure. Here are some tips:
|
Question | What is the purpose of "confirmed" and "non-confirmed" sessions? |
---|---|
Answer | Composr distinguishes between confirmed and non-confirmed sessions for added security:
You can configure zones to require confirmed sessions, preventing access from cookie-based logins alone. The Admin Zone uses this by default. |
Question | How does Content Security Policy (CSP) contribute to Composr security? |
---|---|
Answer | CSP adds a layer of protection by controlling the resources the browser is allowed to load. It helps prevent:
Composr's CSP implementation utilizes "Trusted partner sites" and nonces for fine-grained control. |
Question | What additional security measures can I implement for my Composr website? |
---|---|
Answer |
|
Question | What steps should I take if my website has been hacked? |
---|---|
Answer | If you suspect a security breach, take immediate action:
|