Keeping Your Cloud Web Hosting Safe & Secure

Posted By: Brian Farrell

Last Updated: Monday August 24, 2020

Customers often ask what steps we take as a host to keep your websites and files safe. We value security at Hawk Host and it’s important clients know the proactive measures we’ve taken to defend against exploits and attacks, but also provide recommendations on steps you can take to further secure your hosting.

Account security with shared hosting is a two way street. As a host it’s our responsibility to provide a safe and secure hosting environment at the server and network level. As a customer it’s important you follow best practices to make sure your individual sites, software, or applications aren’t vulnerable to remote exploits that may bypass the protections we have in place. Here’s a quick overview of some technologies we’ve implemented at the server level:

CageFS: CageFS is a technology developed by CloudLinux that places each cloud web hosting client account into their own “cage” on the server. By isolating your account from every other user on the server it is not possible for their activity impact the security and safety of your websites and files. This means even if other users on the server are hacked, and they have malicious PHP files/scripts, those malicious files cannot lead to a security issue with the websites and files inside your own cage.

SecureLink: SecureLink is another OS level security feature that prevents against known symbolic link (symlink) attacks, especially in a cPanel/WHM based environment. This feature works in conjunction with CageFS to further isolate your specific account from the rest of the server.

Imunify360: Imunify360 is a multi-purpose security tool that offers proactive malware scanning, cleaning / quarantining of detected malicious files or scripts, and also web traffic inspection to block requests from known bad actors or potentially malicious traffic. You have the ability to view cleaned and quarantined files, modify how Imunify360 manages malware, and other settings right through cPanel (KB guide here). By default if we detect a malicious file added to your account or notice malicious code injected into an existing file we’ll first attempt to remove just the malicious code from the file. If we are unable to remove the malicious code we will quarantine the file. In both cleaning and quarantining these attempt to prevent spread of the infection to the rest of your account which could lead to a total compromise.

ModSecurity: ModSecurity is another tool that looks for known commands or requests that are often used to exploit a websites software. For example if someone on your website is attempting to execute a request that matches a known ModSecurity rule the request will be blocked and any potential exploit attempts using that request would be stopped.

KernelCare: KernelCare is a technology that allows us to apply kernel level patches for known OS exploits on the fly, and often times long before the upstream developers are able to integrate a patch into their releases. This is particularly valuable as it relates to 0-day exploits for the Linux based operating system we run.

DDOS Protection: At the network level we monitor all of our IPs and look for anomalies in traffic, both incoming and outgoing, to identify not only incoming malicious traffic / DDOS attacks but potentially compromised accounts using our network to launch outgoing attacks. While the outgoing attacks may not impact your sites it’s important we operate a safe network and that includes stopping bad actors from using our services. We also offer proactive “scrubbing” of traffic to drop malicious traffic and let the good traffic through so there is no impact to your sites speed or performance serving legitimate requests.

SPAM Protection: All email sent from our cloud web hosting network accounts is first filtered through our dedicated outgoing email systems. As a result we are able to easily block spam/UCE before it leaves our network. This keeps our IP and network reputation as clean as possible so your outgoing emails are not negatively impacted by bad actors using our services in violation of our TOS/AUP. In the event an IP does have its reputation impacted we can switch to a new mailing IP immediately to ensure your legitimate email delivery is not delayed or bounced.

Steps you can take as a client: While we do our absolute best as a host to keep you safe there are still important steps you as a client can take to further secure your accounts and websites:

We hope this helps you feel better about the steps we take to keep you safe and also provides a valuable guide of steps you can take as a client to stay even more secure on the web!

Ready to get started? Build your site from