A guide to Wiredcraft's best cybersecurity practices

At Wiredcraft, we prioritize cybersecurity and implement a range of effective strategies to ensure the safety of our clients' information. Here we have clear guidelines that help our team stay on the same page.

Last month, a CrowdStrike update caused a massive Blue Screen of Death issue on Windows systems worldwide, affecting 8.5 million devices and disrupting critical sectors like air travel and banking.

Later, CrowdStrike claimed that this was “not a security incident or cyberattack.” However, as global digitalization accelerates, cybersecurity is becoming increasingly crucial for businesses.

At Wiredcraft, we prioritize cybersecurity and implement a range of effective strategies to ensure the safety of our clients’ information. Here we have clear guidelines that help our team stay on the same page.

Network Security

Manage and control network traffic using security rules at different levels like VPC, Subnet, and Instance.

Isolated Environments

Create separate environments for development, staging, and production by isolating them at the VPC level. Each environment has its own network segment to prevent cross-environment issues.

Action:

Dedicated VPCs for each environment

Isolation of Critical Components

Keep critical systems like databases in their own subnets with tightly controlled access to prevent unauthorized entry.

Action: Segregate critical components into restricted subnets

Minimal Exposure

Protect critical components by isolating them at the instance level, limiting access to authorized users only.

Action: Expose only necessary ports (80/443) to the Internet IP whitelisting for critical systems (e.g., admin dashboard) Minimal exposure of protocols (SSH, ICMP, FTP) No root access to servers No password authentication for SSH Monitor and alert on unusual login attempt activities

Host Security

All servers should be updated with the latest security patches and avoid to use EOL (End of Life) software/OS. Also implement proper monitoring and logging to track user activities.

For complex projects, RBAC(Role-based Access Control) is also a MUST.

Action: Update with the latest security patches Session recording to capture all user activities

(We use Teleport at Wiredcraft to manage all the access to our servers.)

Data Security

Protecting data, whether stored or transmitted, is one of the core development concepts at Wiredcraft.

Secrets Management

Securely share sensitive information between teams or individuals. Enable One-Time secret sharing tools( e.g. yopass) for temporary sharing and password management tools(e.g. bitwarden) for persistent sharing.

On the project side, manage confidential data with proven tools (use HashiCorp Vault for big/medium projects and Ansible Vault for smaller projects). Also, make sure to enable secrets scanning in the code build process and Trivy is a useful tool for that.

Action: Enable proper secrets management tools for sharing & sensitive information Integrate secrets management solutions with HashiCorp Vault or Ansible Vault Enable secrets scanning in the code build process

Volume Protection

Use strong encryption methods like AES for local data (disk level) and cloud provider encryption features for remote data (e.g., S3 bucket).

Action: Encrypt all data disks for database servers using AES-256 encryption standards Enable encryption for all data stored in cloud storage services

Data-in-Transit Protection

Use valid SSL/TLS to encrypt data sent across networks. Never use HTTP!

Action: Ensure SSL/TLS is implemented for all web and application servers

Application Security

Manage the requests/vulnerabilities at the application level to prevent unauthorized access and protect against attacks.

Gateway / WAF

Use a gateway(we like Kong) or WAF in front of the application to monitor and block malicious web traffic.

Action: Deploy a Web Application Firewall (WAF) to monitor and block malicious web traffic Implement rate limiting on APIs to prevent abuse and potential denial-of-service attacks Use whitelisting to allow traffic from known, secure sources and blacklist known malicious IPs for important systems

Authentication

Avoid using simple password authentication (like HTTP Basic Auth). Instead, use more secure methods like OAuth2 or OpenID Connect, or API keys/JWT tokens for application integration.

Vulnerability

Regularly scan the application for vulnerabilities and fix them in a timely manner. This includes vulnerabilities in the code, dependencies, and Docker images/OS or any other self-hosted services.

Action:

Integrate vulnerability tool(e.g. Trivy) in the build process to scan all the code Integrate vulnerability tool in registry( e.g. Harbor) to scan all the Docker Regularly check the latest CVEs and update the dependencies Use cloud provider security tools to scan the cloud resources

Pen Testing

For all the critical applications, perform regular pen testing to identify and fix security vulnerabilities before they are exploited by attackers. We use HCL AppScan Standard and BurpSuite and following OWASP Top Ten checklist for security testing.

Kaleo Cheng
Head of Innovation
Posted on August 06, 2024 in Technology

Share this post

Scan to open in WeChat

Stay tuned

Follow our newsletter or our WeChat account; every other week you'll receive news about what we're up to, our events and our insights on digital products, omnichannel, cross-border ecommerce or whatever the team fancies.

  • Add us on WeChat

  • Subscribe to our newsletter