There are no tweaks or key changes you can make
- General Recommendations
- Threat monitoring
- Realize your security risks and attend to them in the design phase
- Think a little more. Start thinking about security threats
Threat Modeling
Think through all of the threats and attack vectors for your software and server.
- Make attempts to teach or talk with customers
- Customer Requests
- Report vulnerabilities in Plesk
- Hacked Servers
- Investigate hacks to see if there were issues
- Outdated Software is a common attack vector
- Make sure everything is up to date
Principle of Least Privileges
- Don’t use root if you don’t have to
- Define roles for users
- Opening only necessary ports for it to work
Tools on Plesk
- WordPress Toolkit
- Firewall Extension
- Allows you to manage your connections and ports
- Control the network configuration
Above all, be informed about the software you use.