Lesson 5 | Server Security |
Objective | Designing e-commerce system security at the server level using modern best practices |
Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
Segment web server resources from application logic and static content using separate infrastructure or containers.For projects that require large file exchanges, use secure protocols such as SFTP or HTTPS with pre-signed URLs. Avoid anonymous access. When partner or client access is necessary, create dedicated, expiring credentials with IP allowlists. Quarantine all uploads for antivirus and content policy scanning before release into production. Maintain full audit logs for compliance and forensics.
Disable or replace insecure legacy protocols. If FTPS is required for compatibility, ensure TLS 1.3 is enforced and that weak ciphers are disabled. Avoid revealing server version banners, but prioritize rapid patching and minimal attack surface over obscurity.
Modern network segmentation ensures that no single breach compromises the entire environment. Place the web and application tiers behind a reverse proxy or WAF. Use private networking (such as VPC peering or service mesh) between tiers, and do not expose database services publicly.
Implement intrusion detection and response (IDS/IPS or EDR/XDR) at key points in the architecture. Use centralized SIEM logging with tamper-evident storage. All communication between services should be encrypted and authenticated.
Simple Mail Transfer Protocol (SMTP): Secure email services are critical for protecting customer communications and transactional messages. Enforce SPF, DKIM, and DMARC (set to quarantine or reject) to prevent spoofing. Require TLS 1.3 for all message transfers and enable MTA-STS/TLS-RPT for delivery security. Use attachment sandboxing and phishing detection to protect end-users. Separate marketing and transactional email systems to reduce risk exposure.