Product SiteDocumentation Site

3.3. Application server configuration and hardening

Defense in depth approach to security reminds us to add layers of security further down the stack, rather than focus on the interface between client and the server.
This section lists common problems related to server configuration and hardening with examples of vulnerabilities together with best practices on how to avoid them.