Skip to content
This repository was archived by the owner on Nov 19, 2024. It is now read-only.

Commit b1ba48c

Browse files
authored
Merge pull request #6821 from magento/DOC-119-Security-Best-Practices
Link Architecture Guide to Security best practices pdf
2 parents f46b40d + 1cf9d68 commit b1ba48c

File tree

2 files changed

+18
-5
lines changed

2 files changed

+18
-5
lines changed

src/_data/toc/architecture-guide.yml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,9 @@ pages:
1313
- label: Frontend customization
1414
url: /architecture/frontend_custom_strategies.html
1515

16+
- label: Security overview
17+
url: /architecture/security_intro.html
18+
1619
- label: Architectural layers
1720
url: /architecture/archi_perspectives/ALayers_intro.html
1821
children:

src/guides/v2.3/architecture/security_intro.md

Lines changed: 15 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,15 +6,21 @@ menu_title: Security
66
menu_order:
77
---
88

9-
## Enhanced password management
9+
The security of your data and digital experiences is our priority. To better protect Adobe Magento Commerce installations from the physical layer up, we have implemented hundreds of processes and controls to help us comply with [industry-accepted standards][1], regulations, and certifications. To help protect installations from the software layer down, we build in security measures that are based on the [Adobe Secure Product Lifecyle][2].
10+
11+
Although there is no single way to eliminate all security risks, there are many steps you can take to harden your installations and make them a less attractive target for bad actors. The [Adobe Magento Commerce Security Best Practices Guide][3] offers insight and practical guidelines to help protect Adobe Magento Commerce installations from security incidents.
12+
13+
## Examples of built-in security measures
14+
15+
### Enhanced password management
1016

1117
Magento has strengthened the hashing algorithms (SHA-256) used in password management. Magento now supports Argon2ID13 through the PHP sodium extension, which requires the libsodium library version 1.0.13 or higher.
1218

13-
## Improved prevention of cross-site scripting (XSS) attacks by making escaped data the default
19+
### Improved prevention of cross-site scripting (XSS) attacks by making escaped data the default
1420

1521
The Magento Framework has adopted conventions that regulate the escaping of data in output. These conventions include the ability to escape output for [HTML](https://glossary.magento.com/html) pages (HTML, JSON, and JavaScript) and email. Where possible, escaping is transparent to client code. See [Security measures against XSS attacks]({{page.baseurl}}/extension-dev-guide/xss-protection.html) in the [Frontend](https://glossary.magento.com/frontend) Developer Guide.
1622

17-
## More flexible file system ownership and permissions
23+
### More flexible file system ownership and permissions
1824

1925
Starting in version 2.0.6, Magento no longer explicitly sets file system permissions. Instead, we recommend that certain files and directories be writable in a development environment and read-only in a production environment.
2026

@@ -24,15 +30,19 @@ For an overview, see [Overview of ownership and permissions]({{page.baseurl}}/in
2430

2531
For details about ownership and permissions in development and production, see [Magento ownership and permissions in development and production]({{page.baseurl}}).
2632

27-
## Improved prevention of clickjacking exploits
33+
### Improved prevention of clickjacking exploits
2834

2935
Magento safeguards your store from clickjacking attacks by using an X-Frame-Options HTTP request header. For more information, see [X-Frame-Options header]({{page.baseurl}}/config-guide/secy/secy-xframe.html).
3036

31-
## Use of non-default Magento Admin URL
37+
### Use of non-default Magento Admin URL
3238

3339
A simple [Magento Admin](https://glossary.magento.com/magento-admin) [URL](https://glossary.magento.com/url) (like `admin` or `backend`) makes it easy to target attacks on specific locations using automated password guessing. To prevent against this type of attack, Magento by default creates a random Admin URI when you install the product. The CLI command `php bin/magento info:adminuri` is provided so that you can see the URI if you forget it. You can also use the CLI to change this URI. Although the use of a non-default admin URL will not secure the site, its use will help prevent large-scale automated attacks. See [Display or change the Admin URI]({{page.baseurl}}/install-gde/install/cli/install-cli-adminurl.html) in Configuration Guide for more information.
3440

3541
{:.ref-header}
3642
Related topics
3743

3844
[Configuration Guide]({{page.baseurl}}/config-guide/bk-config-guide.html)
45+
46+
[1]: https://docs.magento.com/m2/ee/user_guide/stores/compliance-industry.html
47+
[2]: https://www.adobe.com/security/engineering.html
48+
[3]: https://www.adobe.com/content/dam/acom/en/security/pdfs/Adobe-Magento-Commerce-Best-Practices-Guide.pdf

0 commit comments

Comments
 (0)