If you are given root or administrator access, you likely have a dedicated hosting like our VPS and dedicated server. This is an important credential. Anyone with the credential can access the server to update, delete or append without restriction.
It is important to restrict the access to these users. But how? Basically, there are ways to protect these accounts from unauthorized usages.
- If you have a Linux server you can use TCP wrapper. The TCP wrapper can restrict access using IP addresses for certain service. For example, SSH is sshd. But in order to do this. The IP must have belonged to you permanently. Most do not have static IP internet access. An alternative, you can use a VPN with dedicated IP.
- On a Linux server, you can also use the iptables. But this is less friendly to an end user. I recommend the option above. The firewall method can use on a Windows Server, just add the permitted remote IP in the scope to allow access for remote desktop.
- For Windows or Linux server, you can also use 3rd party 2FA. 2FA stands for two factors authentication. A program installed on your smartphone provides you with a secret code randomly to access your server.
If you are control panels like Plesk onyx or WHM/cPanel. We recommend they should be protected too. In tools and settings in Plesk, you can restrict Plesk admin access. For WHM/ cPanel, you can usee the host access to restrict access, The hot access in the WHM is TCP wrapper in GUI.
I want to say, the extra layer of protection will bring you inconveniences. Think this way, the added security made intrusion difficult especially good to against the cybercrime today.