Ausnahme gefangen: SSL certificate problem: certificate is not yet valid ๐Ÿ“Œ Free & Easy Staging Environments for WordPress Sites on AWS

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š Free & Easy Staging Environments for WordPress Sites on AWS


๐Ÿ’ก Newskategorie: IT Security Nachrichten
๐Ÿ”— Quelle: twingate.com


If you are a web developer working with clients, running your own business website, or simply hosting your personal blog, you likely want to have a way for you or your customers to privately preview changes before they are made public. With Twingate Starter, you can easily create a private staging environment that is completely inaccessible from the public internet but still shareable with collaborators or clients โ€” all without setting up a VPN, port forwarding, static IP addresses, or configuring DDNS.

In this guide, weโ€™ll walk through how to set things up on WordPress running on Amazon Lightsail, but the same general steps also work if you use other solutions like AWS EC2, Digital Ocean, or Linode. Please also join us in our community forum to share and discuss your experience and any other use cases youโ€™ve discovered!

Prerequisites

Amazon Lightsail is an easy way to get up and running on AWS and comes with pre-configured instances of WordPress to make it really fast to start building a website, and it is free for the first 3 months. Please follow the short guide here to create an instance if you donโ€™t already have one.

Restrict access to your Lightsail instance

After the quick setup, you (or anyone else) are now able to access your WordPress site via the Public IP address associated with your Lightsail instance. Since we want to restrict access to our staging environment, we can go to the โ€œNetworkingโ€ tab and remove the HTTP/HTTPS access rules under the โ€œIPv4 Firewallโ€ section.

Remove public access
Remove public access

If you try the Public IP address again, you should find that itโ€™s no longer accessible.

Site is inaccessible
Site is inaccessible

In the rest of this guide, weโ€™ll show you how to use Twingate to grant yourself (or any other trusted party) secure, private access to your instance via just the Private IP address.

Sign up for Twingate

Twingate Starter is a new free plan that is designed for home and personal use. If you donโ€™t have an account already, please click here and follow the simple steps to sign up for a Starter account and begin the initial setup.

Create a Remote Network

After creating a Twingate account, from the main โ€œNetworkโ€ page, add a new Remote Network and give it a name. This represents the network weโ€™re going to connect to โ€” in this case, our Lightsail instance.

Create a Remote Network
Create a Remote Network

Add a Connector

The next step is to deploy a Twingate Connector, which is a piece of software that allows for secure access to your remote network and the services running on it. In addition to Lightsail, it can also be deployed to other cloud instances (AWS EC2, GCP, Azure, etc.) as well as your home devices, including:

In this case, weโ€™ll set it up on our Lightsail instance. Click on one of the automatically generated Connectors (the names are random) and complete the following steps:

  1. Click on Linux as the deployment method
  2. Generate tokens. Youโ€™ll be prompted to sign in again, after which you should see two new tokens.
  3. Copy the automatically generated shell command. You will soon run this command on your Lightsail instance to install the Connector there.
    Deploy the Connector
    Deploy the Connector

Go to your Lightsail instance, and under the โ€œConnectโ€ tab, click the โ€œConnect using SSHโ€ button.

Connect to Lightsail instance using SSH
Connect to Lightsail instance using SSH

This will open up a new window with a Linux terminal connected to your instance. Paste in and execute the command that was generated by your Twingate Connector (your tokens and Twingate URL will be different).

Run the Twingate Connector command
Run the Twingate Connector command

After just a minute or so, the command should complete and you should see that the Connector status has turned green, indicating that youโ€™ve successfully deployed the Connector on your Lightsail instance.

Connector is connected
Connector is connected

Add a Resource

Go back to your Remote Network and click on the โ€œAdd Resourceโ€ link. Youโ€™ll see a popup like the one below. Click on the โ€œCIDR Addressโ€ box, choose a Label name for the Resource, enter the private IP address of your Lightsail instance thatโ€™s displayed in the โ€œNetworkingโ€ tab of your Lightsail console, and click โ€œAdd Resourceโ€. Congrats! You now have secure, private access to you Lightsail instance and can use it as a staging environment for your WordPress site.

Add a Resource
Add a Resource

Download the Twingate client

All thatโ€™s left to do now is to install Twingate on your device (we support Windows, Mac, Linux and have apps for iOS and Android) to authenticate your account and authorize your access to the instance. As an example, letโ€™s walk through setting up the Twingate client on macOS.

First, download and install the macOS app here. Type in the Network URL that you chose when you signed up (the [abc] part of [abc].twingate.com) and click โ€œJoin Networkโ€. Youโ€™ll be asked to log in using the same account you used to sign up. After signing in, youโ€™ll see that Twingate is connected with access to the Resource you created.

Client is connected
Client is connected

Click on โ€œOpen in Browserโ€ฆโ€ and you should see your WordPress site is accessible via the Private IP address of your Lightsail instance, even though itโ€™s not accessible via the Public IP address.

Client access
Client access

Finally, disconnect from Twingate and try accessing the site again โ€” you should see that itโ€™s inaccessible via both the Private and Public IP addresses.

Congrats! Youโ€™ve finished setting up Twingate for your Lightsail instance and used it to create a staging environment for your WordPress site. If you run anything else on your instance like a web app, you now have a private staging environment for those as well. Join us in the community forum to share how things went and what cool use cases youโ€™ve discovered!

Sharing is Caring

Do you want to share access to the WordPress site with a client, collaborator, or friend? You can easily do this from the Twingate web UI. Just go to the โ€œTeamโ€ tab and click โ€œInvite Userโ€ to send an email invitation. The recipient would simply follow the same steps to download the Twingate client, join your network, and get access to the WordPress site, or any other resource you set up!

Invite other users
Invite other users

...



๐Ÿ“Œ Free & Easy Staging Environments for WordPress Sites on AWS


๐Ÿ“ˆ 66.72 Punkte

๐Ÿ“Œ Shipt: Multiple Subdomain Takeovers: fly.staging.shipt.com, fly.us-west-2.staging.shipt.com, fly.us-east-1.staging.shipt.com


๐Ÿ“ˆ 52.96 Punkte

๐Ÿ“Œ Staging Environments for WordPress Sites on GCP


๐Ÿ“ˆ 43.76 Punkte

๐Ÿ“Œ t3n Daily: Adobe & Figma, Ethereum & NFT, Steuer & Homeoffice, KI & Gruselfrau


๐Ÿ“ˆ 28.29 Punkte

๐Ÿ“Œ A botnet of over 20,000 WordPress sites is attacking other WordPress sites


๐Ÿ“ˆ 27.5 Punkte

๐Ÿ“Œ Infected WordPress Sites Are Attacking Other WordPress Sites


๐Ÿ“ˆ 27.5 Punkte

๐Ÿ“Œ Botnet of 20,000 WordPress Sites Infecting Other WordPress Sites


๐Ÿ“ˆ 27.5 Punkte

๐Ÿ“Œ Botnet of 20,000 WordPress Sites Infecting Other WordPress Sites


๐Ÿ“ˆ 27.5 Punkte

๐Ÿ“Œ Ether Easy Converter/Easy Creator/Easy Burner 1.4.24 memory corruption


๐Ÿ“ˆ 24.87 Punkte

๐Ÿ“Œ Ether Easy Converter/Easy Creator/Easy Burner 1.4.24 Pufferรผberlauf


๐Ÿ“ˆ 24.87 Punkte

๐Ÿ“Œ Mastering Python Development Environments: A Comprehensive Guide to Virtual Environments


๐Ÿ“ˆ 24.71 Punkte

๐Ÿ“Œ DevSecOps with AWS โ€“ ChatOps with AWS and AWS Developer Tools โ€“ Part 1


๐Ÿ“ˆ 22.92 Punkte

๐Ÿ“Œ Hacked WordPress sites use visitors' browsers to hack other sites


๐Ÿ“ˆ 22.62 Punkte

๐Ÿ“Œ WordPress Staging โ€“ unfallfrei entwickeln und testen


๐Ÿ“ˆ 22.53 Punkte

๐Ÿ“Œ CVE-2022-2863 | Migration, Backup, Staging Plugin up to 0.9.75 on WordPress path traversal (ID 168616)


๐Ÿ“ˆ 22.53 Punkte

๐Ÿ“Œ CVE-2022-2737 | WP STAGING Plugin up to 2.9.17 on WordPress cross site scripting


๐Ÿ“ˆ 22.53 Punkte

๐Ÿ“Œ CVE-2023-6113 | WP STAGING Backup Plugin on WordPress Backup Process information disclosure


๐Ÿ“ˆ 22.53 Punkte

๐Ÿ“Œ CVE-2023-7204 | WP STAGING Backup Plugin up to 3.1.x on WordPress access control


๐Ÿ“ˆ 22.53 Punkte

๐Ÿ“Œ WordPress Easy WP SMTP zero-day potentially exposes hundreds of thousands of sites to hack


๐Ÿ“ˆ 22.04 Punkte

๐Ÿ“Œ WordPress Easy WP SMTP zero-day Vulnerability Exposes Hundreds of Thousands of Sites to Hack


๐Ÿ“ˆ 22.04 Punkte

๐Ÿ“Œ http://umkm.padang.go.id/index.php?option=com_content&view=article&id=46&Itemid=78


๐Ÿ“ˆ 21.22 Punkte

๐Ÿ“Œ http://swat.sragenkab.go.id/index.php?option=com_content&view=article&id=76&Itemid=27


๐Ÿ“ˆ 21.22 Punkte

๐Ÿ“Œ 12/13/18 WordPress Botnet Attacking WordPress Sites | AT&T ThreatTraq


๐Ÿ“ˆ 20.98 Punkte

๐Ÿ“Œ Logging Made Easy for Windows Environments


๐Ÿ“ˆ 20.65 Punkte

๐Ÿ“Œ Pacu - The AWS Exploitation Framework, Designed For Testing The Security Of Amazon Web Services Environments


๐Ÿ“ˆ 20 Punkte

๐Ÿ“Œ Awspx - A Graph-Based Tool For Visualizing Effective Access And Resource Relationships In AWS Environments


๐Ÿ“ˆ 20 Punkte

๐Ÿ“Œ New tool detects shadow admin accounts in AWS and Azure environments


๐Ÿ“ˆ 20 Punkte

๐Ÿ“Œ Securing AWS EKS Environments


๐Ÿ“ˆ 20 Punkte

๐Ÿ“Œ scout2-security-auditing-tool-for-aws-environments


๐Ÿ“ˆ 20 Punkte

๐Ÿ“Œ Data from 316 million real-world attacks in AWS and Azure environments


๐Ÿ“ˆ 20 Punkte

๐Ÿ“Œ AWS Nitro Enclaves: Create isolated environments to protect highly sensitive workloads


๐Ÿ“ˆ 20 Punkte

๐Ÿ“Œ Finding Your Fit: Crafting Diverse Development Environments on AWS Lightsail


๐Ÿ“ˆ 20 Punkte

๐Ÿ“Œ Webinar Today: Advanced Tips for Securing Large AWS Environments


๐Ÿ“ˆ 20 Punkte











matomo