Hi there
I have employed a Freelancer to update Magento Patches to my website (since I don't know how to do it myself). He has asked for SFTP/SSH details.
I want to know that once he gets these details, can he access any private information from my website relating to sales, client details, addresses etc?
My Internet Provider is in Australia. They have said to only give the SSH details to someone I trust. My website is via Magento (I do simple things like upload pics & pricing etc) and clients can just go onto website and purchase. However, I need a lot of new installations put in place (and I don't know how to do it myself).
As I said, he has asked for SFTP/SSH details. I got those from my IP. Is it safe to give him this information?
I don't know this person (as he's in India) so I just want him to be able to install the patches and not compromise my website.
I have already given him access to my cPanel through VentraIP as he needed to correct the security/SSL of my site. He did that and fixed the problem quickly.
He has LIMITED access to my website backend (so he can't see client names, addresses, credit card details etc).
I would appreciate answers to all of the above. Should I allow him to access everything through the SSH info via the cPanel? I need to have some of the patches updated on my website anyway as it hasn't had it done in about 3 years.
While I don't have eyes on your particular cPanel and configuration...
With cPanel access, it's likely that your developer has access to your database and file system through modules like "File Manager" and "phpMyAdmin".
https://documentation.cpanel.net/display/68Docs/cPanel+Features+List
The database is where customer and other sensitive data is stored. Additionally, files can be adjusted or malicious purposes through File Manager. With database access, it can even be possible to gain full admin access to the Magento admin panel.
SSH is likely to give even more access, which you should be careful about, but it is the preferred way to push changes to the site. However, it sounds like the cat is already out of the bag.
You should only be using developers that you trust and that you have a reasonable contract with.
Additionally, you should not be storing any credit card data within your site. It should be transmitted directly to a secure payment gateway like PayPal, Authorize.net, Amazon Payments, etc. That's not to say that with this kind of access that a developer couldn't subvert that and put up their own checkout form to steal credit card data, but regardless, there shouldn't be stored credit card data sitting around to be stolen. Please be sure to be PCI Compliant.
Lastly, if your site was 3 years behind in security patches, there's a chance that your site was already compromised in some way. While patching is important, it's recommended to run some security scans as well to make sure that you're in good shape. Hackers scan the web looking for vulnerable sites to abuse, so even if you think you're a low-priority target, it's best to verify. Adding the missing security patches is extremely important, but those patches won't necessarily overwrite existing injections into the site.
It sounds like you're heading on the right path by starting to prioritize security. Sorry if this isn't what you were hoping to hear, but I wish you the best of luck with your site and do hope that this information is helpful!
Would you be willing to consider turning to third-party ecommerce website development services? Because if yes, you'll be much better off with just hiring professionals, who can make sure that your website will be secured and up to the current industry standards.