<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://serverrental.store/index.php?action=history&amp;feed=atom&amp;title=Data_Encryption</id>
	<title>Data Encryption - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://serverrental.store/index.php?action=history&amp;feed=atom&amp;title=Data_Encryption"/>
	<link rel="alternate" type="text/html" href="https://serverrental.store/index.php?title=Data_Encryption&amp;action=history"/>
	<updated>2026-04-14T18:23:34Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.36.1</generator>
	<entry>
		<id>https://serverrental.store/index.php?title=Data_Encryption&amp;diff=1485&amp;oldid=prev</id>
		<title>Admin: Automated server configuration article</title>
		<link rel="alternate" type="text/html" href="https://serverrental.store/index.php?title=Data_Encryption&amp;diff=1485&amp;oldid=prev"/>
		<updated>2025-04-15T10:17:21Z</updated>

		<summary type="html">&lt;p&gt;Automated server configuration article&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;# Data Encryption on MediaWiki Servers&lt;br /&gt;
&lt;br /&gt;
This article details the data encryption methods employed on our MediaWiki servers. It is intended for new server engineers and system administrators responsible for maintaining the security of our platform. Understanding these configurations is crucial for ensuring data confidentiality, integrity, and availability.&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
&lt;br /&gt;
Data encryption is a fundamental aspect of our server security strategy. We utilize a layered approach encompassing encryption at rest, encryption in transit, and database encryption to protect sensitive information. This approach mitigates risks associated with unauthorized access, data breaches, and compliance requirements. This article will cover each layer in detail.  Please also review our [[Security Policy]] and [[Disaster Recovery Plan]] for related information.&lt;br /&gt;
&lt;br /&gt;
== Encryption at Rest ==&lt;br /&gt;
&lt;br /&gt;
Encryption at rest refers to the encryption of data when it is stored on our physical server disks. This protects data even if the physical storage media is compromised. We primarily use [[LUKS]] (Linux Unified Key Setup) for full disk encryption on all server drives containing user data, wiki content, and database files.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Encryption Algorithm&lt;br /&gt;
! Key Size&lt;br /&gt;
! Mode of Operation&lt;br /&gt;
! Performance Impact&lt;br /&gt;
|-&lt;br /&gt;
| AES&lt;br /&gt;
| 256-bit&lt;br /&gt;
| XTS&lt;br /&gt;
| Minimal (hardware acceleration utilized)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
The encryption keys are managed securely using a [[Key Management System (KMS)]], ensuring that access to these keys is strictly controlled and audited.  Regular key rotation is performed as defined in the [[Key Rotation Policy]].  Furthermore, we employ [[Data Masking]] techniques for particularly sensitive data within configuration files.  A full system backup and restore procedure, tested quarterly, is documented in the [[Backup Procedures]] article.&lt;br /&gt;
&lt;br /&gt;
== Encryption in Transit ==&lt;br /&gt;
&lt;br /&gt;
Encryption in transit protects data while it is being transmitted between the client (user's browser) and the server, and between different servers within our infrastructure.  We enforce HTTPS (Hypertext Transfer Protocol Secure) for all connections to the MediaWiki website.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Protocol&lt;br /&gt;
! Certificate Authority&lt;br /&gt;
! Cipher Suites&lt;br /&gt;
! TLS Version&lt;br /&gt;
|-&lt;br /&gt;
| TLS 1.3 (preferred)&lt;br /&gt;
| Let's Encrypt&lt;br /&gt;
| TLS_AES_128_GCM_SHA256, TLS_AES_256_GCM_SHA384, TLS_CHACHA20_POLY1305_SHA256&lt;br /&gt;
| 1.3&lt;br /&gt;
|-&lt;br /&gt;
| TLS 1.2 (fallback)&lt;br /&gt;
| Let's Encrypt&lt;br /&gt;
| TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384&lt;br /&gt;
| 1.2&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Our web server configuration (detailed in the [[Web Server Configuration]] article) strictly enforces the use of secure cipher suites and disables support for older, vulnerable protocols like SSLv3.  We regularly scan for and address vulnerabilities related to TLS/SSL using tools like [[SSL Labs Server Test]].  Internal server-to-server communication also utilizes TLS, often with mutual authentication for enhanced security, as described in the [[Internal Communication Security]] document. Furthermore, our [[Load Balancer Configuration]] ensures that all traffic is properly encrypted before reaching the backend servers.&lt;br /&gt;
&lt;br /&gt;
== Database Encryption ==&lt;br /&gt;
&lt;br /&gt;
The MediaWiki database, which stores critical information like user accounts, revisions, and configuration settings, is also encrypted. We use Transparent Data Encryption (TDE) provided by our database system (MySQL/MariaDB).&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Database Engine&lt;br /&gt;
! Encryption Method&lt;br /&gt;
! Key Management&lt;br /&gt;
! Performance Overhead&lt;br /&gt;
|-&lt;br /&gt;
| MariaDB 10.6+&lt;br /&gt;
| InnoDB Transparent Data Encryption&lt;br /&gt;
| KMS integration&lt;br /&gt;
| ~2-5% (dependent on workload)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
TDE encrypts the database files on disk without requiring modifications to the application code.  The encryption keys are again managed by our KMS. Regular database backups are encrypted using the same keys, ensuring the confidentiality of backup data as detailed in the [[Database Backup and Recovery]] guide.  Database access is also restricted using [[Role-Based Access Control]] (RBAC) to limit the potential impact of unauthorized access.  You should also review the [[Database Server Hardening]] article for additional security measures.  Finally, we use [[Database Auditing]] to monitor and log all database activity.&lt;br /&gt;
&lt;br /&gt;
== Monitoring and Auditing ==&lt;br /&gt;
&lt;br /&gt;
Continuous monitoring and auditing are essential to ensure the effectiveness of our data encryption strategy. We use security information and event management (SIEM) systems to collect and analyze logs from all servers and network devices.  Alerts are configured to notify security personnel of any suspicious activity, such as failed encryption attempts or unauthorized access to encryption keys.  Regular security audits are conducted by our internal security team and external security consultants.  See the [[Security Audit Procedures]] for details.&lt;br /&gt;
&lt;br /&gt;
== Conclusion ==&lt;br /&gt;
&lt;br /&gt;
Data encryption is a critical component of our overall server security architecture. By implementing a layered approach encompassing encryption at rest, in transit, and at the database level, we significantly reduce the risk of data breaches and protect the confidentiality of our users' information.  It is vital that all server engineers and system administrators understand these configurations and adhere to the policies outlined in this article and related documentation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[MediaWiki Security]]&lt;br /&gt;
[[Server Administration]]&lt;br /&gt;
[[Database Security]]&lt;br /&gt;
[[HTTPS Configuration]]&lt;br /&gt;
[[Key Management]]&lt;br /&gt;
[[Backup Procedures]]&lt;br /&gt;
[[Disaster Recovery]]&lt;br /&gt;
[[Security Policy]]&lt;br /&gt;
[[Web Server Configuration]]&lt;br /&gt;
[[Internal Communication Security]]&lt;br /&gt;
[[Load Balancer Configuration]]&lt;br /&gt;
[[Database Backup and Recovery]]&lt;br /&gt;
[[Role-Based Access Control]]&lt;br /&gt;
[[Database Server Hardening]]&lt;br /&gt;
[[Database Auditing]]&lt;br /&gt;
[[SSL Labs Server Test]]&lt;br /&gt;
[[Security Audit Procedures]]&lt;br /&gt;
[[Data Masking]]&lt;br /&gt;
[[Key Rotation Policy]]&lt;br /&gt;
[[LUKS]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Server Hardware]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Intel-Based Server Configurations ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Configuration&lt;br /&gt;
! Specifications&lt;br /&gt;
! Benchmark&lt;br /&gt;
|-&lt;br /&gt;
| [[Core i7-6700K/7700 Server]]&lt;br /&gt;
| 64 GB DDR4, NVMe SSD 2 x 512 GB&lt;br /&gt;
| CPU Benchmark: 8046&lt;br /&gt;
|-&lt;br /&gt;
| [[Core i7-8700 Server]]&lt;br /&gt;
| 64 GB DDR4, NVMe SSD 2x1 TB&lt;br /&gt;
| CPU Benchmark: 13124&lt;br /&gt;
|-&lt;br /&gt;
| [[Core i9-9900K Server]]&lt;br /&gt;
| 128 GB DDR4, NVMe SSD 2 x 1 TB&lt;br /&gt;
| CPU Benchmark: 49969&lt;br /&gt;
|-&lt;br /&gt;
| [[Core i9-13900 Server (64GB)]]&lt;br /&gt;
| 64 GB RAM, 2x2 TB NVMe SSD&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [[Core i9-13900 Server (128GB)]]&lt;br /&gt;
| 128 GB RAM, 2x2 TB NVMe SSD&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [[Core i5-13500 Server (64GB)]]&lt;br /&gt;
| 64 GB RAM, 2x500 GB NVMe SSD&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [[Core i5-13500 Server (128GB)]]&lt;br /&gt;
| 128 GB RAM, 2x500 GB NVMe SSD&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [[Core i5-13500 Workstation]]&lt;br /&gt;
| 64 GB DDR5 RAM, 2 NVMe SSD, NVIDIA RTX 4000&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== AMD-Based Server Configurations ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Configuration&lt;br /&gt;
! Specifications&lt;br /&gt;
! Benchmark&lt;br /&gt;
|-&lt;br /&gt;
| [[Ryzen 5 3600 Server]]&lt;br /&gt;
| 64 GB RAM, 2x480 GB NVMe&lt;br /&gt;
| CPU Benchmark: 17849&lt;br /&gt;
|-&lt;br /&gt;
| [[Ryzen 7 7700 Server]]&lt;br /&gt;
| 64 GB DDR5 RAM, 2x1 TB NVMe&lt;br /&gt;
| CPU Benchmark: 35224&lt;br /&gt;
|-&lt;br /&gt;
| [[Ryzen 9 5950X Server]]&lt;br /&gt;
| 128 GB RAM, 2x4 TB NVMe&lt;br /&gt;
| CPU Benchmark: 46045&lt;br /&gt;
|-&lt;br /&gt;
| [[Ryzen 9 7950X Server]]&lt;br /&gt;
| 128 GB DDR5 ECC, 2x2 TB NVMe&lt;br /&gt;
| CPU Benchmark: 63561&lt;br /&gt;
|-&lt;br /&gt;
| [[EPYC 7502P Server (128GB/1TB)]]&lt;br /&gt;
| 128 GB RAM, 1 TB NVMe&lt;br /&gt;
| CPU Benchmark: 48021&lt;br /&gt;
|-&lt;br /&gt;
| [[EPYC 7502P Server (128GB/2TB)]]&lt;br /&gt;
| 128 GB RAM, 2 TB NVMe&lt;br /&gt;
| CPU Benchmark: 48021&lt;br /&gt;
|-&lt;br /&gt;
| [[EPYC 7502P Server (128GB/4TB)]]&lt;br /&gt;
| 128 GB RAM, 2x2 TB NVMe&lt;br /&gt;
| CPU Benchmark: 48021&lt;br /&gt;
|-&lt;br /&gt;
| [[EPYC 7502P Server (256GB/1TB)]]&lt;br /&gt;
| 256 GB RAM, 1 TB NVMe&lt;br /&gt;
| CPU Benchmark: 48021&lt;br /&gt;
|-&lt;br /&gt;
| [[EPYC 7502P Server (256GB/4TB)]]&lt;br /&gt;
| 256 GB RAM, 2x2 TB NVMe&lt;br /&gt;
| CPU Benchmark: 48021&lt;br /&gt;
|-&lt;br /&gt;
| [[EPYC 9454P Server]]&lt;br /&gt;
| 256 GB RAM, 2x2 TB NVMe&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Order Your Dedicated Server ==&lt;br /&gt;
[https://powervps.net/?from=32 Configure and order] your ideal server configuration&lt;br /&gt;
&lt;br /&gt;
=== Need Assistance? ===&lt;br /&gt;
* Telegram: [https://t.me/powervps @powervps Servers at a discounted price]&lt;br /&gt;
&lt;br /&gt;
⚠️ *Note: All benchmark scores are approximate and may vary based on configuration. Server availability subject to stock.* ⚠️&lt;/div&gt;</summary>
		<author><name>Admin</name></author>
	</entry>
</feed>