X-Cart Store Security
page last edited on 27 August 2018
Security is the main concern when it comes to e-commerce. Since financial transactions are the backbone of e-commerce, if not the entire purpose of it, any hesitation on the part of the customer when it comes to making online payments could spoil the e-commerce party. Outside of financial consequences, data breaches damage a brand’s reputation and can cause once loyal customers to avoid putting their information at risk again.
Proper X-Cart store security set-up will minimize the threat of fraud and instill trust within your customer base.
- Step 1. Secure Server Configuration
- Step 2. Use SSL Certificates
- Step 3. Keep the software up-to-date
- Step 4. Limit staff access to the store back-end
- Step 5. Make sure your store has multi-layered security
- Step 6. Protect X-Cart from XSS- and CSRF-attacks
Step 1. Secure Server Configuration
Step 2. Use SSL Certificates
Make sure the server X-Cart is hosted at has an SSL (Secure Sockets Layer) Certificate installed. This will allow you to run you store in a secure HTTPS mode (can be enabled in the System tools -> HTTPS settings section).
SSL certificates secure the data in transit during checkout. This keeps your company and your customers protected from having financial or important information compromised by hackers. More information on how to redirect customers from HTTP to HTTPS you can get here.
Step 3. Keep the software up-to-date
Perform regular X-Cart sofware upgrades. Automatic updates should be a standard practice not only to add new features to the store and update exising ones, but also to prevent new vulnerabilities to viruses and malware.
Step 4. Limit staff access to the store back-end
X-Cart allows to set special user access permissions for different staff members depending on the roles they are performing in your store. Make sure each staff member has his personal account in your store and does not not use the main root admin account.
Besides that X-Cart has a special brut force protection built-in for both admin and customer login. In case of 6 failed login attempts (wrong password for a username) the login form is automatically blocked for 2 minutes. Each failed attempt to log in with an admin e-mail is registered and a special notification about it is sent to the administrator email specified in the store Contacts (Store setup -> Contact information):
For more protection use the built-in Two Factor Authentication module that enables a two-step verification for both admin and customer accounts.
Step 5. Make sure your store has multi-layered security
Credit card fraud is the most common security threat that online retailers face. To avoid it and minimize the possibility of fraud orders and accounts use:
PCI-DSS certified payment solutions
X-Cart doesn’t store credit card data info to avoid an unauthorized access to customers’ payment information and is integrated with the certified payment solutions only. So just choose any online payment system that is pci-dss compliant and processes transactions securely. Altenative payment solutions can be used via a special pci-dss certified module - X-Payments.
X-Cart has a built-in antifraud protection via the AntiFraud Service Connector module. The module helps to identify online fraud using sophisticated checking algorithm and reduces chargebacks.
As an additional mean of protection don’t allow anonimous checkout. You can engage customers in registering an account with your store using the Register On Checkout module.
Address Verification System (AVS)
One of the safest ways online retailers can facilitate credit card processing is by the use of an Address Verification System (AVS). This system is capable of comparing a customer’s billing address against the information stored on file by a credit card issuer. It can block any suspicious transactions if the information provided doesn’t match with the one stored on the credit card. AVS is widely supported by Visa, MasterCard and American Express in the USA, Canada and United Kingdom and is used by e.g. UPS, U.S.P.S., Canada Post, 2Checkout, Braintree, etc.
Use Google reCAPTCHA module to protect your shop from robots creating fake user accounts and sending SPAM through your site. The module will add a special
For more security use the Block Users by IP / Country / User agent module that will protect your store from bots and fraud customers, by limiting or completely restricting access to it with the help of flexible settings and filters, taking into account IP, address and user behavior.
Step 6. Protect X-Cart from XSS- and CSRF-attacks
To protect X-Cart from XSS- and CSRF-attacks configure the etc/config.php file to return special headers. For this purpose find the following parts of code in the etc/config.php file and set the appropriate value depending on the case. The values definition you can find following the help links.
; X-Frame-Options value ; For possible values see https://developer.mozilla.org/en-US/docs/Web/HTTP/X-Frame-Options ; Examples: ; x_frame_options = ‘disabled’ ; x_frame_options = ‘sameorigin’ x_frame_options = ‘sameorigin’
; X-XSS-Protection value ; For possible values see https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-XSS-Protection ; Examples: ; x_xss_protection = ‘disabled’ # prevent X-XSS-Protection header sending ; x_xss_protection = ‘0’ ; x_xss_protection = ‘1; mode=block’ x_xss_protection = ‘1; mode=block’
; Content-Security-Policy value ; For possible values see https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy ; Examples: ; content_security_policy = ‘disabled’ # prevent Content-Security-Policy header sending ameorigin content_security_policy = “default-src ‘self’” ; content_security_policy = “default-src ‘self’; img-src *;” content_security_policy = ‘disabled’
; X-Content-Type-Options value ; For possible values see https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Content-Type-Options ; Examples: ; x_content_type_options = ‘disabled’ # prevent X-Content-Type-Options header sending ; x_content_type_options = ‘nosniff’ x_content_type_options = ‘nosniff’
To protect from CSRF attacks X-Cart uses special form id that can be either unique for each form (per-form) or the same for one session (per-session). The default setting is “per-session”.
; CSRF token strategy ; possible values: per-session, per-form csrf_strategy = per-session
Help make this document better
This guide, as well as the rest of our docs, are open-source and available on GitHub.