Question

Secure way to store files

Posted March 18, 2021 307 views
MongoDBNode.jsDigitalOceanReact

I’m planning to host my future web app on digital ocean and I’m looking for a way to store uploaded files.
It’s a small application with an average of 10 pdf files(50kb each) per user for a total of 200 users. So, I thought of storing the files on the web server( currently I store them locally on my computer). For the basic plan I read that 25gb ssd space is allowed, if I’m not wrong it should be ok for what I want to do. However, is it secure enough to store files this way ?
Thank you.

These answers are provided by our Community. If you find them useful, show some love by clicking the heart. If you run into issues leave a comment, or add your own answer to help others.

×
Submit an Answer
1 answer

Hello @serine

You can host the files on your droplet without any hesitation. You can tweak the configuration of the droplet and make sure that only public-keys are allowed to access the droplet via ssh and also configure the Firewall and only allow ports that are actually needed.

Additionally, you can always start with a 25GB droplet and upgrade it in the future in case this is needed. The 25GB droplet will be perfect to start this project.

You can also check the initial server setup article here:

https://www.digitalocean.com/community/tutorials/initial-server-setup-with-ubuntu-20-04

In order to enable pub-key authentication check this tutorial:

https://www.digitalocean.com/community/tutorials/how-to-configure-ssh-key-based-authentication-on-a-linux-server

You can check this tutorial on How To Set Up a Firewall with UFW on Ubuntu 20.04

https://www.digitalocean.com/community/tutorials/how-to-set-up-a-firewall-with-ufw-on-ubuntu-20-04

Hope that this helps
Regards,
Alex

by Justin Ellingwood
by Brian Boucheron
SSH, or secure shell, is the most common way of administering remote Linux servers. Although the daemon allows password-based authentication, exposing a password-protected account to the network can open up your server to brute-force attacks. In this guide, we demonstrate how to configure your server with SSH keys, which is the recommended authentication method. These are much more difficult for attackers to work around, giving you a more secure login mechanism.