Protecting User Accounts

31 Mar 2025 -

By default, Drupal offers several robust account protection features, including an anti-brute force system that temporarily blocks accounts after multiple failed password attempts within a short period. However, there is always room to enhance security by implementing additional modules and techniques, each with its own advantages and challenges.

Brute Force Control and Login Security

The Flood Control module is essential for managing Drupal’s response to failed login attempts. This module lets you adjust the number of unsuccessful attempts allowed before temporarily blocking an account or access from a specific IP address, which is crucial for preventing brute force attacks.

Key configurations include:

  • Number of Failed Attempts: Define how many errors are allowed before blocking access for an account or IP address.
  • Time Period: Set the interval during which failed attempts are counted before triggering a block.
  • Unlocking: Allows administrators to unlock accounts directly from the interface without database intervention.

Setting these limits requires balance: thresholds that are too low may lock out legitimate users—especially in environments with shared IPs—while thresholds that are too high might not provide adequate protection.

The Login Security module complements Flood Control by sending notifications to administrators when multiple failed login attempts are detected. Its options include:

  • Email Notifications: Sends alerts when a specified number of failed login attempts is reached.
  • Role-based Access Limits: Allows you to define security policies based on user roles, applying stricter restrictions to users with higher privileges.

It is important to configure these alerts to identify suspicious patterns without generating excessive false positives.

Prevention of Username Enumeration

The Username Enumeration Prevention module protects user privacy by preventing attackers from discovering valid usernames through error messages or public pages. This is achieved by intercepting requests that would normally reveal whether a username exists.

Available configurations include:

  • Custom Errors: Configure the server response (for example, returning a 404 error for non-existent usernames).
  • Redirects: Allows you to redirect users to specific pages to avoid standard error messages, enhancing the experience when typos occur.

While hiding the existence of usernames is vital, it is important not to complicate the password recovery process or affect performance on high-traffic sites.

Session Settings

Session and cookie settings are configured in the services.yml file, which allows for detailed control over session behavior.

Key configurations include:

  • gc_maxlifetime: Defines the maximum time (in seconds) a session can remain inactive before it is removed.
  • cookie_lifetime: Sets the duration (in seconds) of the session cookie in the user’s browser. Setting this value to 0 ensures the cookie is deleted when the browser is closed, enhancing security in environments that handle sensitive information.

Finding a balance between security and usability is key, as overly restrictive settings may force users to log in frequently.

Persistent Login

Unlike standard settings that require frequent re-authentication, the Persistent Login module allows sessions to remain active for extended periods. By selecting this option on the login form, an additional cookie is activated that keeps the user authenticated even after closing the browser.

It is important to adjust settings such as:

  • Cookie Duration: Controls how long the persistent cookie remains active.
  • Usage Restrictions: Consider disabling persistent sessions on public or shared devices to prevent unauthorized access.

IP Address Restriction

The Restrict route by IP module adds an extra layer of security by restricting access to specific routes based on IP addresses. This is especially useful for protecting sensitive areas such as intranets or administrative panels.

Some of its features include:

  • IP Specification: Define a list of allowed IP addresses for accessing specific routes.
  • Flexible Configuration: Allows you to associate multiple routes with different IP lists.
  • Controlled Access: Ideal for limiting access to critical areas of the site.

Keep in mind that changes in network infrastructure—such as dynamic IP assignments or new locations—may require adjustments to this configuration.

Prevention or Restriction of "User 1" Access

In Drupal, "User 1" is the superuser with full access to all site functions. Due to its high level of privilege, it is crucial to manage this account with extreme care.

Some strategies to protect the superuser include:

  • Limited Use: Use the superuser account only for strictly necessary tasks, delegating other functions to administrative roles with specific permissions.
  • Monitoring: Implement auditing tools to log and review actions performed by the superuser.
  • Enhanced Authentication: Ensure the superuser is protected by additional measures, such as two-factor authentication.

Since Drupal 10.3, it is possible to disable certain privileges of "User 1" by adjusting a parameter, thereby enhancing security.

Password Policy

A robust password policy is fundamental for protecting site access. The Password Policy module allows you to set strict rules that prevent overly simple passwords or password reuse, strengthening overall security.

Configurable options include:

  • Minimum and Maximum Length: Define the allowed character range to avoid inadequate passwords.
  • Character Types: Require a combination of uppercase, lowercase, numbers, and symbols to increase complexity.
  • Password History: Prevent the reuse of previous passwords.
  • Password Expiration: Force users to change their password after a set period, which is especially useful in corporate environments.

GDPR

Compliance with the General Data Protection Regulation (GDPR) is essential for any site with European traffic. The GDPR module facilitates the secure and transparent management of personal data.

This module automates aspects such as:

  • Right of Access: Allows users to request and receive all information collected about them.
  • Right to be Forgotten: Facilitates the deletion of personal data when it is no longer needed or when consent is withdrawn.
  • Activity Logging: Maintains a detailed log of how personal data is processed.
  • Impact Assessment: Automates the identification and mitigation of risks associated with data processing.

Two-Factor Authentication

Two-factor authentication (2FA) adds an extra layer of security by requiring a second verification method. The TFA module implements 2FA so that even if a password is compromised, the account remains protected.

When configuring 2FA in Drupal, consider:

  • Selecting the Secondary Method: Options such as app-generated codes, SMS messages, or hardware-based methods.
  • Integration with User Flows: Introduce the additional authentication layer smoothly to avoid disrupting the user experience.
  • User Training and Support: Provide clear instructions for setting up and using 2FA.

Balancing security with usability is crucial so that two-factor authentication does not become an obstacle for users.

Conclusion

There is a fine line between robust security and a frustrating user experience. It is essential to enhance protection without imposing overly restrictive measures that block legitimate access.

Implementing security modules and techniques should be a gradual process—starting with reinforcing protection against brute force attacks and, as needed, adding more advanced measures like 2FA, while continually monitoring the impact on usability and performance.

Finally, keeping the system updated and maintaining constant monitoring is key to long-term protection of the site and its users’ data.