{"id":82827,"date":"2026-05-05T15:50:24","date_gmt":"2026-05-05T19:50:24","guid":{"rendered":"https:\/\/www.inmotionhosting.com\/blog\/?p=82827"},"modified":"2026-05-05T15:50:29","modified_gmt":"2026-05-05T19:50:29","slug":"dedicated-server-vs-shared-hosting-security-configuration","status":"publish","type":"post","link":"https:\/\/www.inmotionhosting.com\/blog\/dedicated-server-vs-shared-hosting-security-configuration\/","title":{"rendered":"Dedicated Server vs. Managed Shared Hosting: Who Controls Your Security Configuration?"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2026\/04\/dedicated-servers-vs-managed-shared-hosting-1024x538.png\" alt=\"Dedicated Server vs. Managed Shared Hosting: Who Controls Your Security Configuration? hero image\" class=\"wp-image-82906\" srcset=\"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2026\/04\/dedicated-servers-vs-managed-shared-hosting-1024x538.png 1024w, https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2026\/04\/dedicated-servers-vs-managed-shared-hosting-300x158.png 300w, https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2026\/04\/dedicated-servers-vs-managed-shared-hosting-768x403.png 768w, https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2026\/04\/dedicated-servers-vs-managed-shared-hosting.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>On managed shared hosting, the hosting provider controls the server configuration. <\/p>\n\n\n\n<p>They decide which TLS versions to support, how security headers are applied, when software gets patched, and what you&#8217;re allowed to change. On a dedicated server, you do. That distinction doesn&#8217;t matter much when everything is running fine. It matters a great deal when a security audit, a vendor risk review, or a SecurityScorecard report flags specific issues your current environment won&#8217;t let you address.The honest answer to that question is: it depends on who owns the server.<\/p>\n\n\n\n<p>This article explains exactly what security configuration decisions live at the server level, why managed hosting environments limit your access to them, and what actually changes when you move to a dedicated server with root access.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Does &#8220;Managed&#8221; Mean for Security?<\/h2>\n\n\n\n<p>Managed hosting is a tradeoff, not a flaw. The provider handles the infrastructure so you can focus on your site. That includes server setup, software updates, hardware maintenance, and yes, security configuration. The result is a faster path to a running site, with less technical overhead.<\/p>\n\n\n\n<p>The tradeoff is that &#8220;managed&#8221; also means &#8220;configured by someone else.&#8221; The web server, the operating system, the firewall, the TLS stack \u2014 those components are configured according to the provider&#8217;s standards, not yours. Their standards are set once, applied broadly across a shared environment serving many customers, and updated on the provider&#8217;s timeline.<\/p>\n\n\n\n<p>That works well for the vast majority of hosting needs. For businesses that need to meet specific security benchmarks, satisfy enterprise procurement requirements, or fix findings on an external security rating, it creates a ceiling that&#8217;s difficult to work around without changing hosting environments.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Security Decisions Live at the Server Level?<\/h2>\n\n\n\n<p>Several security configurations exist entirely outside your application code and outside your content management system. They&#8217;re set in the web server software \u2014 Apache, cPanel, Nginx, or LiteSpeed \u2014 and in the operating system configuration. The WordPress admin panel, cPanel file manager, and even FTP access don&#8217;t touch them.<\/p>\n\n\n\n<p><strong>TLS protocol versions.<\/strong> Whether your server accepts TLS 1.0, 1.1, 1.2, or 1.3 connections is controlled in the web server&#8217;s SSL configuration file. TLS 1.0 and 1.1 were deprecated by the IETF in 2021 due to known cryptographic vulnerabilities. Whether they remain enabled on your site depends entirely on what the server is configured to accept.<\/p>\n\n\n\n<p><strong>Cipher suites.<\/strong> Which encryption algorithms your server advertises during the TLS handshake is a separate, adjacent configuration. Weak cipher suites \u2014 those using RC4, 3DES, or export-grade key lengths \u2014 appear as distinct findings on security scoring platforms even when you&#8217;ve upgraded TLS versions. Removing them requires editing the same server-level configuration.<\/p>\n\n\n\n<p><strong>HTTP security headers.<\/strong> Headers like HTTP Strict Transport Security (HSTS), Content Security Policy (CSP), X-Content-Type-Options, and X-Frame-Options are sent by the web server with every HTTP response. Adding them reliably requires either a directive in the web server&#8217;s virtual host configuration or an .htaccess rule on Apache servers. The web server sends them before the application layer ever processes the request.<\/p>\n\n\n\n<p><strong>Certificate configuration.<\/strong> The signature algorithm, revocation support (OCSP stapling), and deployment options for a TLS certificate are set when the certificate is installed and configured on the server. An application plugin can&#8217;t change these after the fact.<\/p>\n\n\n\n<p><strong>Software patching cadence.<\/strong> Which version of PHP, OpenSSL, and the Linux kernel is running on the server is determined by whoever manages package updates. How quickly a critical CVE gets patched \u2014 versus how quickly it appears in a scan \u2014 depends on that person&#8217;s schedule and authority.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Security Settings Does Managed Hosting Control on Your Behalf?<\/h2>\n\n\n\n<p>Managed WordPress hosts handle security well within their model. WP Engine, for example, provides a managed firewall that blocks common attacks, automated plugin updates, and around-the-clock monitoring with rapid response to threats and malware. These protections are real, and for many sites they&#8217;re sufficient.<\/p>\n\n\n\n<p>The constraint is that the security decisions are the provider&#8217;s to make, not the customer&#8217;s.<\/p>\n\n\n\n<p>WP Engine closely manages certain settings in order to protect server performance or for security purposes. Their platform documentation lists a set of configurations that customers cannot change independently. Some require submitting a support request with no guaranteed timeline. Revisions in WordPress, for example, cannot be enabled in the wp-config.php or php.ini files, because those settings will be overwritten at the server level.<\/p>\n\n\n\n<p>On TLS, WP Engine has deprecated TLS 1.0 and 1.1 across the platform, and customers don&#8217;t have the option to defer or opt into a version lower than TLS 1.2. That&#8217;s good security practice, and it resolves those specific findings. But the inverse is also true: customers cannot push beyond the platform&#8217;s TLS defaults, cannot select specific cipher suite configurations, and cannot make certificate deployment decisions that differ from what the platform provides.<\/p>\n\n\n\n<p>For HTTP security headers, the situation requires careful reading. Adding security headers from within WordPress \u2014 through a plugin or a custom functions.php entry \u2014 is possible, but it&#8217;s application-layer delivery. A security scanner checking what the server sends at the network level may not see these headers the same way as headers set in the web server configuration. HTTP security headers work best when they are set at the web server level, which means your hosting account. On a managed platform, whether those headers get set at the server level, or how the CDN layer between the customer and the origin server handles them, is the provider&#8217;s decision. On WP Engine&#8217;s Advanced Network, traffic routes through Cloudflare at the DNS level. What headers Cloudflare passes, strips, or modifies in transit depends on how WP Engine has configured that integration, not on what you put in an .htaccess file.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why Is Content Security Policy So Difficult to Fix on Managed Hosting?<\/h2>\n\n\n\n<p><a href=\"https:\/\/www.inmotionhosting.com\/support\/website\/content-security-policy-csp-headers\/\">Content Security Policy<\/a> is the most commonly flagged missing header in external security audits. CSP tells the browser exactly which sources of scripts, styles, images, and other assets are permitted to load on your pages. A missing CSP is a reliable finding on SecurityScorecard, SecurityHeaders.io, and most PCI compliance scans.<\/p>\n\n\n\n<p>Implementing CSP correctly requires two things: a defined policy tailored to your site&#8217;s specific resource dependencies, and reliable delivery of that policy header with every response. The second part is the problem in managed environments.<\/p>\n\n\n\n<p>On an Apache server, you can add a CSP directly to your .htaccess file, which applies the policy site-wide and is more secure than using meta tags. On an Nginx server, you add it to the server block in the virtual host configuration. Both methods require the ability to write to and reload server configuration files. On a managed WordPress platform, those files belong to the provider.<\/p>\n\n\n\n<p>Plugins can inject CSP headers via PHP&#8217;s <code>header()<\/code> function, but this creates several failure modes: caching layers may suppress or override PHP-generated headers, CDN edge nodes may not propagate them consistently, and any CDN configuration change by the provider can silently break delivery. Environments where you&#8217;re unable to access raw server files via cPanel, FTP, or SSH require using a plugin approach, which carries more implementation risk.<\/p>\n\n\n\n<p>The result is a situation where you can do the work to implement a CSP, confirm it&#8217;s &#8220;working&#8221; in your browser, submit a support ticket requesting server-level configuration, and still have the header appear inconsistently in an automated scan.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How Does a Dedicated Server Change Your Security Configuration Options?<\/h2>\n\n\n\n<p>Root access means you own the configuration. Every security decision described above becomes a configuration file you can edit, reload, and verify.<\/p>\n\n\n\n<p>Disabling TLS 1.0 and 1.1 on an Apache server requires one line in the SSL configuration and a service reload. Adding cipher suite restrictions \u2014 removing RC4, 3DES, and export grades \u2014 takes about five additional lines. These changes take effect immediately and can be verified with tools like <code>openssl s_client<\/code> or <a href=\"https:\/\/www.ssllabs.com\/ssltest\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Qualys SSL Labs<\/a> before and after.<\/p>\n\n\n\n<p>Adding HSTS to every response is a single directive in the virtual host block:<\/p>\n\n\n\n<div class=\"wp-block-kevinbatdorf-code-block-pro\" data-code-block-pro-font-family=\"Code-Pro-JetBrains-Mono\" style=\"font-size:.875rem;font-family:Code-Pro-JetBrains-Mono,ui-monospace,SFMono-Regular,Menlo,Monaco,Consolas,monospace;line-height:1.25rem;--cbp-tab-width:2;tab-size:var(--cbp-tab-width, 2)\"><span role=\"button\" tabindex=\"0\" style=\"color:#e1e4e8;display:none\" aria-label=\"Copy\" class=\"code-block-pro-copy-button\"><pre class=\"code-block-pro-copy-button-pre\" aria-hidden=\"true\"><textarea class=\"code-block-pro-copy-button-textarea\" tabindex=\"-1\" aria-hidden=\"true\" readonly>Header always set Strict-Transport-Security \"max-age=31536000; includeSubDomains\"<\/textarea><\/pre><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" style=\"width:24px;height:24px\" fill=\"none\" viewBox=\"0 0 24 24\" stroke=\"currentColor\" stroke-width=\"2\"><path class=\"with-check\" stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M9 5H7a2 2 0 00-2 2v12a2 2 0 002 2h10a2 2 0 002-2V7a2 2 0 00-2-2h-2M9 5a2 2 0 002 2h2a2 2 0 002-2M9 5a2 2 0 012-2h2a2 2 0 012 2m-6 9l2 2 4-4\"><\/path><path class=\"without-check\" stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M9 5H7a2 2 0 00-2 2v12a2 2 0 002 2h10a2 2 0 002-2V7a2 2 0 00-2-2h-2M9 5a2 2 0 002 2h2a2 2 0 002-2M9 5a2 2 0 012-2h2a2 2 0 012 2\"><\/path><\/svg><\/span><pre class=\"shiki github-dark\" style=\"background-color: #24292e\" tabindex=\"0\"><code><span class=\"line\"><span style=\"color: #F97583\">Header<\/span><span style=\"color: #E1E4E8\"> always <\/span><span style=\"color: #B392F0\">set<\/span><span style=\"color: #E1E4E8\"> Strict-Transport-Security &quot;max-age=<\/span><span style=\"color: #79B8FF\">31536000<\/span><span style=\"color: #E1E4E8\">; includeSubDomains&quot;<\/span><\/span><\/code><\/pre><\/div>\n\n\n\n<p>CSP is configured the same way, applied to every response from the origin, not relayed through an application plugin. X-Content-Type-Options, X-Frame-Options, and Referrer-Policy are three additional lines.<\/p>\n\n\n\n<p>Certificate configuration \u2014 OCSP stapling for revocation support, choosing a signing algorithm, setting deployment options \u2014 is handled at provisioning time and can be updated at any time without contacting a provider.<\/p>\n\n\n\n<p>Patching cadence is yours to control, with one important caveat: on an unmanaged server, it&#8217;s also your responsibility. On InMotion Hosting&#8217;s Managed Dedicated Servers, InMotion handles the server-level software and infrastructure, while customers retain root access to make their own security configuration changes.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Dedicated Server vs. Managed Shared Hosting: Which Security Settings Can You Control?<\/h2>\n\n\n\n<p>Let&#8217;s compare what each environment allows.<\/p>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table class=\"has-fixed-layout\"><thead><tr><th class=\"has-text-align-left\" data-align=\"left\">Security Configuration<\/th><th class=\"has-text-align-left\" data-align=\"left\">Managed Shared Hosting<\/th><th class=\"has-text-align-left\" data-align=\"left\">Dedicated Server<\/th><\/tr><\/thead><tbody><tr><td class=\"has-text-align-left\" data-align=\"left\">Disable TLS 1.0 \/ 1.1<\/td><td class=\"has-text-align-left\" data-align=\"left\">Provider-controlled<\/td><td class=\"has-text-align-left\" data-align=\"left\">Customer-controlled<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">Restrict cipher suites<\/td><td class=\"has-text-align-left\" data-align=\"left\">Provider-controlled<\/td><td class=\"has-text-align-left\" data-align=\"left\">Customer-controlled<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">Set HSTS at server level<\/td><td class=\"has-text-align-left\" data-align=\"left\">Provider-controlled<\/td><td class=\"has-text-align-left\" data-align=\"left\">Customer-controlled<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">Set CSP at server level<\/td><td class=\"has-text-align-left\" data-align=\"left\">Provider-controlled<\/td><td class=\"has-text-align-left\" data-align=\"left\">Customer-controlled<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">X-Content-Type-Options<\/td><td class=\"has-text-align-left\" data-align=\"left\">Provider-controlled<\/td><td class=\"has-text-align-left\" data-align=\"left\">Customer-controlled<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">Custom firewall rules<\/td><td class=\"has-text-align-left\" data-align=\"left\">Not available<\/td><td class=\"has-text-align-left\" data-align=\"left\">Customer-controlled<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">OCSP stapling<\/td><td class=\"has-text-align-left\" data-align=\"left\">Provider-controlled<\/td><td class=\"has-text-align-left\" data-align=\"left\">Customer-controlled<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">OS and kernel patching<\/td><td class=\"has-text-align-left\" data-align=\"left\">Provider-controlled<\/td><td class=\"has-text-align-left\" data-align=\"left\">Managed or customer<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">Web server software version<\/td><td class=\"has-text-align-left\" data-align=\"left\">Provider-controlled<\/td><td class=\"has-text-align-left\" data-align=\"left\">Managed or customer<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">Security audit documentation<\/td><td class=\"has-text-align-left\" data-align=\"left\">Provider&#8217;s SOC 2 \/ certifications<\/td><td class=\"has-text-align-left\" data-align=\"left\">Customer-configurable to spec<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>The right column doesn&#8217;t mean &#8220;no support.&#8221; It means the decisions are yours, with expert help available when needed.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2026\/04\/managed-shared-vs-dedicated-server.jpg\" alt=\"managed shared hosting vs dedicated server hosting\" class=\"wp-image-82905\" srcset=\"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2026\/04\/managed-shared-vs-dedicated-server.jpg 1024w, https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2026\/04\/managed-shared-vs-dedicated-server-300x300.jpg 300w, https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2026\/04\/managed-shared-vs-dedicated-server-150x150.jpg 150w, https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2026\/04\/managed-shared-vs-dedicated-server-768x768.jpg 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Does Your Provider&#8217;s Security Certification Cover Your Specific Requirements?<\/h2>\n\n\n\n<p>This is the nuance that often gets lost in comparison articles. Managed platforms like WP Engine have legitimate, serious security practices. WP Engine holds SOC 2 Type II and ISO 27001:2022 certifications, and limits disk write access at the process level to harden the environment against malware injection via vulnerable themes or plugins.<\/p>\n\n\n\n<p>Those certifications reflect the provider&#8217;s security posture. They document how the provider protects the shared infrastructure. What they don&#8217;t address is whether your organization&#8217;s external attack surface \u2014 the IP addresses, domain names, and servers associated with your business \u2014 meets the specific security configuration requirements of your clients, auditors, or security scoring platforms.<\/p>\n\n\n\n<p>An enterprise client running a vendor risk program checks your SecurityScorecard rating, not your provider&#8217;s SOC 2 report. A PCI QSA assessing your environment reviews the TLS configuration on the server where cardholder data transmits, not the host&#8217;s general compliance certification. Those are your configurations to control.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Who Actually Needs a Dedicated Server for Security Reasons?<\/h2>\n\n\n\n<p>Not every website does. Managed Shared Hosting is appropriate, and secure enough, for sites that don&#8217;t face external security auditing requirements and aren&#8217;t processing sensitive data under compliance frameworks.<\/p>\n\n\n\n<p>A dedicated server makes sense when:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Your SecurityScorecard or similar security rating shows configuration findings that require server-level access to fix<\/li>\n\n\n\n<li>An enterprise client or procurement team is requesting documentation of your specific security configurations \u2014 not just a provider&#8217;s certification<\/li>\n\n\n\n<li>You&#8217;re working toward PCI DSS compliance and need to control the TLS configuration, network segmentation, and patching schedule on the server that processes transactions<\/li>\n\n\n\n<li>Your organization has undergone a penetration test or security assessment that flagged server-level findings<\/li>\n\n\n\n<li>You manage multiple client sites and are accountable for the security posture of each one<\/li>\n<\/ul>\n\n\n\n<p>Agencies carrying security liability for client sites \u2014 whether contractually or just reputationally \u2014 routinely discover that shared managed environments put security decisions outside their control at exactly the moments those decisions matter most.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>&#8220;On managed shared hosting, the hosting provider controls the server configuration&#8230; On a dedicated server, with the Professional Services offered by <a href=\"https:\/\/www.inmotionhosting.com\/solutions\/inmotion-solutions\">InMotion Solutions<\/a> Sysadmin team, <strong>you do<\/strong>.&#8221;<br><\/p>\n<\/blockquote>\n<\/blockquote>\n\n\n\n<h2 class=\"wp-block-heading\">What Should You Clarify Before Switching to a Dedicated Server?<\/h2>\n\n\n\n<p>Moving to a dedicated server is a meaningful infrastructure decision. Before making that move, clarify a few things:<\/p>\n\n\n\n<p><strong>Which specific findings need to be fixed?<\/strong> Not all SecurityScorecard findings require a dedicated server. Some are fixable via CDN configuration, DNS updates, or SSL provider changes. Identify which findings specifically require server-level configuration access.<\/p>\n\n\n\n<p><strong>Who will manage the server configuration?<\/strong> Root access creates responsibility. If you don&#8217;t have in-house sysadmin capacity, factor in the cost of managed support or professional services.<\/p>\n\n\n\n<p><strong>What does your compliance requirement actually specify?<\/strong> PCI DSS, SOC 2, and HIPAA each have specific scope definitions. Confirm that the server configuration change you need is within scope and will satisfy the audit requirement.<\/p>\n\n\n\n<p>InMotion Hosting&#8217;s <a href=\"https:\/\/www.inmotionhosting.com\/dedicated-servers\">Dedicated Servers<\/a> include full root access and cPanel\/WHM control, with managed infrastructure support from the InMotion team. The Premier Care Bundle adds Monarx malware defense, 500GB of backup storage, and monthly time with <a href=\"https:\/\/www.inmotionhosting.com\/solutions\/inmotion-solutions\">InMotion Solutions<\/a> \u2014 the in-house sysadmin team available for security hardening, TLS configuration, and compliance-oriented server setup. <a href=\"https:\/\/www.inmotionhosting.com\/dedicated-servers\">Explore Dedicated Server plans<\/a> or contact our team to talk through your specific security requirements.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p>All VPS or Dedicated Servers can be made PCI-DSS compliant with our help for clients that work with us and their PCI certification organization.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>On managed shared hosting, the hosting provider controls the server configuration. They decide which TLS versions to support, how security headers are applied, when software gets patched, and what you&#8217;re allowed to change. On a dedicated server, you do. That distinction doesn&#8217;t matter much when everything is running fine. It matters a great deal when<a class=\"moretag\" href=\"https:\/\/www.inmotionhosting.com\/blog\/dedicated-server-vs-shared-hosting-security-configuration\/\"> Read More ><\/a><\/p>\n","protected":false},"author":81,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[371],"tags":[],"class_list":["post-82827","post","type-post","status-publish","format-standard","hentry","category-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Dedicated Server vs. Managed Shared Hosting: Security Control | InMotion Hosting<\/title>\n<meta name=\"description\" content=\"Managed WordPress hosting handles security for you, but on their terms. Here&#039;s what that means when your security score needs to change.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inmotionhosting.com\/blog\/dedicated-server-vs-shared-hosting-security-configuration\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Dedicated Server vs. Managed Shared Hosting: Security Control | InMotion Hosting\" \/>\n<meta property=\"og:description\" content=\"Managed WordPress hosting handles security for you, but on their terms. Here&#039;s what that means when your security score needs to change.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inmotionhosting.com\/blog\/dedicated-server-vs-shared-hosting-security-configuration\/\" \/>\n<meta property=\"og:site_name\" content=\"InMotion Hosting Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/inmotionhosting\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-05T19:50:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-05T19:50:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2026\/04\/dedicated-servers-vs-managed-shared-hosting.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Carrie Smaha\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@carriesmaha\" \/>\n<meta name=\"twitter:site\" content=\"@inmotionhosting\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Carrie Smaha\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Dedicated Server vs. Managed Shared Hosting: Security Control | InMotion Hosting","description":"Managed WordPress hosting handles security for you, but on their terms. Here's what that means when your security score needs to change.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inmotionhosting.com\/blog\/dedicated-server-vs-shared-hosting-security-configuration\/","og_locale":"en_US","og_type":"article","og_title":"Dedicated Server vs. Managed Shared Hosting: Security Control | InMotion Hosting","og_description":"Managed WordPress hosting handles security for you, but on their terms. Here's what that means when your security score needs to change.","og_url":"https:\/\/www.inmotionhosting.com\/blog\/dedicated-server-vs-shared-hosting-security-configuration\/","og_site_name":"InMotion Hosting Blog","article_publisher":"https:\/\/www.facebook.com\/inmotionhosting","article_published_time":"2026-05-05T19:50:24+00:00","article_modified_time":"2026-05-05T19:50:29+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2026\/04\/dedicated-servers-vs-managed-shared-hosting.png","type":"image\/png"}],"author":"Carrie Smaha","twitter_card":"summary_large_image","twitter_creator":"@carriesmaha","twitter_site":"@inmotionhosting","twitter_misc":{"Written by":"Carrie Smaha","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/www.inmotionhosting.com\/blog\/dedicated-server-vs-shared-hosting-security-configuration\/#article","isPartOf":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/dedicated-server-vs-shared-hosting-security-configuration\/"},"author":{"name":"Carrie Smaha","@id":"https:\/\/www.inmotionhosting.com\/blog\/#\/schema\/person\/40542e598fc39115aa6e4a47db2373b3"},"headline":"Dedicated Server vs. Managed Shared Hosting: Who Controls Your Security Configuration?","datePublished":"2026-05-05T19:50:24+00:00","dateModified":"2026-05-05T19:50:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/dedicated-server-vs-shared-hosting-security-configuration\/"},"wordCount":2115,"commentCount":0,"publisher":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/dedicated-server-vs-shared-hosting-security-configuration\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2026\/04\/dedicated-servers-vs-managed-shared-hosting-1024x538.png","articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.inmotionhosting.com\/blog\/dedicated-server-vs-shared-hosting-security-configuration\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.inmotionhosting.com\/blog\/dedicated-server-vs-shared-hosting-security-configuration\/","url":"https:\/\/www.inmotionhosting.com\/blog\/dedicated-server-vs-shared-hosting-security-configuration\/","name":"Dedicated Server vs. Managed Shared Hosting: Security Control | InMotion Hosting","isPartOf":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/dedicated-server-vs-shared-hosting-security-configuration\/#primaryimage"},"image":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/dedicated-server-vs-shared-hosting-security-configuration\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2026\/04\/dedicated-servers-vs-managed-shared-hosting-1024x538.png","datePublished":"2026-05-05T19:50:24+00:00","dateModified":"2026-05-05T19:50:29+00:00","description":"Managed WordPress hosting handles security for you, but on their terms. Here's what that means when your security score needs to change.","breadcrumb":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/dedicated-server-vs-shared-hosting-security-configuration\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inmotionhosting.com\/blog\/dedicated-server-vs-shared-hosting-security-configuration\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.inmotionhosting.com\/blog\/dedicated-server-vs-shared-hosting-security-configuration\/#primaryimage","url":"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2026\/04\/dedicated-servers-vs-managed-shared-hosting.png","contentUrl":"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2026\/04\/dedicated-servers-vs-managed-shared-hosting.png","width":1200,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/www.inmotionhosting.com\/blog\/dedicated-server-vs-shared-hosting-security-configuration\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.inmotionhosting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.inmotionhosting.com\/blog\/security\/"},{"@type":"ListItem","position":3,"name":"Dedicated Server vs. Managed Shared Hosting: Who Controls Your Security Configuration?"}]},{"@type":"WebSite","@id":"https:\/\/www.inmotionhosting.com\/blog\/#website","url":"https:\/\/www.inmotionhosting.com\/blog\/","name":"InMotion Hosting Blog","description":"Web Hosting Strategy, Trends and Security","publisher":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inmotionhosting.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.inmotionhosting.com\/blog\/#organization","name":"InMotion Hosting","url":"https:\/\/www.inmotionhosting.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.inmotionhosting.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2019\/11\/imh-logo-all-colors-big.jpg","contentUrl":"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2019\/11\/imh-logo-all-colors-big.jpg","width":1630,"height":430,"caption":"InMotion Hosting"},"image":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/inmotionhosting","https:\/\/x.com\/inmotionhosting"]},{"@type":"Person","@id":"https:\/\/www.inmotionhosting.com\/blog\/#\/schema\/person\/40542e598fc39115aa6e4a47db2373b3","name":"Carrie Smaha","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/a5cd05c11bc0b3a239eddf54ae001dd8d0d956e9c8d1e860919bda51a33bfdbb?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a5cd05c11bc0b3a239eddf54ae001dd8d0d956e9c8d1e860919bda51a33bfdbb?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a5cd05c11bc0b3a239eddf54ae001dd8d0d956e9c8d1e860919bda51a33bfdbb?s=96&r=g","caption":"Carrie Smaha"},"description":"Carrie Smaha is a Senior Marketing Operations leader with over 20 years of experience in digital strategy, web development, and IT project management. She specializes in go-to-market programs and SaaS solutions for WordPress and VPS Hosting, working closely with technical teams and customers to deliver high-performance, scalable platforms. At InMotion Hosting, she drives product marketing initiatives that blend strategic insight with technical depth.","sameAs":["https:\/\/www.linkedin.com\/in\/carriesmaha\/","https:\/\/x.com\/carriesmaha"],"url":"https:\/\/www.inmotionhosting.com\/blog\/author\/carrie-smaha\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"primary_category":{"id":371,"name":"Security","slug":"security","link":"https:\/\/www.inmotionhosting.com\/blog\/security\/"},"_links":{"self":[{"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/posts\/82827","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/users\/81"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/comments?post=82827"}],"version-history":[{"count":4,"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/posts\/82827\/revisions"}],"predecessor-version":[{"id":82907,"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/posts\/82827\/revisions\/82907"}],"wp:attachment":[{"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/media?parent=82827"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/categories?post=82827"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/tags?post=82827"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}