Skip to main content
Last Reviewed: July 21, 2022

Securely Working with phpinfo

Important security considerations when working with phpinfo on your Pantheon Drupal site.

This section provides information on steps you can take to obscure your phpinfo online.

Pantheon provisions isolated Linux containers with an optimized PHP stack. The php.ini is part of a highly tuned configuration and is not user-configurable. We continually deploy new builds of PHP and you also have the ability to upgrade PHP versions.

You can use phpinfo to see a comprehensive list of what's installed with the version of PHP in use by a particular environment. We also have example PHP info for each version of PHP on the platform.

Important Security Notes

  • phpinfo exposes sensitive information, including the password to connect to the DB

  • Delete any phpinfo file you create immediately after review

Drupal Note

Drupal makes the phpinfo available to privileged users at

Review phpinfo

Follow the steps below to keep your phpinfo file secure.

  1. Lock environment (if the environment does not currently need to be publicly accessible).

  2. Create a php file with an obscure filename that uses phpinfo.

  3. Omit sensitive sections from the phpinfo output to minimize the information exposed over the web. The recommended way to call phpinfo is:

  4. Visit the file in a web browser to view phpinfo.


  5. Delete the file immediately so you do not expose sensitive information, such as the password used to connect to the DB.


You can use Terminus to check your phpinfo values as an alternative to exposing information on a web-accessible URL:

terminus remote:drush <SITE>.<ENV> -- ev "print(phpinfo())"

More Resources