Supported endpoint configuration
Security headers
Security headers are HTTP response headers that can be used to increase the security of your application. In other words, these headers instruct the web browser to activate security precautions that protect your site against attacks.
Supported headers
Strict-Transport-Security
Strict Transport Security is a web security policy that helps safeguard websites against protocol downgrade attacks and cookie hijacking. This policy allows web servers to interact using secure HTTPS connections and never via insecure HTTP protocol.
X-Frame-Options
The X-Frame-Options header improves the protection of web applications against clickjacking. This disables the iframes on the site and does not allow others to embed your content.
X-XSS-Protection
X-XSS-Protection allows developers to change the behavior of cross-site scripting security filters. These filters identify unsafe HTML input and either block the site from loading or remove potentially malicious scripts.
X-Content-Type-Options
This header is typically used to control the MIME type sniffing function in web browsers. If the Content-Type header is blank or missing, the browser identifies the content and attempts to display the source in an appropriate way.
Content-Security-Policy
This header provides an extra layer of security against multiple vulnerabilities such as XSS, clickjacking, protocol downgrading, and frame injection. If enabled, this has a significant impact on the way browsers render pages.
X-Permitted-Cross-Domain-Policies
A cross-domain policy file is an XML document that grants a web client such as Adobe Flash Player or Adobe Acrobat permission to handle data across domains.
Referrer-Policy
The Referrer-Policy header governs which referrer information, sent in the Referrer header, should be included with requests made. This security header can be included on communication from the website’s server to a client.
Feature-Policy
The Feature-Policy header provides a mechanism to allow and deny the use of browser features and APIs in its own frame.
Access-Control-Allow-Origin
The Access-Control-Allow-Origin header is included in the response from one website to a request originating from another website. It also identifies the permitted origin of the request.
Expect-CT
This is a response-type header that prevents the use of wrongly issued certificates for a site and ensures they do not go unnoticed.
Public-Key-Pins
This response header is a security mechanism that allows HTTPS websites to resist impersonation by attackers using misissued or fraudulent certificates.
How do headers affect the server rating?
For example, the Strict-Transport-Security header is rated. The explanation follows:
Validation | Server rating |
---|---|
max-age < 10368000 (120 days) | At risk |
max-age >= 10368000 and max-age < 31536000 | Secure |
max-age >= 31536000 (1 year) | Very Secure |
Note
The Strict-Transport-Security is rated only if the request succeeds (HTTP 200 OK).
HTTP response headers
HTTP response headers have information including the date, size, and type of file the server is sending back to the browser upon receiving an HTTP request.
All the headers received in HTTP response are available for analysis.
Cipher
For secure communication, the TLS client and server need to agree on the cryptographic algorithms and keys that both use for secured connection.
However, there are possible combinations of numerous choices. TLS allows only certain well-defined combinations of these choices, known as cipher suites.
Discovery identifies all the cipher suites supported by the server and classifies them into the Insecure, Weak, or Secure category, based on industry best practices.
Weak
Cipher suite with AES with CBC mode
3DES
Insecure
RC4
EXPORT Ciphers
Ciphers using MD5
Null Ciphers
Ciphers using anonymous authentication
DES
Note
The “Secure” category comprises recommended cipher suites which are safe to use.