Web Security

Clear Site Data

Clear Site Data

As you might guess from the name, the Clear-Site-Data HTTP header is a powerful tool that instructs a client (usually a browser) to clear stored data related to a website. This includes cache, storage, cookies, or even all site data. By implementing this header, you gain precise control over how your website’s data is managed […]

Clear Site Data Read More »

Permissions-Policy

Permissions-Policy

Permissions-Policy: Control Browser Features with HTTP Headers Earlier known as Feature-Policy, this header has been renamed Permissions-Policy with enhanced capabilities. To understand the significant differences between Feature-Policy and Permissions-Policy, you can check detailed resources that explain the updates and improvements. With Permissions-Policy, you gain granular control over browser features such as geolocation, fullscreen, microphone, camera,

Permissions-Policy Read More »

Referrer-Policy

Referrer-Policy

Looking to control the referrer-policy of your site? There are certain privacy and security benefits. However, not all the options are supported by all the browsers, so review your requirements before the implementation. Referrer-Policy supports the following syntax. Value Description no-referrer Referrer information will not be sent with the request. no-referrer-when-downgrade The default setting where

Referrer-Policy Read More »

Content Security Policy

Prevent XSS, clickjacking, code injection attacks by implementing the Content Security Policy (CSP) header in your web page HTTP response. CSP instruct browser to load allowed content to load on the website. All browsers don’t support CSP, so you got to verify before implementing it. There are three ways you can achieve CSP headers. Content-Security-Policy – Level 2/1.0 X-Content-Security-Policy –

Content Security Policy Read More »

X-Content-Type-Options

Prevent MIME types of security risk by adding this header to your web page’s HTTP response. Having this header instructs browser to consider file types as defined and disallow content sniffing. There is only one parameter you got to add “nosniff”. Let’s see how to advertise this header. Apache You can do this by adding the below

X-Content-Type-Options Read More »

X-Frame-Options

Use the X-Frame-Options header to prevent Clickjacking vulnerability on your website. By implementing this header, you instruct the browser not to embed your web page in frame/iframe. This has some limitations in browser support, so you got to check before implementing it. You can configure the following three parameters. Parameter Value Meaning SAMEORIGIN Frame/iframe of content is

X-Frame-Options Read More »

Shopping Cart