-
Notifications
You must be signed in to change notification settings - Fork 41
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Scan op security headers (CSP, Frame-options, XSS-prot etc.) #79
Comments
Decided by steeringcmte on 2017-01-19 to keep issue in icebox. Some items might be proper security related, but for others they might be outside of the scope of the InternetNL testing alltogether. Issue #180, actually would target most of the concerns of this issue. |
See discussion per mail between SC members on 5th september 2017. |
See below an overview of relevant HTTP security headers:
|
Also see: https://infosec.mozilla.org/guidelines/web_security |
HSTS, CSP and X-Frame-Options are recommened by NCSC in 'ICT-beveiligingsrichtlijnen voor Webapplicaties' anyway. |
Live on dev. New labels:
|
Add new category in correspondance with mockup option 3. |
Live on dev. New category for the security headers test is created for the website test (Application security & privacy options). Relevant text labels are:
|
Current checks for the new headers:
|
No description provided.
The text was updated successfully, but these errors were encountered: