TechTarget.com/searchsecurity

https://www.techtarget.com/searchsecurity/tip/How-HTTP-security-headers-can-defend-enterprise-systems

How HTTP security headers can defend enterprise systems

By Judith Myerson

Strong HTTP security headers are countermeasures used to protect websites from attackers. The countermeasures are part of an accreditation lifecycle and should be included in an accreditation report on an information system.

Countermeasures with lowest costs and greatest benefits are determined after assets are valuated, vulnerabilities are identified and risks are assessed as high, medium or low. After successful countermeasure implementation, economics value analysis is used to determine cost-effectiveness of the implementation over a period of time.

Here are some examples of assets valuations, vulnerabilities and risk assessments:

Asset valuations are determined by a valuation method for authorized assets. Server hardware costs are based on the value of replacement servers that send HTTP security responses. Server software costs are based on time to restore software. Personnel costs are based on the expenses of training personnel to perform administrative tasks of editing configuration files if all personnel became permanently unavailable, which is very unlikely.

Vulnerabilities are identified with a simple security control test that reports a grade on implementation of HTTP security headers for a website. The report can be obtained by scanning a website on securityheaders.io, which was founded and managed by Scott Helme. A grade of A+ indicates successful implementation of all HTTP security headers. A low grade identifies vulnerabilities due to the security headers not implemented properly or at all. Exposing sensitive information about the server to the public internet is considered a vulnerability but does not affect the overall grade because it is not connected to a security response header.

Risks are assessed for medium and high potential loss of data due to vulnerabilities of non-implementation of some or all HTTP security response headers. When no security headers are implemented, the risk is high; when all security headers are implemented the risk is low.

Countermeasures mitigate risks by preventing intentional exploitation or accidental triggering of the vulnerabilities due to improper or incomplete implementation of HTTP security response headers. Before adding or updating security headers, an administrator must remove sensitive information about which software the server is running.

Security threats that can be stopped

There are many different factors that make websites vulnerable to security threats. Some of those threats and vulnerabilities can be mitigated with proper HTTP security headers, including:

Adding strong HTTP security headers to the accreditation process should help to determine cost-effectiveness of implementing the headers as countermeasures. New HTTP security response headers can be added to mitigate new vulnerabilities.

18 Jan 2018

All Rights Reserved, Copyright 2000 - 2025, TechTarget | Read our Privacy Statement