Skip to content

Only 5% of HTTPS Servers Securely Implement HSTS, Leaving 95% Vulnerable

HSTS is a critical security measure, yet 95% of HTTPS servers remain unprotected. Learn how to implement it correctly and safeguard your users and data.

There is some construction being done on the land and in front of that there is a caution board...
There is some construction being done on the land and in front of that there is a caution board attached to the gate in front of the land and in the background there are lot of houses and trees.

Only 5% of HTTPS Servers Securely Implement HSTS, Leaving 95% Vulnerable

A mere 5% of HTTPS servers have correctly implemented HTTP Strict Transport Security (HSTS), a crucial security measure that ensures web applications only use TLS for secure transport. This alarming figure highlights the urgent need for organizations to bolster their security protocols.

HSTS, defined in RFC 6797, offers semantically distinct ways to send headers. For instance, 'Strict-Transport-Security: max-age=31536000' sets a one-year policy, while adding 'includeSubDomains' covers subdomains. To delete the policy, use 'max-age=0'.

Web applications should assume hackers can run man-in-the-middle (MITM) attacks over plaintext HTTP connections. Thus, they should protect as many domains and subdomains as possible using appropriate HSTS policies. Best practices include providing an HSTS header on all HTTPS resources, setting a max-age value greater than 120 days, and adding the 'includeSubDomains' directive whenever possible.

Qualys Vulnerability Management (VM) and Web Application Scanning (WAS) offer tools to help organizations consistently protect against such vulnerabilities at scale. They can detect HSTS implementation and analyze its configuration. However, using the 'includeSubDomains' directive at the top-level domain may not always be feasible due to potential impacts on existing third-party services.

HSTS enforces strict security measures like preventing mixed content and click-through certificate overrides. It also safeguards against web server mistakes, such as loading JavaScript over an insecure connection. Yet, about 95% of HTTPS servers remain vulnerable to connection hijacking, opening doors for hackers to launch devastating cyber attacks.

Organizations must prioritize implementing and managing HSTS correctly to protect their users and data. Tools like Qualys' SSL Labs can assess and monitor HSTS implementations, helping administrators verify proper enforcement and identify misconfigurations. By following best practices and staying vigilant, organizations can significantly enhance their security posture.

Read also:

Latest