Only 5% of HTTPS Servers Securely Implement HSTS, Leaving 95% Vulnerable
A mere 5% of HTTPS servers have correctly implemented HTTP Strict Transport Security (HSTS), a crucial security measure that ensures web applications only use TLS for secure transport. This alarming figure highlights the urgent need for organizations to bolster their security protocols.
HSTS, defined in RFC 6797, offers semantically distinct ways to send headers. For instance, 'Strict-Transport-Security: max-age=31536000' sets a one-year policy, while adding 'includeSubDomains' covers subdomains. To delete the policy, use 'max-age=0'.
Web applications should assume hackers can run man-in-the-middle (MITM) attacks over plaintext HTTP connections. Thus, they should protect as many domains and subdomains as possible using appropriate HSTS policies. Best practices include providing an HSTS header on all HTTPS resources, setting a max-age value greater than 120 days, and adding the 'includeSubDomains' directive whenever possible.
Qualys Vulnerability Management (VM) and Web Application Scanning (WAS) offer tools to help organizations consistently protect against such vulnerabilities at scale. They can detect HSTS implementation and analyze its configuration. However, using the 'includeSubDomains' directive at the top-level domain may not always be feasible due to potential impacts on existing third-party services.
HSTS enforces strict security measures like preventing mixed content and click-through certificate overrides. It also safeguards against web server mistakes, such as loading JavaScript over an insecure connection. Yet, about 95% of HTTPS servers remain vulnerable to connection hijacking, opening doors for hackers to launch devastating cyber attacks.
Organizations must prioritize implementing and managing HSTS correctly to protect their users and data. Tools like Qualys' SSL Labs can assess and monitor HSTS implementations, helping administrators verify proper enforcement and identify misconfigurations. By following best practices and staying vigilant, organizations can significantly enhance their security posture.
Read also:
- Expanded Criticism of Human Rights Protections - Specialists Criticize Russia's Intensified Crackdown on Virtual Private Networks and Encrypted Applications
- Cyber Attack Nets $14 Million from WOO X Across Four Different Blockchains
- Artificial Intelligence's Self-Consumption: The Demise of the Attention Economy
- Auto industry giants Fescaro and TUV Nord team up for cybersecurity certification in automobiles