Improving Technical Security 16 April 2019

Best Practices: Infrastructure Security

  1. Optimize TLS implementation using information gleaned from public tools. This includes eliminating use of insecure ciphers and older, insecure protocols as well as vulnerabilities to the POODLE and ROBOT exploits.
  2. Implement content security policy and associated headers for third-party content used on the site. This can prevent vulnerabilities introduced by outside content.
  3. Review capabilities of certificate authorities to ensure that they meet your support requirements. Use EV SSL certificates for classes of sites that are frequently spoofed and where users need to be assured they are visiting and browsing a legitimate site.
  4. Implement Certification Authority Authorization (CAA) to prevent issuance of unauthorized certificates.
  5. Implement HTTP Strict Transport Security (HSTS), also referred to as Always on SSL (AOSSL) or HTTPS everywhere, on all pages to maximize data security and online privacy. HSTS helps ensure that all data exchanged between the site and device is encrypted.
  6. Implement a Web Application Firewall to monitor HTTP conversations and block common attacks such as cross-site scripting (XSS) and SQL injections.
  7. Proactively scan sites for malicious links, iFrame exploits, malware and malvertising.
  8. Implement bot detection and mitigation to help prevent brute force attacks, web scraping, account hijacking, unauthorized vulnerability scans, spam, and man-in-the-middle attacks.
  9. Provide a discoverable and accessible vulnerability reporting mechanism for site visitors and third parties to report vulnerabilities.

Related articles

Strengthening the Internet 10 October 2023

How to Talk to Your Manager About Memory Safety

Learn about memory safety, memory-safe languages, common bugs and vulnerabilities, and the reasons for memory safe language adoption and...

Building Trust 15 May 2019

Info Guide: 6 Ways “Lawful Access” Puts Everyone’s Security At Risk

What is encryption? Encryption is the process to scramble or hide information so it can only be read by...

Deploy360 1 March 2019

IPv6 Security for IPv4 Engineers

This document provides an overview of IPv6 security that is specifically aimed at IPv4 engineers and operators. Rather than...