‹ Back
Improving Technical Security 16 April 2019

Best Practices: Infrastructure Security

  1. Optimize TLS implementation using information gleaned from public tools. This includes eliminating use of insecure ciphers and older, insecure protocols as well as vulnerabilities to the POODLE and ROBOT exploits.
  2. Implement content security policy and associated headers for third-party content used on the site. This can prevent vulnerabilities introduced by outside content.
  3. Review capabilities of certificate authorities to ensure that they meet your support requirements. Use EV SSL certificates for classes of sites that are frequently spoofed and where users need to be assured they are visiting and browsing a legitimate site.
  4. Implement Certification Authority Authorization (CAA) to prevent issuance of unauthorized certificates.
  5. Implement HTTP Strict Transport Security (HSTS), also referred to as Always on SSL (AOSSL) or HTTPS everywhere, on all pages to maximize data security and online privacy. HSTS helps ensure that all data exchanged between the site and device is encrypted.
  6. Implement a Web Application Firewall to monitor HTTP conversations and block common attacks such as cross-site scripting (XSS) and SQL injections.
  7. Proactively scan sites for malicious links, iFrame exploits, malware and malvertising.
  8. Implement bot detection and mitigation to help prevent brute force attacks, web scraping, account hijacking, unauthorized vulnerability scans, spam, and man-in-the-middle attacks.
  9. Provide a discoverable and accessible vulnerability reporting mechanism for site visitors and third parties to report vulnerabilities.
‹ Back

Related articles

Building Trust 15 May 2019

Info Guide: 6 Ways “Lawful Access” Puts Everyone’s Security At Risk

What is encryption? Encryption is the process to scramble or hide information so it can only be read by...

Deploy360 1 March 2019

IPv6 Security for IPv4 Engineers

This document provides an overview of IPv6 security that is specifically aimed at IPv4 engineers and operators. Rather than...

Deploy360 27 February 2019

Introduction to DNS Privacy

Abstract Almost every time we use an Internet application, it starts with a Domain Name System (DNS) transaction to...

Join the conversation with Internet Society members around the world