Donate
‹ Back
Improving Technical Security 16 April 2019

Best Practices: Infrastructure Security

  1. Optimize TLS implementation using information gleaned from public tools. This includes eliminating use of insecure ciphers and older, insecure protocols as well as vulnerabilities to the POODLE and ROBOT exploits.
  2. Implement content security policy and associated headers for third-party content used on the site. This can prevent vulnerabilities introduced by outside content.
  3. Review capabilities of certificate authorities to ensure that they meet your support requirements. Use EV SSL certificates for classes of sites that are frequently spoofed and where users need to be assured they are visiting and browsing a legitimate site.
  4. Implement Certification Authority Authorization (CAA) to prevent issuance of unauthorized certificates.
  5. Implement HTTP Strict Transport Security (HSTS), also referred to as Always on SSL (AOSSL) or HTTPS everywhere, on all pages to maximize data security and online privacy. HSTS helps ensure that all data exchanged between the site and device is encrypted.
  6. Implement a Web Application Firewall to monitor HTTP conversations and block common attacks such as cross-site scripting (XSS) and SQL injections.
  7. Proactively scan sites for malicious links, iFrame exploits, malware and malvertising.
  8. Implement bot detection and mitigation to help prevent brute force attacks, web scraping, account hijacking, unauthorized vulnerability scans, spam, and man-in-the-middle attacks.
  9. Provide a discoverable and accessible vulnerability reporting mechanism for site visitors and third parties to report vulnerabilities.
‹ Back

Related articles

2016 Honor Roll Methodology
Building Trust15 June 2016

2016 Honor Roll Methodology

The 2016 Online Trust Audit has evolved over the past 8 years and includes a composite analysis focusing on three...

2017 Online Trust Audit and Honor Roll
Building Trust20 June 2017

2017 Online Trust Audit and Honor Roll

The 2017 Online Trust Audit is the 9th year OTA will be conducting an independent analysis and benchmark report of...

Best Practices: Security & Privacy for Enterprises
Building Trust21 January 2015

Best Practices: Security & Privacy for Enterprises

OTA recommends that all organizations implement the following best practices: Enforce effective password management policies Attacks against user credentials, including...

Join the conversation with Internet Society members around the world