FORUMS
LATEST THREADS

Sngine Tutorial-HTTP Headers: Let's Enhance Your Website Security with HTTP Headers

10
11KB
Sngine Tutorial-HTTP Headers: Let's Enhance Your Website Security with HTTP Headers

Sngine Tutorial-HTTP Headers: Let's Enhance Your Website Security with HTTP Headers

Updated Code Suggested by Edy Lee Important: By default, Sngine does not include these essential security headers, leaving your site vulnerable to potential attacks. Adding these headers manually is a crucial step to ensure the safety of your users and protect your platform against common threats.

 

Recommended Security Headers for Apache

If your server uses Apache, add the following configuration to your .htaccess file or server configuration file:

Open your .htaccess file and look for 

## Security Control ##
<FilesMatch "\.(htaccess|htpasswd|ini|log|sh|inc|bak|tpl)$">
    Order Allow,Deny
    Deny from all
</FilesMatch>
<FilesMatch "(composer.json|composer.lock|package.json|package-lock.json)$">
    Order Allow,Deny
    Deny from all
</FilesMatch>
<IfModule mod_security.c>
    SecFilterScanPOST Off
</IfModule>

And after that add:

<IfModule mod_headers.c>
    # Enforce HTTPS
    Header always set Strict-Transport-Security "max-age=31536000; includeSubDomains; preload"
   # Restrict sources of content
 # Content-Security-Policy (Minimal CSP)
    Header always set Content-Security-Policy "connect-src 'self' * data: blob: 'unsafe-inline' 'unsafe-eval';"

   # Prevent Clickjacking
    Header always set X-Frame-Options "SAMEORIGIN"
    # Prevent MIME Sniffing
    Header always set X-Content-Type-Options "nosniff"
    # Referrer Policy
    Header always set Referrer-Policy "strict-origin-when-cross-origin"
    # Permissions Policy
    Header always set Permissions-Policy "geolocation=(), microphone=(), camera=()"
</IfModule>


So it should look like this



Recommended Security Headers for Nginx

If your server uses Nginx, add the following configuration to your server block (usually in /etc/nginx/sites-available/your-site.conf):

server {
    ...
    
    # Enforce HTTPS
    add_header Strict-Transport-Security "max-age=31536000; includeSubDomains; preload";
    
    # Content-Security-Policy (Minimal CSP)
    add_header Content-Security-Policy "default-src * data: blob: 'unsafe-inline' 'unsafe-eval';";
    
    # Prevent Clickjacking
    add_header X-Frame-Options "SAMEORIGIN";
    
    # Prevent MIME Sniffing
    add_header X-Content-Type-Options "nosniff";
    
    # Referrer Policy
    add_header Referrer-Policy "strict-origin-when-cross-origin";
    
    # Permissions Policy
    add_header Permissions-Policy "geolocation=(), microphone=(), camera=()";
    
    ...
}

Why These Headers Matter

  • Strict-Transport-Security (HSTS): Ensures that your website is only accessed over HTTPS, protecting against man-in-the-middle attacks.
  • Content-Security-Policy (CSP): Prevents unauthorized scripts and styles from running on your site, mitigating XSS attacks.
  • X-Frame-Options: Prevents your site from being embedded in iframes, protecting against clickjacking.
  • X-Content-Type-Options: Stops browsers from MIME-sniffing and interpreting files as a different MIME type.
  • Referrer-Policy: Limits how much referrer information is shared with external sites, protecting user privacy.
  • Permissions-Policy: Restricts browser features like geolocation, microphone, and camera access, enhancing privacy and security.

How to Add These Headers

  1. For Apache:
    1. Open your server's .htaccess file or configuration file.
    2. Copy and paste the recommended Apache configuration shown above.
  2. For Nginx:
    1. Open your Nginx configuration file (usually in /etc/nginx/sites-available/).
    2. Copy and paste the recommended Nginx configuration shown above.
    3. Restart Nginx using sudo systemctl restart nginx.

Testing Your Security Headers

After adding the headers, test your site’s security using tools like SecurityHeaders.com. Ensure all headers are correctly applied without breaking your site's functionality.

By implementing these security headers, you significantly reduce vulnerabilities and ensure a safer browsing experience for your users. Remember to test thoroughly and adjust the Content-Security-Policy to fit your site's specific needs.

Like
Love
6
Gesponsert
Search
Nach Verein filtern
Read More
Networking
Cutting-Edge E-commerce Solutions - Expand Your Business Online
In today’s digital marketplace, a strong online presence is essential for any business that...
Von Jane Marcia 2025-02-15 09:47:53 7 3KB
Sngine
Random Post Feed Hack for Sngine
 How to Show User Feed Posts Randomly in Sngine If you want to display user feed posts...
Von Jane Marcia 2024-12-28 07:39:53 7 10KB
Sngine
PageFeeds Pro with SocialSync for Sngine
PageFeeds Pro with SocialSync for Sngine is the ultimate solution for enhancing your Sngine...
Von Jane Marcia 2025-01-22 03:53:13 16 12KB
Sngine
Sngine Free 404 Hack: Why a User-Friendly 404 Page is a Must for Your Website
 A poorly designed 404 page can frustrate users, cause them to abandon your site, and even...
Von Jane Marcia 2024-12-19 03:41:15 2 10KB
Marketing
Email Going to Spam Folder? Here’s How to Fix It with DKIM and DMARC
If your emails are consistently landing in the email spam folder, the culprit is often improper...
Von Jane Marcia 2024-12-20 07:01:27 0 10KB