Meme

Use HSTS and CSP. Just. Do. It.

September 2nd, 2022

First things first.
HSTS = HTTP Strict Transport Security
CSP = Content Security Policy

HSTS will protect you against man-in-the-middle (MITM) attacks AND cookie hijacking.
CSP will protect you against Cross-Site Scripting (XSS) and data injection attacks.

That's not so bad for a 10 min configuration.

HSTS configuration on nginx

Log on your webserver.
Go to your nginx directory.
Find your nginx website configuration. Usually:

					
$ cd /etc/nginx/sites-enabled
$ ls
example.com
					

Open your example.com configuration file.
Add the following line:

					
server {
...
	add_header Strict-Transport-Security "max-age=31536000; includeSubdomains; preload";
...
}

					

Save your change.

Verify your new configuration using:

					
$ nginx -t
nginx: the configuration file /etc/nginx/nginx.conf syntax is ok
nginx: configuration file /etc/nginx/nginx.conf test is successful

					

Restart your nginx service with:

					
$ sudo systemctl restart nginx

					

OK so, what have we just done here?
We just configured our webserver to define that:

Good setup!

CSP configuration on nginx

You go to the exact same file as for HSTS configuration.

					
...
add_header Content-Security-Policy "default-src 'self'; script-src 'none'; connect-src 'self'; 
				    img-src 'self'; style-src 'self'; font-src 'self';>
...

					

Let's go through the possible parameters:

Each parameter can have one of the following values:

The above parameters and values explanation are a copy & paste of the following documentation available online: Mozilla documentation and OWASP documentation.

Now with this information, you do your own mixture, you modify the nginx configuration file, you test, you reload and you are happy because you have implemented web standard from 2013!

Do not forget to test and verify that your mixture is correct and you haven't forgotten anything using the following: Security Headers

Let's make the web a safer place all together!