User Tools

Site Tools


azure_web_app_security_hardening

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
azure_web_app_security_hardening [2017/11/18 02:59] stephenazure_web_app_security_hardening [2017/11/19 05:39] (current) – external edit 127.0.0.1
Line 1: Line 1:
 ====== Azure Web App Security Hardening ====== ====== Azure Web App Security Hardening ======
 +
 +A bunch of checks can be done [[https://securityheaders.io/|here]].
  
 ===== HTTPS Only ===== ===== HTTPS Only =====
Line 24: Line 26:
 // Add this method:     // Add this method:    
 protected void Application_PreSendRequestHeaders(object sender, EventArgs e) { protected void Application_PreSendRequestHeaders(object sender, EventArgs e) {
 + // Trying to remove this in the web.config doesn't work for some reason...
  Response.Headers.Remove("server");  Response.Headers.Remove("server");
 } }
Line 32: Line 35:
 <code xml> <code xml>
 <system.web> <system.web>
 + ...
  <!-- Add enableVersionHeader="false" -->  <!-- Add enableVersionHeader="false" -->
  <httpRuntime targetFramework="4.5.2" enableVersionHeader="false" />  <httpRuntime targetFramework="4.5.2" enableVersionHeader="false" />
Line 48: Line 52:
 </system.webServer> </system.webServer>
 </code> </code>
 +
 +===== HTTPS Only Cookies =====
 +
 +''~/Web.config'':
 +
 +<code xml>
 +<system.web>
 + ...
 + <!-- Add this: -->
 + <httpCookies httpOnlyCookies="true" requireSSL="true" />
 +</system.web>
 +</code>
 +
 +===== Add Security Headers =====
 +
 +''~/Web.config'':
 +
 +<code xml>
 +<system.webServer>
 + <httpProtocol>
 +  <customHeaders>
 + ...
 + <!-- Add these: -->
 + <add name="Content-Security-Policy" value="upgrade-insecure-requests"/>
 + <add name="X-Frame-Options" value="DENY"/>
 + <add name="X-XSS-Protection" value="1; mode=block"/>
 + <add name="X-Content-Type-Options" value="nosniff"/>
 + <add name="Referrer-Policy" value="origin-when-cross-origin"/>
 + <!-- Max-age is in seconds, 31536000 = one year -->
 + <add name="Strict-Transport-Security" value="max-age=31536000; includeSubDomains"/>
 +  </customHeaders>
 +  </httpProtocol>
 + </system.webServer>
 + </code>
  
azure_web_app_security_hardening.1510973948.txt.gz · Last modified: 2017/11/19 03:59 (external edit)

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki