System - HTTP Security Headers
- Last Updated: July 11, 2024
- 1 minute read
- MOVEit Transfer
- Version 2024.1
- Version 2024
- Documentation
As a SysAdmin user, you can apply secure HTTP directives ("HTTP response headers") at the MOVEit Transfer web service (SETTINGS > System - HTTP Headers: Security Headers). Major web browsers that comply with industry standards will use these to block/mitigate WebUI session vulnerabilities. These optional parameters, that you can control from MOVEit Transfer, leverage industry-standard directives for service hardening.
> Headers.These options ensure session communication between the MOVEit Transfer WebUI (or equivalent) and the pages it requests from the MOVEit Transfer server host use a secure transport protocol and are not vulnerable to content or pages backfilled from a different origin server. Using these header messages with major browser vendors ensures integrity and confidentiality of pages viewed during a typical WebUI session.
Setting this HTTP header flag... |
does this... |
Other details... |
|---|---|---|
Include Content-Security-Policy Header |
Apply a policy that allows browsers of this site to load resources from designated server origins and endpoints. If no policy is defined, Same-Origin (link to RFC) policy will be enforced. |
Restricts content origin and types for the current session to OWASP suggested settings. |
Include HTTP Strict Transport Security Header |
Direct WebUI or equivalent session client to only contact the MOVEit Transfer web service only by way of HTTPS.
|
Strict use of HTTPS prevents HTTP downgrade attacks and helps to ensure that other security policy settings are neither revealed nor compromised. |
Include X-XSS-Protection Header |
Direct all WebUI clients to filter out or block injection of JavaScript or popups, also referred to as cross-site-scripting (XSS) that could potentially pull in content from a different, less-secure, or compromised site. |
For purposes of hardening, when enabled, this directive instructs clients to block pages that exhibit some signature of XSS. |
| Include Clickjack Protection Header | Apply X-Frame-Options response header to DENY. This prevents use of content framing and prevents Clickjacking scenarios. | DENY is the least permissive option. |