Control: Site headers must contain Strict-Transport-Security
Description
The HTTP Strict-Transport-Security (HSTS) response header helps to strengthens your TLS implementation by informing the browser that the site should only be accessed using HTTPS, and any further attempts to access the site using HTTP should automatically redirect to HTTPS. These countermeasures help prevent Man-in-the-middle attacks as well as other attacks such as Session Hijacking.
Usage
Run the control in your terminal:
powerpipe control run net_insights.control.security_headers_strict_transport_security
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run net_insights.control.security_headers_strict_transport_security --share
Steampipe Tables
SQL
with available_headers as ( select url, array_agg(header.key) from net_http_request, jsonb_each(response_headers) as header where url in (select jsonb_array_elements_text(to_jsonb($1::text[]))) group by url)select url as resource, case when array['Strict-Transport-Security'] <@ array_agg then 'ok' else 'alarm' end as status, case when array['Strict-Transport-Security'] <@ array_agg then url || ' contains required headers ''Strict-Transport-Security''.' else url || ' missing required headers ''Strict-Transport-Security''.' end as reasonfrom available_headers;
Params
Args | Name | Default | Description | Variable |
---|---|---|---|---|
$1 | website_urls |
| Website URLs. |