Your web server is missing one or more important security headers that instruct browsers to enable built-in security features against common web attacks.
Add essential security headers (Content-Security-Policy, X-Frame-Options, X-Content-Type-Options) to your web server.
HTTP security headers are instructions sent by your server to the browser. Without them, browsers use default behaviors that may be less secure. Key missing headers typically include X-Frame-Options, X-Content-Type-Options, Referrer-Policy, and Permissions-Policy.
Security headers protect against clickjacking (X-Frame-Options), MIME-type sniffing attacks (X-Content-Type-Options), information leakage (Referrer-Policy), and unauthorized browser features (Permissions-Policy). They are low-effort, high-impact.
See which security headers your server currently sends.
curl -sI https://yourdomain.com | grep -iE "(x-frame|x-content-type|referrer-policy|permissions-policy)"Add all recommended security headers.
add_header X-Frame-Options "SAMEORIGIN" always;
add_header X-Content-Type-Options "nosniff" always;
add_header Referrer-Policy "strict-origin-when-cross-origin" always;
add_header Permissions-Policy "camera=(), microphone=(), geolocation=()" always;Add all recommended security headers.
Header always set X-Frame-Options "SAMEORIGIN"
Header always set X-Content-Type-Options "nosniff"
Header always set Referrer-Policy "strict-origin-when-cross-origin"
Header always set Permissions-Policy "camera=(), microphone=(), geolocation=()"After adding headers, test your site thoroughly. Pay attention to embedded content, file downloads, and third-party integrations.
Confirm all headers are being sent.
curl -sI https://yourdomain.comAfter making changes, use our free scanner to verify the fix is working correctly. DNS changes can take up to 48 hours to propagate, but most propagate within minutes.
In order: Strict-Transport-Security (HSTS), Content-Security-Policy (CSP), X-Content-Type-Options, X-Frame-Options, Referrer-Policy, and Permissions-Policy.
Yes, if misconfigured. Content-Security-Policy can block scripts/styles/images, and X-Frame-Options can prevent legitimate embedding. Test thoroughly.
It is deprecated and unnecessary if you have Content-Security-Policy. Modern browsers have removed their XSS auditors. CSP is the proper replacement.