HTTP Strict Transport Security (HSTS) is a security feature that helps protect websites from man-in-the-middle (MITM) attacks and certain types of downgrade attacks (such as protocol stripping attacks) by ensuring that browsers only connect to websites over a secure HTTPS connection.
The Strict-Transport-Security (HSTS) header is an HTTP response header sent by a web server to tell browsers to only use HTTPS to access the website for a specified period of time. This prevents attackers from downgrading the connection from HTTPS to HTTP, ensuring that sensitive data like passwords and credit card information is always transmitted securely.
Example HSTS Header: Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
Breakdown:
max-age=31536000 → Forces HTTPS for 1 year (31,536,000 seconds).
includeSubDomains → Applies to all subdomains of the domain.
preload → Requests inclusion in browser HSTS preload lists (requires separate submission).
HSTS enhances security by:
Preventing HTTP Downgrade Attacks – Ensures HTTPS is always used.
Mitigating SSL Stripping Attacks – Attackers cannot force browsers to use HTTP.
Enhancing Data Security – Protects against eavesdropping and man-in-the-middle (MITM) attacks.
Boosting SEO and Trustworthiness – HTTPS is a Google ranking factor and improves site credibility.
Eliminating Mixed Content Warnings – Prevents insecure HTTP content loading on HTTPS pages.
If your website is missing the HSTS header, follow these steps to enable it based on your server configuration.
Edit your .htaccess file or virtual host configuration:
Header always set Strict-Transport-Security "max-age=31536000; includeSubDomains; preload"
Add the header inside the server block of your Nginx configuration:
add_header Strict-Transport-Security "max-age=31536000; includeSubDomains; preload" always;
If your site is behind Cloudflare, you can enable HSTS via the Cloudflare dashboard:
Go to Cloudflare Dashboard.
Select Your Domain.
Navigate to SSL/TLS → Edge Certificates.
Enable HTTP Strict Transport Security (HSTS) and configure the settings.
After enabling HSTS, verify it using: curl -I https://yourdomain.com
Look for the Strict-Transport-Security header in the response.
Ensure that HTTPS is properly configured before enabling HSTS.
Check for SSL certificate errors using:
openssl s_client -connect yourdomain.com:443 -servername yourdomain.com
Update all internal links to HTTPS.
Use Content Security Policy (CSP) headers to block HTTP resources.
Ensure the header is added at the correct server level (e.g., Apache, Nginx, Cloudflare).
Clear browser cache and test with incognito mode.