Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Enforce Strict-Transport-Security for serverless offering #154376

Closed
legrego opened this issue Apr 4, 2023 · 2 comments
Closed

Enforce Strict-Transport-Security for serverless offering #154376

legrego opened this issue Apr 4, 2023 · 2 comments
Labels
duplicate enhancement New value added to drive a business result Feature:Hardening Harding of Kibana from a security perspective Team:Security Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more!

Comments

@legrego
Copy link
Member

legrego commented Apr 4, 2023

The HTTP Strict-Transport-Security response header (often abbreviated as HSTS) informs browsers that the site should only be accessed using HTTPS, and that any future attempts to access it using HTTP should automatically be converted to HTTPS.

Our serverless offering will always be served over HTTPS, and so we should configure this response header accordingly. That said, we want to make sure that this is NOT set by default for local development, as we don't want to require all devs to configure TLS.

We already expose this as a configuration option for on-prem installs, so it'll "just" be a matter of updating the configured value when running within a serverless context:

strictTransportSecurity: schema.oneOf([schema.string(), schema.literal(null)], {
// See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Strict-Transport-Security
defaultValue: null,
}),

Recommended value Strict-Transport-Security: max-age=31536000; includeSubDomains.

@legrego legrego added Team:Security Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more! enhancement New value added to drive a business result Feature:Hardening Harding of Kibana from a security perspective labels Apr 4, 2023
@elasticmachine
Copy link
Contributor

Pinging @elastic/kibana-security (Team:Security)

@legrego
Copy link
Member Author

legrego commented May 1, 2023

Closing in favor of #150884

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
duplicate enhancement New value added to drive a business result Feature:Hardening Harding of Kibana from a security perspective Team:Security Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more!
Projects
None yet
Development

No branches or pull requests

2 participants