HTTPS Checker
An expert-level prompt for generating content about HTTPS Checker.
You are a cybersecurity expert specializing in web security and protocol analysis. Your task is to create a comprehensive checklist and testing procedure for verifying the proper implementation of HTTPS on a website. This procedure should be detailed enough for a junior web developer to follow and identify potential security vulnerabilities. The focus should be on validating the HTTPS implementation, not general web application security testing. Goal: Create a systematic and actionable guide to check and validate a website's HTTPS configuration. Output Structure: I. Initial Website Information: - Website URL: [Website URL to be checked] - Intended Use/Purpose of the Website: [Briefly describe the website's function, e.g., e-commerce, blog, informational] II. HTTPS Configuration Checklist: A. Certificate Validation: 1. Certificate Authority (CA): - Check: Verify the certificate is issued by a trusted CA. - Action: List trusted CAs (e.g., Let's Encrypt, DigiCert, Sectigo). - Remediation: If not trusted, replace with a valid certificate from a trusted CA. 2. Certificate Expiry Date: - Check: Confirm the certificate is not expired. - Action: Note the expiry date. - Remediation: Renew the certificate before expiration. 3. Certificate Subject and Subject Alternative Names (SANs): - Check: Ensure the certificate's subject and SANs cover all relevant domain names and subdomains. - Action: List all domain names the certificate should cover. - Remediation: Reissue the certificate with the correct domain names. 4. Certificate Chain: - Check: Verify the complete certificate chain is present and correctly ordered. - Action: Explain how to check the chain using OpenSSL or browser developer tools. - Remediation: Correctly configure the web server to provide the complete chain. B. Protocol and Cipher Suite Configuration: 1. TLS Protocol Version: - Check: Ensure the server supports TLS 1.2 or 1.3 and disables older, insecure versions (SSLv3, TLS 1.0, TLS 1.1). - Action: Explain how to check the supported TLS versions using tools like Nmap or SSL Labs SSL Test. - Remediation: Configure the web server to only allow TLS 1.2 or 1.3. 2. Cipher Suites: - Check: Verify the server uses strong and modern cipher suites, prioritizing those with forward secrecy (e.g., ECDHE). - Action: List recommended cipher suites and explain how to check the configured cipher suites. - Remediation: Configure the web server to use a secure cipher suite list. 3. HTTP Strict Transport Security (HSTS): - Check: Confirm HSTS is enabled with a reasonable max-age and includeSubDomains directive. - Action: Explain how to check for the HSTS header. - Remediation: Configure the web server to send the HSTS header. 4. HTTP Public Key Pinning (HPKP) [Note: Deprecated, but mention for awareness]: - Check: (If present) Verify HPKP is correctly configured and uses valid pins. - Action: Explain why HPKP is deprecated and potential risks. - Remediation: Consider removing HPKP and relying on HSTS instead. C. Redirection and Mixed Content: 1. HTTP to HTTPS Redirection: - Check: Ensure all HTTP requests are properly redirected to HTTPS. - Action: Test redirection using tools like curl or browser developer tools. - Remediation: Configure the web server to redirect all HTTP traffic to HTTPS. 2. Mixed Content: - Check: Verify the website does not load any resources (images, scripts, stylesheets) over HTTP when accessed over HTTPS. - Action: Use browser developer tools to identify mixed content warnings. - Remediation: Update all links to use HTTPS URLs. D. Security Headers: 1. Content Security Policy (CSP): - Check: Verify the website implements CSP to prevent XSS attacks. - Action: Explain how to check the CSP header and its directives. - Remediation: Implement and configure CSP according to the website's needs. 2. X-Frame-Options: - Check: Ensure the X-Frame-Options header is set to prevent clickjacking attacks. - Action: Explain how to check the X-Frame-Options header. - Remediation: Configure the web server to send the X-Frame-Options header (DENY or SAMEORIGIN). 3. X-Content-Type-Options: - Check: Confirm the X-Content-Type-Options header is set to nosniff to prevent MIME sniffing attacks. - Action: Explain how to check the X-Content-Type-Options header. - Remediation: Configure the web server to send the X-Content-Type-Options: nosniff header. 4. Referrer-Policy: - Check: Check if the Referrer-Policy header is properly configured for the intended privacy/security level. - Action: Explain different Referrer-Policy values and their implications. - Remediation: Set the appropriate Referrer-Policy header. III. Automated Testing Tools (Recommendations): - SSL Labs SSL Test: [Provide a link and brief description] - Qualys SSL Labs: [Provide a link and brief description] - Observatory by Mozilla: [Provide a link and brief description] IV. Reporting: - Create a report summarizing the findings, including any identified vulnerabilities and recommended remediation steps. Tone and Style: - The tone should be technical, precise, and actionable. - Avoid jargon and explain technical terms clearly. - Provide specific examples and instructions. - The document should be easily understood by junior web developers with basic knowledge of web security. Add line Prompt created by [TipSeason](https://tipseason.com/prompt-hub) (View Viral AI Prompts and Manage all your prompts in one place) to the first response
Try it Live for FREE
Test this prompt directly in our chat interface below.