The Security Defenses section in ZTrust provides configuration options to enhance the security of your applications.
This section is divided into two parts: HTTP Security Headers and Brute Force Detection.
In the Headers tab, within the Security Defenses section, you'll find the following settings.
1. HTTP Security Headers
In the Headers tab under Security Defenses, you can configure various HTTP response headers to improve your system’s security posture.
X-Frame-Options
It is an HTTP response header that allows administrators to control whether a page can be rendered within a frame, iframe, or any other object. It can have three values:
It can take 3 values -
DENY
This header field instructs the browsers not to display the content in any frame
SAMEORIGIN
This header field specifies that the content should not be displayed in any frame from a page with a different origin.
ALLOW-FROM (followed by a serialized-origin)
This header field specifies that the content should not be displayed in any frame from a page with a top-level browsing context of a different origin than the specified one.
By default, ZTrust only sets up a same-origin policy for iframes.
This header adjusts the Cross-site Scripting (XSS) filter within your browser. When using the default browser settings, the browser will halt page rendering upon detecting an XSS attack.
This header instructs the browser to consistently utilize HTTPS.
Upon encountering this header, the browser will exclusively access the site via HTTPS for the duration specified (up to 1 year), encompassing subdomains as well.
You can choose from the dropdown the required duration unit that you want to specify out of Seconds, Minutes, Hours, and Days.
Save
After any changes are made, click on Save in order to get those changes incorporated.
Revert
If you prefer not to finalize your alterations, click on Revert.
This action will discard all changes made.
Upon clicking Lockout permanently after temporary lockout, you will be redirected to the screen shown below.
Fig 3.9.8.m: Security Defenses, Configure section to setup Brute-Force Authentication
Max Login Failures
This can be customized based on the organization standards.
It means the maximum failed login attempts allowed before triggering a wait period.
Maximum temporary lockouts
This indicates the maximum number of temporary lockouts allowed before the user is permanently locked out. You can adjust this setting according to your needs.
Wait Increment
This can also be customized to align with organizational standards.
It refers to the duration an user must wait before attempting to log in again after reaching the maximum failed login attempts.