Open abhi4578 opened 2 months ago
Security headers that are generally static and can be applied globally across all applications should be handled at the NGINX level. This includes:
Referrer-Policy X-Frame-Options X-XSS-Protection X-Permitted-Cross-Domain-Policies
Headers that may need to be dynamically adjusted based on specific application needs, such as: Cross-Origin-Embedder-Policy Cross-Origin-Resource-Policy
should be handled at the Vert.x application level
If our current servers are already using the same static security headers across all applications, we should keep them managed at the NGINX level for consistency. For any cases where dynamic behavior or application-specific changes are required, we will implement those at the Vert.x level.
Thanks you for filling out this feature request report :vulcan_salute:
Description:
Right now, the security headers spans nginx and over vert.x. Some implemented at nginx level and some at vert.x. And there is heterogeneity in which security headers each vert.x based API server implements.
Suggestion:
We can implement all (almost all, except for SSL related configuration , which will enabled at nginx) security headers at vert.x. API server level!
Alternatives:
Anything else:
Ref: https://github.com/datakaveri/iudx-deployment/blob/f56e347ec671233205ceb399db966769363ebf2d/Docker-Swarm-deployment/single-node/nginx/example-configs/conf/acl-apd.conf#L10