HTTP response headers

To improve the security of your application against client-based attacks, you can use the HTTP response headers that are supported by your browser.

Make sure that you test every custom header that you create for your application. In some situations, custom headers can cause problems with how the application operates.

The Pega Platform supports the ability to add custom headers. You might consider adding the following security headers to your application:

  • X-XSS-Protection - Prevents cross-site scripting. Prevents attackers from injecting client-side scripts into the website that is viewed from the user side.
  • HTTP Strict-Transport-Security - Allows a website to tell browsers that they should communicate only by using HTTPS, not HTTP.
  • Content-Security-Policy – Controls the resources that the user agent can load for the website.

Do not attempt to set a custom X-Frame-Options response header. The correct security setting to use instead is Content Security Policy. For more information, see Content security policies.