-
Notifications
You must be signed in to change notification settings - Fork 14
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add Data Portal CSP and appropriate rules [after March 13] #766
Comments
Example of cxg's CSP directives:
|
The existing module uses javascript and is in production for along. I would suggest extending that (with javascript) for now. Once in production we can evaluate and see if performance is acceptable. If not we can manage a rewrite.
You don't need to fork, you should be able to push a branch to the cztack repo.
If possible, I would prefer to add this as a new (optional) feature in the exiting module. |
Moving this back to the Product Backlog, since we need to work on Next.js migration this sprint first If things go as planned, we can do this CSP ticket in the next sprint 😄💪 |
Sync'd with @jgadling (Infra) on the timeline for deploying Nextjs to staging and prod, we're aiming for 3/13 for prod ECS cutover, so will only be able to merge this Nextjs branch into In the meantime, I'll babysit this branch to sync with |
The Next.js migration PR is now merged! So we should be able to verify the CSP and HSTS are implemented correctly in staging 👍 |
Verified in prod, so closing! |
As a result of Enable HTTP Strict Transport Security and Content Security Policy (CSP) we have determined that our best route to deliver CSP is to insert a Lambda@Edge function in the flow from S3 -> CloudFront -> End User (Blog Post). This function should add any security headers that we need (CSP and HSTS).
Infra already has a cztack module for adding security headers, we can modify this to also include any CSP directives we need.
Pref impacts we can expect:
Steps:
aws-lambda-edge-add-security-headers
module with a new nameExample of cxg's CSP directives:
Feel free to ping @seve for any clarification
TEAM COMMENTS
OUTDATED(12/10):
As a result of #626 we have determined that our best route to deliver CSP is to temporarily serve CSP directives via an HTML
<meta>
tag through Gatsby's gatsby-plugin-csp. Until we can serve via HTTP headers with our future platform that will be planned out in #765.This work should be done before any features related to user input are no longer behind a feature flag
Steps:
The text was updated successfully, but these errors were encountered: