Skip to content

Commit 88530dc

Browse files
author
Farzad Hayatbakhsh
committed
SEC-281: Add suggestions from code review
1 parent 532fdca commit 88530dc

File tree

1 file changed

+8
-6
lines changed

1 file changed

+8
-6
lines changed

modules/ROOT/pages/security.adoc

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,7 @@ NOTE: The following is _general_ security advice that may be relevant to a websi
1212
* xref:what-we-do-to-maintain-security-for-tinymce[What we do to maintain security for TinyMCE]
1313
** xref:scripts-and-xss-vulnerabilities[Scripts and XSS vulnerabilities]
1414
** xref:keeping-dependencies-up-to-date[Keeping dependencies up-to-date]
15+
* xref:enforcing-https-with-hsts[Enforcing HTTPS with HSTS]
1516
* xref:configuring-content-security-policy-csp-for-tinymce[Configuring Content Security Policy (CSP) for TinyMCE]
1617
* xref:general-security-risks-for-user-input-elements[General security risks for user input elements]
1718
** xref:cross-site-scripting-xss[Cross-Site Scripting (XSS)]
@@ -44,6 +45,7 @@ To protect {productname} users, {companyname}:
4445

4546
* Patches Cross-Site Scripting (XSS) vulnerabilities,
4647
* Keeps {productname} dependencies up to date, and
48+
* Provides recommendations about enforcing HTTPS with HSTS, and
4749
* Provides information about how to configure a Content Security Policy that works with {productname}.
4850

4951
[[scripts-and-xss-vulnerabilities]]
@@ -55,8 +57,13 @@ SVGs (Scalable Vector Graphics) are not supported in {productname} to protect ou
5557

5658
From the 1st of January 2020, Security Advisories for patched XSS vulnerabilities will be published on the https://github.com/tinymce/tinymce/security/advisories?state=published[{productname} GitHub repository Security page].
5759

60+
[[keeping-dependencies-up-to-date]]
61+
=== Keeping dependencies up-to-date
62+
63+
To protect our users, {companyname} ensures that the TinyMCE dependencies are updated before the next version (major or minor) is released.
64+
5865
[[enforcing-https-with-hsts]]
59-
=== Enforcing HTTPS with HSTS
66+
== Enforcing HTTPS with HSTS
6067

6168
The {companyname} security team strongly recommends that customers embedding {productname} configure their web servers to include the HTTP Strict Transport Security (HSTS) header for websites served over HTTPS. This can be achieved by updating the server configurations to enable HSTS.
6269

@@ -70,11 +77,6 @@ For comprehensive guidance on implementing HSTS, refer to the following resource
7077
* link:https://cheatsheetseries.owasp.org/cheatsheets/HTTP_Strict_Transport_Security_Cheat_Sheet.html[OWASP HSTS Cheat Sheet]
7178
* link:https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Strict-Transport-Security[MDN Documentation on HSTS]
7279

73-
[[keeping-dependencies-up-to-date]]
74-
=== Keeping dependencies up-to-date
75-
76-
To protect our users, {companyname} ensures that the TinyMCE dependencies are updated before the next version (major or minor) is released.
77-
7880
include::partial$misc/general-csp.adoc[]
7981

8082
[[general-security-risks-for-user-input-elements]]

0 commit comments

Comments
 (0)