The application currently includes the following directive in the Content-Security-Policy (CSP) header:
Content-Security-Policy: default-src 'self'; frame-ancestors 'none';
The following directives can be added to enhance security:
form-action 'self';
upgrade-insecure-requests;
Content-Security-Policy: default-src 'self'; frame-ancestors 'none'; form-action 'self'; upgrade-insecure-requests;
object-src 'none';
block-all-mixed-content
File Location:
<AE_Application>/Tools/apache-tomcat-11.0.2/conf/web.xml
Configuration:
<filter>
<filter-name>CSPFilter</filter-name>
<filter-class>org.apache.catalina.filters.HttpHeaderSecurityFilter</filter-class>
<init-param>
<param-name>contentSecurityPolicy</param-name>
<param-value>
default-src 'self'; frame-ancestors 'none'; form-action 'self'; upgrade-insecure-requests;
</param-value>
</init-param>
</filter>
<filter-mapping>
<filter-name>CSPFilter</filter-name>
<url-pattern>/*</url-pattern>
</filter-mapping>
Content-Security-Policy is present