Strict-Transport-Security (HSTS) Header Missing

No Comments

Quick Reference

Element Code: SE-002

Issue: HTTP Strict Transport Security header is not set

Impact: Vulnerable to downgrade attacks and SSL stripping

Fix: Add HSTS header to enforce HTTPS connections

Detection: Security scanners, browser DevTools, SSL Labs

What Is This Issue?

HSTS tells browsers to only connect to your site via HTTPS, even if the user types HTTP or clicks an HTTP link. Without it, attackers can potentially intercept the initial HTTP request before it redirects to HTTPS.

Why This Matters

  • Man-in-the-Middle Prevention: Blocks SSL stripping attacks
  • Forced HTTPS: Browser won't connect via HTTP
  • SEO: Part of good security practices that can influence trust

How to Implement

Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
  • max-age: How long (seconds) to remember HSTS (31536000 = 1 year)
  • includeSubDomains: Apply to all subdomains
  • preload: Eligible for browser preload lists

TL;DR (The Simple Version)

Your site doesn't tell browsers to always use HTTPS. Add the HSTS header so browsers automatically upgrade HTTP requests to HTTPS, preventing downgrade attacks.

About SEO ProCheck

Technical SEO consulting and GEO strategy with 20 years of enterprise experience. Case studies, resources, and tools for search and AI visibility.

Work With Me

Technical SEO audits, GEO strategy, site migrations, and international SEO. Hourly consulting for teams who need hands-on support, not just reports.

Subscribe to our newsletter!

More from our blog