Web pages must be protected from being embedded in malicious sites (clickjacking).
Clickjacking is a malicious technique often used in phishing attacks. By using it, attackers may deceive users and make them perform actions other than the ones they perceive, which may cause them to reveal confidential information. Web servers can protect pages they host to a great extent by including headers in their responses that prevent the pages from being embedded in malicious sites (e.g., "X-Frame-Options").
This requirement is verified in following services
- OWASP TOP 10-A7. Identification and authentication failures
- Agile Alliance-9. Continuous attention to technical excellence and good design
- MITRE ATT&CK®-M1013. Application developer guidance
- MITRE ATT&CK®-M1021. Restrict web-based content
- CMMC-CA_L2-3_12_2. Plan of action
- WASC-A_18. Credential and session prediction
- MVSP-2_3. Application design controls - Security Headers
- PCI DSS-6_4_1. Public-facing web applications are protected against attacks
- 043. Insecure or unset HTTP headers - Content-Security-Policy
- 135. Insecure or unset HTTP headers - X-XSS Protection
- 152. Insecure or unset HTTP headers - X-Frame Options
- 360. Clickjacking
- 440. Insecure or unset HTTP headers - Permissions-Policy
Search for vulnerabilities in your apps for free with our automated security testing! Start your 21-day free trial and discover the benefits of our Continuous Hacking Machine Plan. If you prefer a full service that includes the expertise of our ethical hackers, don't hesitate to contact us for our Continuous Hacking Squad Plan.