{"id":1139,"date":"2020-06-25T09:00:00","date_gmt":"2020-06-25T09:00:00","guid":{"rendered":"https:\/\/sectigostore.com\/blog\/?p=1139"},"modified":"2020-12-11T11:09:51","modified_gmt":"2020-12-11T11:09:51","slug":"what-is-hsts-and-why-should-your-organization-use-it","status":"publish","type":"post","link":"https:\/\/sectigostore.com\/blog\/what-is-hsts-and-why-should-your-organization-use-it\/","title":{"rendered":"What Is HSTS and Why Should Your Organization Use It?"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">HSTS &#8211; The HTTPS-only standard is a way for websites to ensure that web browsers always connect using a secure HTTPS connection \u2014 we\u2019ll explore what it is, how it works, and the benefits (and risks) of implementing this system<\/h2>\n\n\n\n<p>If you wake up in the middle of the night with burning questions like \u201cwhat is HSTS?\u201d and \u201cwhy aren\u2019t more organizations using http strict transport security?\u201d then you probably should have a drink (or two) and do some relaxation techniques before lying down to sleep.<\/p>\n\n\n\n<p>But if HTTP strict transport security really is a topic of interest and you want to learn how a website uses HSTS to make connections more secure for users, then we\u2019re happy to provide clarity.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Is HSTS and How Does It Relate to HTTPS?<\/h2>\n\n\n\n<p>HTTP strict transport security is a web security policy that websites can employ to direct web clients (browsers) to make web connections more secure for users. Some people refer to it as SSL HSTS. Or, as one of my delightful colleagues likes to say, it\u2019s \u201cfancy HTTPS.\u201d<\/p>\n\n\n\n<p>The idea behind HSTS is that it forces browsers to always load the given website using a hypertext transfer protocol secure (HTTPS) connection.<\/p>\n\n\n\n<p>Before we move on, let\u2019s take a moment for a quick refresher on HTTPS: <a href=\"https:\/\/sectigostore.com\/page\/how-does-https-work\/\">An HTTPS connection<\/a> is a secure, encrypted connection between two parties \u2014 typically, a web client (browser) and the web server (website) they\u2019re connecting to. Facilitating an HTTPS connection involves installing an SSL\/TLS certificate on the website\u2019s server. When that certificate is an <a href=\"https:\/\/sectigostore.com\/page\/ov-vs-ev-ssl-certificate\/\">organization (OV) or extended validation (EV) certificate<\/a>, it both ensures that the user is connecting to a legitimate organization\u2019s server and also protects the integrity of the connection itself.<\/p>\n\n\n\n<p>Now, back to what HSTS is\u2026<\/p>\n\n\n\n<p>So, when HSTS is enabled, this means that even if a web user types in \u201chttp:\/\/\u201d in a website URL, the browser would connect to the site using the \u201chttps:\/\/\u201d protocol instead of the insecure HTTP. Enabling HTTP strict transport security is kind of like your parents telling you as a little kid that you always need to walk home at night along the safe, well-lit, heavily-traveled street instead of taking shady alleys or less-traveled back roads.<\/p>\n\n\n\n<p>In the walking scenario, you\u2019ll likely avoid the serial killers and creepy dudes lurking in the shadows. In the HTTPS scenario, your users will enjoy a secure connection. Either way, it sounds like a win-win.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What Is HSTS: How Does HSTS Work?<\/h3>\n\n\n\n<p>Let\u2019s consider the following example from that same Mozilla MDN page to provide a little more clarity about how HSTS applies to the real world:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><em>\u201cYou log into a free WiFi access point at an airport and start surfing the web, visiting your online banking service to check your balance and pay a couple of bills. Unfortunately, the access point you&#8217;re using is actually a hacker&#8217;s laptop, and they&#8217;re intercepting your original HTTP request and redirecting you to a clone of your bank&#8217;s site instead of the real thing. Now your private data is exposed to the hacker.<\/em><\/p><p><em>Strict Transport Security resolves this problem; as long as you&#8217;ve accessed your bank&#8217;s web site once using HTTPS, and the bank&#8217;s web site uses Strict Transport Security, your browser will know to automatically use only HTTPS, which prevents hackers from performing this sort of man-in-the-middle attack.\u201d<\/em><\/p><\/blockquote>\n\n\n\n<p>The more technical way that HSTS works is that it uses an HTTP header to communicate specific security parameters to HTTPS supporting website clients. Basically, the policy instructs a browser to enable HSTS for that specific domain (and, ideally, its subdomains) and to remember that specific information for a set period of time.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What Is HSTS: How to Use HSTS on Your Site<\/h3>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignright size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/google-hsts.png\" alt=\"What is HSTS screenshot of Google.com's header information, including an example of HTTP strict transport security in action.\" class=\"wp-image-1140\" width=\"370\" height=\"241\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/google-hsts.png 486w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/google-hsts-300x196.png 300w\" sizes=\"auto, (max-width: 370px) 100vw, 370px\" \/><figcaption>Screenshot of HSTS code for Google.com<\/figcaption><\/figure><\/div>\n\n\n\n<p>Wondering which browsers HSTS would work on? Several of the major browsers (both for desktop and mobile) already have <a href=\"https:\/\/caniuse.com\/#feat=stricttransportsecurity\" target=\"_blank\" rel=\"noreferrer noopener\">versions of their software that support HSTS<\/a>, including:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Google Chrome<\/li><li>Apple Safari<\/li><li>Mozilla Firefox<\/li><li>Microsoft\u2019s Internet Explorer and Edge<\/li><li>Opera<\/li><\/ul>\n\n\n\n<p>The syntax for this type of policy would look something like this <a href=\"https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/HTTP\/Headers\/Strict-Transport-Security\" target=\"_blank\" rel=\"noreferrer noopener\">example header info from Mozilla\u2019s MDN<\/a>:<\/p>\n\n\n\n<p><strong>Strict-Transport-Security: max-age=&lt;expire-time&gt;<\/strong><\/p>\n\n\n\n<p>You can write the instructions for the specific number of seconds that HSTS would be enabled for.&nbsp; So, to set HSTS for one year (365), you could use the following header:<\/p>\n\n\n\n<p><strong>Strict-Transport-Security: max-age=31536000;<\/strong><\/p>\n\n\n\n<p>And, if you want to make sure that the policy directs the browser to also always load subdomains via HTTPS, you can specify that using this rule:<\/p>\n\n\n\n<p><strong>Strict-Transport-Security: max-age=31536000; includesSubDomains<\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Concerns Surrounding the Process of How a Website Uses HSTS<\/h3>\n\n\n\n<p>Okay, all of this is obviously great and can contribute to a more secure web for users. But we\u2019d be remiss if we didn\u2019t at least include one word of caution: HSTS isn\u2019t 100% without risk. There\u2019s a slim chance that a hacker could take advantage of that initial connection when a user loads an HSTS-enabled website for the first time.<\/p>\n\n\n\n<p>You see, in that split second before a user\u2019s client downloads that header message, a hacker with the right tools and know-how could downgrade the encrypted connection. This would enable them to either direct them to a phishing website or outright steal data.<\/p>\n\n\n\n<p>But, again, it\u2019s an exceptionally small window. But if that concern is enough to turn you off the idea of using HTTP strict transport security, just wait a moment. There\u2019s a way you can prevent hackers from using that window to their advantage that\u2019s known as HSTS preloading.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What HSTS Preloading Is and Why It\u2019s Beneficial for Your Organization<\/h2>\n\n\n\n<p>Although it\u2019s not a requirement, enabling HSTS is something that can be beneficial for businesses and organizations that value their customers\u2019 privacy and data security. HSTS is especially valuable for websites where customers frequently login, that could be tempting targets for a man-in-the-middle attack. And HSTS preloading is a great way to make that happen while also reducing the risks associated with initiating the first connection to an HSTS-enabled website.<\/p>\n\n\n\n<p>An HSTS preload list is a list of domains that web browsers are instructed to always serve via an encrypted HTTPS connection. All of the major browsers like Chrome, Firefox, and Safari all either pull from Google\u2019s HSTS preload list or have one of their own based on that list.<\/p>\n\n\n\n<p>According to <a href=\"https:\/\/www.chromium.org\/hsts\" target=\"_blank\" rel=\"noreferrer noopener\">Google\u2019s Chromium Project<\/a>, there are some notable names already the HSTS preload list:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Google<\/li><li>Stripe<\/li><li>Twitter<\/li><li>LastPass<\/li><li>Simple<\/li><\/ul>\n\n\n\n<p>Heck, even the <a href=\"https:\/\/www.thesslstore.com\/blog\/gov-domains-to-force-https-hsts-preloading-will-be-enabled-starting-sept-1\/\" target=\"_blank\" rel=\"noreferrer noopener\">U.S. government has finally decided to officially get on the HSTS preloading bandwagon!<\/a> (And we\u2019re sure we don\u2019t have to tell you what a monumental push that must have taken by some administrator somewhere!) In June 2020, the U.S. General Services Administration (GSA) <a href=\"https:\/\/home.dotgov.gov\/management\/preloading\/dotgovhttps\/\">announced their intention<\/a> to use HSTS preloading for all new .gov domains starting Sept. 1, 2020. Their (eventual) goal is to force HTTPS connections for all .gov websites, but that\u2019s going to be a few years down the road before that can happen in relation to transitioning existing .gov websites.<\/p>\n\n\n\n<p>So, in the case of .gov top level domains (TLDs), this means that whenever a user tries to connect to a .gov website on that list via an HSTS supporting browser, they will only be able to load the site via HTTPS.<\/p>\n\n\n\n<p>If you want your domain to be included on the HSTS preload list, you can use this header:<\/p>\n\n\n\n<p><strong>Strict-Transport-Security: max-age=31536000; includesSubDomains<\/strong>;<strong> preload<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Final Thoughts on What HSTS Is &amp; the Use of HSTS Preloading<\/h2>\n\n\n\n<p>Using an HTTPS connection for your website is essential both in the sense of keeping your customers\u2019 data (and your own data) secure, as well as making your site appear legitimate in the eyes of Google\u2019s search algorithms. We say that because Google\u2019s pretty much made HTTPS mandatory by counting it as one of its ranking factors a few years back.<\/p>\n\n\n\n<p>So, although the use of HSTS and HSTS preloading isn\u2019t a requirement (unless you\u2019re in charge of new .gov domains starting Sept. 1), it\u2019s easy to see why it can be considered a general smart practice where website security is concerned.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>It\u2019s a simple yet efficient process to implement that provides greater security to your users regarding their personal and\/or financial data.<\/li><li>This helps your site achieve greater trust in the eyes of your users.<\/li><li>Enabling HSTS helps to ensure that you remain compliant with privacy and data security regulations that require the use of HTTPS.<\/li><\/ul>\n\n\n\n<p>We hope this article answered your questions about &#8220;what is HSTS?&#8221; or  &#8220;what is HTTP strict transport security.&#8221; Of course, if you still have questions relating to what HSTS is, please be sure to leave a comment below.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is HSTS? The HTTPS-only standard is a way for websites to ensure that web browsers always connect using a secure HTTPS connection.<\/p>\n","protected":false},"author":8,"featured_media":1141,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[86,87],"class_list":["post-1139","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-web-security","tag-hsts","tag-https","post-with-tags"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What Is HSTS and Why Should Your Organization Use It?<\/title>\n<meta name=\"description\" content=\"Wondering &quot;what is HSTS?&quot; We&#039;ve got the answers to your questions about HTTP strict transport security and what to know about how a website uses HSTS.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sectigostore.com\/blog\/what-is-hsts-and-why-should-your-organization-use-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is HSTS and Why Should Your Organization Use It?\" \/>\n<meta property=\"og:description\" content=\"Wondering &quot;what is HSTS?&quot; We&#039;ve got the answers to your questions about HTTP strict transport security and what to know about how a website uses HSTS.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sectigostore.com\/blog\/what-is-hsts-and-why-should-your-organization-use-it\/\" \/>\n<meta property=\"og:site_name\" content=\"InfoSec Insights\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-25T09:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-12-11T11:09:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/what-is-hsts-everything-to-know.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1067\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Casey Crane\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Casey Crane\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-hsts-and-why-should-your-organization-use-it\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-hsts-and-why-should-your-organization-use-it\\\/\"},\"author\":{\"name\":\"Casey Crane\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/559abd5fa4d9d651eaf18d9b9e91a64c\"},\"headline\":\"What Is HSTS and Why Should Your Organization Use It?\",\"datePublished\":\"2020-06-25T09:00:00+00:00\",\"dateModified\":\"2020-12-11T11:09:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-hsts-and-why-should-your-organization-use-it\\\/\"},\"wordCount\":1478,\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-hsts-and-why-should-your-organization-use-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/what-is-hsts-everything-to-know.png\",\"keywords\":[\"HSTS\",\"HTTPS\"],\"articleSection\":[\"Web Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-hsts-and-why-should-your-organization-use-it\\\/\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-hsts-and-why-should-your-organization-use-it\\\/\",\"name\":\"What Is HSTS and Why Should Your Organization Use It?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-hsts-and-why-should-your-organization-use-it\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-hsts-and-why-should-your-organization-use-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/what-is-hsts-everything-to-know.png\",\"datePublished\":\"2020-06-25T09:00:00+00:00\",\"dateModified\":\"2020-12-11T11:09:51+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/559abd5fa4d9d651eaf18d9b9e91a64c\"},\"description\":\"Wondering \\\"what is HSTS?\\\" We've got the answers to your questions about HTTP strict transport security and what to know about how a website uses HSTS.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-hsts-and-why-should-your-organization-use-it\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-hsts-and-why-should-your-organization-use-it\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-hsts-and-why-should-your-organization-use-it\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/what-is-hsts-everything-to-know.png\",\"contentUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/what-is-hsts-everything-to-know.png\",\"width\":1600,\"height\":1067},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-hsts-and-why-should-your-organization-use-it\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Is HSTS and Why Should Your Organization Use It?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\",\"name\":\"InfoSec Insights\",\"description\":\"SectigoStore.com Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/559abd5fa4d9d651eaf18d9b9e91a64c\",\"name\":\"Casey Crane\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c18d819d34a1995e91a4aa7518e9048df7856f336a1ede2262a572db7b1c2506?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c18d819d34a1995e91a4aa7518e9048df7856f336a1ede2262a572db7b1c2506?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c18d819d34a1995e91a4aa7518e9048df7856f336a1ede2262a572db7b1c2506?s=96&d=mm&r=g\",\"caption\":\"Casey Crane\"},\"description\":\"Casey is a writer and editor with a background in journalism, marketing, PR and communications. She has written about cyber security and information technology for several industry publications, including InfoSec Insights, Hashed Out, Experfy, HackerNoon, and Cybercrime Magazine.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Is HSTS and Why Should Your Organization Use It?","description":"Wondering \"what is HSTS?\" We've got the answers to your questions about HTTP strict transport security and what to know about how a website uses HSTS.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sectigostore.com\/blog\/what-is-hsts-and-why-should-your-organization-use-it\/","og_locale":"en_US","og_type":"article","og_title":"What Is HSTS and Why Should Your Organization Use It?","og_description":"Wondering \"what is HSTS?\" We've got the answers to your questions about HTTP strict transport security and what to know about how a website uses HSTS.","og_url":"https:\/\/sectigostore.com\/blog\/what-is-hsts-and-why-should-your-organization-use-it\/","og_site_name":"InfoSec Insights","article_published_time":"2020-06-25T09:00:00+00:00","article_modified_time":"2020-12-11T11:09:51+00:00","og_image":[{"width":1600,"height":1067,"url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/what-is-hsts-everything-to-know.png","type":"image\/png"}],"author":"Casey Crane","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Casey Crane","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sectigostore.com\/blog\/what-is-hsts-and-why-should-your-organization-use-it\/#article","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-hsts-and-why-should-your-organization-use-it\/"},"author":{"name":"Casey Crane","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/559abd5fa4d9d651eaf18d9b9e91a64c"},"headline":"What Is HSTS and Why Should Your Organization Use It?","datePublished":"2020-06-25T09:00:00+00:00","dateModified":"2020-12-11T11:09:51+00:00","mainEntityOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-hsts-and-why-should-your-organization-use-it\/"},"wordCount":1478,"image":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-hsts-and-why-should-your-organization-use-it\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/what-is-hsts-everything-to-know.png","keywords":["HSTS","HTTPS"],"articleSection":["Web Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sectigostore.com\/blog\/what-is-hsts-and-why-should-your-organization-use-it\/","url":"https:\/\/sectigostore.com\/blog\/what-is-hsts-and-why-should-your-organization-use-it\/","name":"What Is HSTS and Why Should Your Organization Use It?","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-hsts-and-why-should-your-organization-use-it\/#primaryimage"},"image":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-hsts-and-why-should-your-organization-use-it\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/what-is-hsts-everything-to-know.png","datePublished":"2020-06-25T09:00:00+00:00","dateModified":"2020-12-11T11:09:51+00:00","author":{"@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/559abd5fa4d9d651eaf18d9b9e91a64c"},"description":"Wondering \"what is HSTS?\" We've got the answers to your questions about HTTP strict transport security and what to know about how a website uses HSTS.","breadcrumb":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-hsts-and-why-should-your-organization-use-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sectigostore.com\/blog\/what-is-hsts-and-why-should-your-organization-use-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sectigostore.com\/blog\/what-is-hsts-and-why-should-your-organization-use-it\/#primaryimage","url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/what-is-hsts-everything-to-know.png","contentUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/what-is-hsts-everything-to-know.png","width":1600,"height":1067},{"@type":"BreadcrumbList","@id":"https:\/\/sectigostore.com\/blog\/what-is-hsts-and-why-should-your-organization-use-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sectigostore.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What Is HSTS and Why Should Your Organization Use It?"}]},{"@type":"WebSite","@id":"https:\/\/sectigostore.com\/blog\/#website","url":"https:\/\/sectigostore.com\/blog\/","name":"InfoSec Insights","description":"SectigoStore.com Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sectigostore.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/559abd5fa4d9d651eaf18d9b9e91a64c","name":"Casey Crane","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c18d819d34a1995e91a4aa7518e9048df7856f336a1ede2262a572db7b1c2506?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c18d819d34a1995e91a4aa7518e9048df7856f336a1ede2262a572db7b1c2506?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c18d819d34a1995e91a4aa7518e9048df7856f336a1ede2262a572db7b1c2506?s=96&d=mm&r=g","caption":"Casey Crane"},"description":"Casey is a writer and editor with a background in journalism, marketing, PR and communications. She has written about cyber security and information technology for several industry publications, including InfoSec Insights, Hashed Out, Experfy, HackerNoon, and Cybercrime Magazine."}]}},"_links":{"self":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/1139","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/comments?post=1139"}],"version-history":[{"count":3,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/1139\/revisions"}],"predecessor-version":[{"id":1895,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/1139\/revisions\/1895"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media\/1141"}],"wp:attachment":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media?parent=1139"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/categories?post=1139"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/tags?post=1139"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}