Security Report Summary
A
Site: https://admestimator.ciostage.accenture.com/
IP Address: 2606:4700:4400::ac40:93bb
Report Time: 06 May 2024 11:35:32 UTC
Headers:
  • Strict-Transport-Security
  • X-Content-Type-Options
  • X-Frame-Options
  • Content-Security-Policy
  • Referrer-Policy
  • Permissions-Policy
Warning: Grade capped at A, please see warnings below.
Advanced:
Great grade! Perform a deeper security analysis of your website and APIs:
Warnings
Content-Security-PolicyThis policy contains 'unsafe-inline' which is dangerous in the default-src directive. This policy contains 'unsafe-eval' which is dangerous in the default-src directive. There was an unknown or duplicate directive "https://bots.mywizardkore.com". The CSP directive https://bots.mywizardkore.com contains upgrade-insecure-requests as a source expression. Should this be "https://bots.mywizardkore.com ...; upgrade-insecure-requests ..." instead? This policy contains 'unsafe-inline' which is dangerous in the script-src directive. This policy contains 'unsafe-eval' which is dangerous in the script-src directive.
Raw Headers
HTTP/2200
dateMon, 06 May 2024 11:35:32 GMT
content-typetext/html
set-cookieApplicationGatewayAffinityCORS=dacdf85a6e85f6b58d8f692d1a53fd9a; Path=/; SameSite=None; Secure; Httponly; secure; SameSite=Strict
cache-controlno-store
pragmano-cache
expires-1
last-modifiedMon, 06 May 2024 06:12:28 GMT
varyAccept-Encoding
strict-transport-securitymax-age=31536000; includeSubDomains
x-content-type-optionsnosniff
x-xss-protection1; mode=block
x-frame-optionsSAMEORIGIN
content-security-policydefault-src atlassian-companion:'self' 'unsafe-eval' 'unsafe-inline' *.accenture.com https://login.microsoftonline.com https://federation-sts.accenture.com; https://bots.mywizardkore.com wss://bots.mywizardkore.com upgrade-insecure-requests; block-all-mixed-content; script-src 'self' 'unsafe-inline' 'unsafe-eval' 'unsafe-line' cdn.appdynamics.com https://login.microsoftonline.com https://apis.google.com https://webmetrics.ciostage.accenture.com https://federation-sts.accenture.com *.datadoghq-browser-agent.com *.accenture.com; img-src 'self' *.accenture.com data: col.eum-appdynamics.com https://thumbnail.accenture.com; connect-src 'self' *.accenture.com col.eum-appdynamics.com https://bots.mywizardkore.com wss://bots.mywizardkore.com https://cdnjs.cloudflare.com https://rum.browser-intake-datadoghq.com *.datadoghq.com login.microsoftonline.com
access-control-allow-originSAMEORIGIN
x-content-security-policyframe-ancestors *.accenture.com *.mywizardkore.com
x-webkit-cspframe-ancestors *.accenture.com
referrer-policyno-referrer
permissions-policy
cf-cache-statusDYNAMIC
set-cookie__cf_bm=2szrpyOyWBpNybPz8GS1tYyS7H0v5JSx3SHJGXedFlI-1714995332-1.0.1.1-p6ZU_xUX.RqRQC9ZyElZQJe1gYXlIN1iLRlacZfEEhnGof6eSkpzmQeAC4ZD2X3xdLMEHgle0qMxOUpP5.T9BA; path=/; expires=Mon, 06-May-24 12:05:32 GMT; domain=.admestimator.ciostage.accenture.com; HttpOnly; Secure; SameSite=None
servercloudflare
cf-ray87f8aadaf93c235b-SJC
content-encodinggzip
alt-svch3=":443"; ma=86400
Upcoming Headers
Cross-Origin-Embedder-PolicyCross-Origin Embedder Policy allows a site to prevent assets being loaded that do not grant permission to load them via CORS or CORP.
Cross-Origin-Opener-PolicyCross-Origin Opener Policy allows a site to opt-in to Cross-Origin Isolation in the browser.
Cross-Origin-Resource-PolicyCross-Origin Resource Policy allows a resource owner to specify who can load the resource.
Additional Information
strict-transport-securityHTTP Strict Transport Security is an excellent feature to support on your site and strengthens your implementation of TLS by getting the User Agent to enforce the use of HTTPS.
x-content-type-optionsX-Content-Type-Options stops a browser from trying to MIME-sniff the content type and forces it to stick with the declared content-type. The only valid value for this header is "X-Content-Type-Options: nosniff".
x-xss-protectionX-XSS-Protection sets the configuration for the XSS Auditor built into older browsers. The recommended value was "X-XSS-Protection: 1; mode=block" but you should now look at Content Security Policy instead.
x-frame-optionsX-Frame-Options tells the browser whether you want to allow your site to be framed or not. By preventing a browser from framing your site you can defend against attacks like clickjacking.
content-security-policyContent Security Policy is an effective measure to protect your site from XSS attacks. By whitelisting sources of approved content, you can prevent the browser from loading malicious assets. Analyse this policy in more detail. You can sign up for a free account on Report URI to collect reports about problems on your site.
access-control-allow-originThe Access-Control-Allow-Origin header is used to configure CORS.
x-content-security-policyX Content Security Policy is required for CSP support in IE 10 and IE 11. For other modern browsers the Content-Security-Policy header should be used.
x-webkit-cspX-Webkit-CSP is required for CSP support in older Chrome, Safari and other Webkit based browsers. For other modern browsers the Content-Security-Policy header should be used.
referrer-policyReferrer Policy is a new header that allows a site to control how much information the browser includes with navigations away from a document and should be set by all sites.
permissions-policyPermissions Policy is a new header that allows a site to control which features and APIs can be used in the browser.
serverServer value has been changed. Typically you will see values like "Microsoft-IIS/8.0" or "nginx 1.7.2".