Security/Collab/88: Difference between revisions
(- added mention of settings to avoid mailsploit) |
No edit summary |
||
Line 18: | Line 18: | ||
Ref: https://www.owasp.org/index.php/List_of_useful_HTTP_headers | Ref: https://www.owasp.org/index.php/List_of_useful_HTTP_headers | ||
See: https://wiki.zimbra.com/wiki/Secopstips | |||
=== Strict-Transport-Security (HSTS) === | === Strict-Transport-Security (HSTS) === | ||
See: https://wiki.zimbra.com/wiki/Cipher_suites | |||
=== X-Content-Type-Options === | === X-Content-Type-Options === |
Latest revision as of 06:01, 27 July 2022
Security Settings for Zimbra Collaboration 8.8 series
Important: Upgrading from Older ZCS Versions
Defaults may change from version to version of ZCS. However, when upgrading some settings may not be updated to the new recommended default: possibly because the settings had been customized, installer limitations/bugs, or concerns that changes may impact existing users/clients. As such, it is highly recommended that you revisit settings after upgrading to ensure that values are set as expected/desired in your environment and security settings meet your requirements.
Depending upon the version you are upgrading from, you should (re)visit the security related recommendations and changes noted in earlier versions of this document (Security/Collab, Security/Collab/86, Security/Collab/87).
Neutralizing Mailsploit
As mentioned in the Security Center, to avoid Mailsploit it is recommend that all sites upgrading to manually set zimbraPrefShortEmailAddress to FALSE. This is the default for new 8.8.7 installs.
Recommended HTTP Headers
It is recommended to set most, if not all of the following HTTP headers for most ZCS deployments. Take a little time to determine what makes the most sense in your deployment.
Ref: https://www.owasp.org/index.php/List_of_useful_HTTP_headers
See: https://wiki.zimbra.com/wiki/Secopstips
Strict-Transport-Security (HSTS)
See: https://wiki.zimbra.com/wiki/Cipher_suites
X-Content-Type-Options
Prevent Internet Explorer and Google Chrome from MIME-sniffing a response away from the declared content-type.
zmprov mcf +zimbraResponseHeader "X-Content-Type-Options: nosniff"
Content-Security-Policy
ZCS does not contain a default Content-Security-Policy header (bug 58216). However, it is recommended to create one that meets the requirements of your site.
Useful references:
- https://www.youtube.com/watch?v=L97wtYCqfwM - Understanding CSP
- http://cspisawesome.com/ - online Content-Security-Policy generator
- http://caniuse.com/#search=ContentSecurityPolicy - check browser support