Transport Security

Require TLS 1.2+ on every connection, enable HSTS on all production domains, and pin certificates for high-value mobile traffic.

TLS 1.2 minimum is REQUIRED, TLS 1.3 SHOULD be preferred. TLS 1.0 and 1.1 MUST be disabled entirely.

HSTS: Enable on all production domains:

Strict-Transport-Security: max-age=31536000; includeSubDomains; preload

Submit to the HSTS preload list.

Certificate pinning — use with caution:

  • Pin to the intermediate CA, not the leaf (leaf certificates rotate)
  • Acceptable for mobile apps; generally avoid for web (HPKP is deprecated)
  • Backup pins MUST be included along with a recovery plan
  • Consider Certificate Transparency monitoring as an alternative

Cipher suites: Use Mozilla's "Intermediate" or "Modern" TLS configuration. Prefer AEAD ciphers (AES-GCM, ChaCha20-Poly1305).

References:

version
1.0.0
platforms
typescript, web
tags
security, transport-security
author
Mike Fullerton
modified
2026-03-27

Change History

Version Date Author Summary
1.0.0 2026-03-27 Mike Fullerton Initial creation