Blog | G5 Cyber Security

HTTPS Configuration: Who’s Responsible?

TL;DR

Security teams should own HTTPS configuration, but it requires close collaboration with DevOps and web development teams. Developers implement, DevOps automate, Security reviews and enforces policy.

1. Why is this important?

HTTPS isn’t just about a padlock in the browser anymore. It’s fundamental to trust, data security, SEO ranking, and increasingly, regulatory compliance (like GDPR). Incorrect configuration can lead to:

2. Roles & Responsibilities

Here’s a breakdown of who should do what:

2.1 Security Team (Ownership)

2.2 DevOps Team (Automation & Maintenance)

2.3 Web Development Team (Implementation)

3. Practical Steps for Implementation

  1. Establish a Clear Policy: Document your HTTPS requirements, including TLS versions (TLS 1.2 or higher), cipher suites, and certificate authorities.
  2. Automate Certificate Management: Use Let’s Encrypt or ACME clients to automate the issuance and renewal of certificates.
  3. Implement HSTS: Configure your web server to send the HSTS header. Start with a small max-age value and gradually increase it as you gain confidence.
  4. Regularly Scan for Vulnerabilities: Use tools like SSL Labs’ SSL Server Test to identify and fix any configuration issues.
  5. Monitor Certificate Expiration: Set up alerts to notify you of expiring certificates.
  6. Review Configurations Regularly: Conduct periodic reviews of your HTTPS configurations to ensure compliance with policy.

4. Tools to Help

Exit mobile version