methodology / Security & Infrastructure / #4
Security headers (HSTS, CSP, X-Frame-Options, Referrer-Policy, Permissions-Policy, X-Content-Type-Options)
#4 · Recommended · Web Quality · weighted · Security & Infrastructure · weight 5.3% · impl implemented · method v1.2.0
Web Quality factor
This factor is part of Web Quality — the weighted 0..100 score that sits above Web Standards. Its weight depends on what kind of site is being measured. Web Standards items take priority; this factor only enters the score once Web Standards passes.
- Base weight
- 1.0 applied to every site type unless overridden below
- Why this weight
- Security headers (HSTS, CSP, XFO) are how a site protects its own users from clickjacking, MITM downgrade, and XSS. Lower for personal/blog because most managed platforms can't set them.
Per-site-type overrides
| Site type | Weight | Δ vs base |
|---|---|---|
| Blog | 0.5 | -0.5 |
| Personal site | 0.4 | -0.6 |
Site types not listed inherit the base weight.
What this means for your business
Hidden settings your site sends to a visitor's browser to block common attacks like fake login overlays, hijacked sessions, and content sniffing. Modern hosting platforms set them by default; older custom-built sites often don't.
Plain title: Browser-level protections for visitors
What we measure
Modern browsers honor a small set of HTTP headers that protect your visitors from clickjacking, script injection, and content-sniffing attacks. Most modern sites set them. If you don't, browsers fall back to weaker defaults.
How to improve your score
Set the headers via your web server config or CDN. Goal headers: - `Strict-Transport-Security: max-age=31536000; includeSubDomains; preload` - `Content-Security-Policy: default-src 'self'` (tighten as needed) - `X-Frame-Options: SAMEORIGIN` - `Referrer-Policy: strict-origin-when-cross-origin` - `Permissions-Policy: ...` - `X-Content-Type-Options: nosniff`
Facts
When this applies
This platform doesn't allow site owners to set custom HTTP response headers, so security-headers grading isn't fair.
- Marked n/a when the detected platform doesn't support canSetCustomHeaders (e.g., Squarespace and Wix can't set custom HTTP headers, so factor #4 becomes n/a there).
Scoring
Scoring formulas are versioned with the methodology. The current method (v1.2.0) maps raw measurements to pass, warn, fail. Factor weights determine how much each contributes to the composite — see the methodology index for the full table.
Cited by these standards
Standards in the Standards Library whose satisfiedBy requirement tree references this factor. Each link goes to the standard's full entry — methodology, scope, and the other factors it relies on.
- Content Security Policy Level 3
- Cross-Origin isolation (COOP / COEP / CORP)
- HTTP Strict Transport Security
- ISO/IEC 27001:2022
- Modern HTTP security headers
- NIST Cybersecurity Framework 2.0
- OWASP Top 10 (2025)
- PCI DSS v4.0
- Permissions-Policy
- Referrer-Policy
- security.txt
- SOC 2 (Type I & Type II)
- Subresource Integrity
- X-Content-Type-Options: nosniff
- X-Frame-Options + frame-ancestors
Version history
| Version | Change | Date |
|---|---|---|
| v1.2.0 | Factor introduced. Status: live. Scoring impl: implemented. | 2026-04-25 |