CONFIDENTIAL — HST-SEC-2026-003 — houstons.tech
Independent Security Assessment

Domain & Email
Security Assessment

A comprehensive security audit of houstons.tech covering email authentication, DNS infrastructure, web security headers, compliance alignment, and threat intelligence.

Domain
houstons.tech
Assessment Date
6 March 2026
Document ID
HST-SEC-2026-003
Scan Mode
Deep Scan
Classification
CONFIDENTIAL
01 — Overview

Executive Summary

High-level findings and risk assessment for houstons.tech

Critical Findings Detected

This assessment of houstons.tech identified 14 findings across email authentication, web security, DNS infrastructure, and compliance alignment. The domain demonstrates strong email authentication with SPF hardfail and DMARC reject policies, but lacks DKIM signing which undermines DMARC alignment for forwarded messages. Web security is weakened by missing HSTS and Content Security Policy headers. The domain is listed on URIBL blacklist and lacks DNSSEC and CAA records. Cloudflare provides strong TLS 1.3 encryption and WAF protection at the edge, but origin server SSL misconfiguration produces HTTP 525 errors.

14
Total Findings
4
Critical + High
N/A
TLS Version
Unknown
Platform
Critical
1
High
3
Medium
5
Low
3
Info
2
Quick Wins

HST-001: Configure DKIM via Forward Email (30 min)
HST-004: Investigate and request URIBL delisting (30 min)

IDFindingSeverityStatus
HST-001DKIM Records Not FoundCriticalOpen
HST-002HTTP Strict Transport Security (HSTS) Not ConfiguredHighOpen
HST-003Content Security Policy (CSP) Not ConfiguredHighOpen
HST-004Domain Listed on URIBL BlacklistHighOpen
HST-005MTA-STS Policy Not EnforcedMediumOpen
HST-006DNSSEC Not EnabledMediumOpen
HST-007CAA Records Not ConfiguredMediumOpen
HST-008Permissions-Policy Header MissingMediumOpen
HST-009Cloudflare Origin SSL Error (HTTP 525)MediumOpen
HST-010DANE/TLSA Records Not ConfiguredLowOpen
HST-011BIMI Record Not ConfiguredLowOpen
HST-012security.txt Not FoundLowOpen
HST-013XML Sitemap Not ConfiguredInfoOpen
HST-014HSTS Preload Not EnrolledInfoOpen
02 — Scope & Methodology

Assessment Scope

What was tested, how, and what limitations apply

In Scope

  • ✓ DNS records & configuration
  • ✓ Email authentication (SPF, DKIM, DMARC, MTA-STS, TLS-RPT, DANE)
  • ✓ HTTP security headers
  • ✓ SSL/TLS configuration
  • ✓ DNSBL / blacklist checking
  • ✓ SMTP analysis
  • ✓ OSINT & historical intelligence
  • ✓ Compliance framework alignment

Out of Scope

  • ✗ Application security testing
  • ✗ Penetration testing
  • ✗ Source code review
  • ✗ Social engineering
  • ✗ Internal network assessment
Methodology Note

This assessment was performed using publicly available information only. No intrusive testing was conducted. Scan timestamp: 2026-03-06T00:49:39Z. Mode: Deep Scan.

03 — Findings

Detailed Findings

14 findings identified, sorted by severity.

HST-001Critical8.0/10 Critical

DKIM Records Not Found

No DKIM selectors were found after checking 21 common selectors including default, selector1, selector2, google, and others. Without DKIM, DMARC alignment relies solely on SPF, which fails when emails are forwarded. This is the single largest gap in the domain's email security posture.

Likelihood
Impact
Evidence
Evidence
Selectors checked: 21
Found: 0

dig TXT default._domainkey.houstons.tech +short → No answer
dig TXT selector1._domainkey.houstons.tech +short → No answer
dig TXT fe-._domainkey.houstons.tech +short → No answer

Email provider: Forward Email (mx1.forwardemail.net)
Remediation
Remediation
Configure DKIM via Forward Email:

1. In Forward Email admin, navigate to Domain Settings → DKIM
2. Generate DKIM key pair
3. Add the CNAME or TXT record provided:
   fe-._domainkey.houstons.tech CNAME fe-._domainkey.forwardemail.net
4. Wait for DNS propagation (5-30 minutes)
5. Verify: dig TXT fe-._domainkey.houstons.tech +short
ISM-0269E8-ML1ISO-A.5.14CIS-9.5DISP-ICT
HST-002High4.8/10 High

HTTP Strict Transport Security (HSTS) Not Configured

The HSTS header is not present in HTTP responses. Without HSTS, users are vulnerable to SSL stripping attacks on first visit and protocol downgrade attacks. This is particularly important as Cloudflare serves the site over HTTPS.

Likelihood
Impact
Evidence
Evidence
Response headers checked:
✗ Strict-Transport-Security: NOT FOUND

Headers present: X-Frame-Options, X-Content-Type-Options, Referrer-Policy, X-XSS-Protection
Headers missing: Strict-Transport-Security, Content-Security-Policy, Permissions-Policy
Remediation
Remediation
Enable HSTS in Cloudflare:

1. Cloudflare Dashboard → SSL/TLS → Edge Certificates
2. Enable 'Always Use HTTPS'
3. Enable HSTS with settings:
   - max-age: 31536000 (1 year)
   - includeSubDomains: yes
   - preload: yes
4. Or add via Cloudflare Transform Rules:
   Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
ISM-1485ISM-1486E8-ML2ISO-A.8.24CIS-3.10DISP-ICT
HST-003High4.8/10 High

Content Security Policy (CSP) Not Configured

No Content-Security-Policy header is present. CSP prevents cross-site scripting (XSS), clickjacking, and other code injection attacks by specifying trusted content sources. Without CSP, the site is more vulnerable to XSS and data exfiltration attacks.

Likelihood
Impact
Evidence
Evidence
Content-Security-Policy: NOT FOUND
CSP Analysis: No policy detected

Header score: C (44%, 4/9 security headers present)
Remediation
Remediation
Add CSP via Cloudflare Transform Rules or origin server:

Basic policy:
Content-Security-Policy: default-src 'self'; script-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data:; font-src 'self'; frame-ancestors 'none'; base-uri 'self'; form-action 'self'

Start with Report-Only mode:
Content-Security-Policy-Report-Only: default-src 'self'; report-uri /csp-report
ISM-1488E8-ML2ISO-A.8.7OWASP-A05DISP-ICT
HST-004High4.8/10 High

Domain Listed on URIBL Blacklist

The domain houstons.tech is listed on black.uribl.com, a URI-based real-time blacklist used by spam filters. This can cause emails containing houstons.tech URLs to be flagged as spam or blocked by receiving servers, impacting email deliverability.

Likelihood
Impact
Evidence
Evidence
DNSBL Domain Checks:
✓ dbl.spamhaus.org — Not listed
✓ multi.surbl.org — Not listed
✗ black.uribl.com — LISTED

Note: IP DNSBL canary check returned 'blocked' — IP blacklist results unreliable from scan location.
Remediation
Remediation
1. Check listing status: https://admin.uribl.com/?section=lookup&domain=houstons.tech
2. If listed in error, submit removal request via URIBL admin panel
3. Review domain usage for any spam-associated content or links
4. Set up DNSBL monitoring (HetrixTools or UptimeRobot) to detect future listings
5. Ensure DMARC aggregate reports are reviewed for abuse patterns
ISM-1579CIS-9.2DISP-ICT
HST-005Medium3.6/10 Medium

MTA-STS Policy Not Enforced

An MTA-STS DNS record exists (v=STSv1; id=20260109v01) but the policy file at /.well-known/mta-sts.txt was not accessible or the mode is not set to 'enforce'. MTA-STS prevents TLS downgrade attacks on email delivery but requires both the DNS record and a valid policy file.

Likelihood
Impact
Evidence
Evidence
MTA-STS Record: v=STSv1; id=20260109v01;
MTA-STS Mode: null (policy file not accessible or mode not set)
TLS-RPT: v=TLSRPTv1; rua=mailto:[email protected] (configured)
Remediation
Remediation
Ensure the MTA-STS policy file is accessible:

1. Create/verify: https://mta-sts.houstons.tech/.well-known/mta-sts.txt
2. Policy file content:
   version: STSv1
   mode: enforce
   mx: mx1.forwardemail.net
   mx: mx2.forwardemail.net
   max_age: 604800
3. Host on a subdomain mta-sts.houstons.tech with valid HTTPS
4. Update DNS record ID when policy changes
ISM-1589E8-ML2ISO-A.5.14DISP-ICT
HST-006Medium3.2/10 Medium

DNSSEC Not Enabled

DNSSEC is not enabled for the domain. Without DNSSEC, DNS responses can be spoofed via cache poisoning attacks, allowing an attacker to redirect traffic to malicious servers.

Likelihood
Impact
Evidence
Evidence
DNSSEC: Disabled
Registrar: Unknown (.tech TLD)
Nameservers: eleanor.ns.cloudflare.com, watson.ns.cloudflare.com
Remediation
Remediation
Enable DNSSEC via Cloudflare:

1. Cloudflare Dashboard → DNS → Settings
2. Click 'Enable DNSSEC'
3. Copy the DS record provided by Cloudflare
4. Add the DS record at your domain registrar
5. Wait 24-48h for propagation

Cloudflare handles key management and signing automatically.
ISM-1706E8-ML2ISO-A.8.20CIS-12.1DISP-ICT
HST-007Medium2.4/10 Medium

CAA Records Not Configured

No Certificate Authority Authorization (CAA) records are present. CAA records specify which Certificate Authorities are authorized to issue certificates for the domain, preventing unauthorized certificate issuance.

Likelihood
Impact
Evidence
Evidence
CAA Records: None found
Current certificate issuer: Google Trust Services
CDN: Cloudflare (uses Google Trust Services for edge certificates)
Remediation
Remediation
Add CAA records in Cloudflare DNS:

1. Cloudflare Dashboard → DNS → Records
2. Add CAA records:
   houstons.tech CAA 0 issue "letsencrypt.org"
   houstons.tech CAA 0 issue "pki.goog"
   houstons.tech CAA 0 issuewild ";"
   houstons.tech CAA 0 iodef "mailto:[email protected]"

Note: Include pki.goog for Cloudflare's Google Trust Services certificates.
ISM-1707E8-ML1ISO-A.8.24CIS-3.10
HST-008Medium1.6/10 Low

Permissions-Policy Header Missing

The Permissions-Policy header is not set. This header controls which browser features (camera, microphone, geolocation, etc.) can be used by the page, reducing the attack surface from compromised scripts.

Likelihood
Impact
Evidence
Evidence
Permissions-Policy: NOT FOUND

Present headers: X-Frame-Options (SAMEORIGIN), X-Content-Type-Options (nosniff), Referrer-Policy (same-origin), X-XSS-Protection (1; mode=block)
Remediation
Remediation
Add via Cloudflare Transform Rules:

Permissions-Policy: camera=(), microphone=(), geolocation=(), payment=(), usb=(), magnetometer=(), gyroscope=(), accelerometer=()

This disables all sensitive browser APIs unless explicitly needed.
ISM-1559ISO-A.8.26OWASP-A05
HST-009Medium3.6/10 Medium

Cloudflare Origin SSL Error (HTTP 525)

The HTTP response returned status code 525 (SSL Handshake Failed), indicating a TLS handshake failure between Cloudflare and the origin server. While visitors see HTTPS via Cloudflare's edge certificate, the backend SSL is misconfigured. This could result in intermittent errors or Cloudflare serving error pages.

Likelihood
Impact
Evidence
Evidence
HTTP Status: 525 (SSL Handshake Failed)
Cloudflare Ray: 9d7d5ca9a813329e-BNE
Edge Certificate: TLS 1.3 via Google Trust Services
Server Timing: cfEdge;dur=92,cfOrigin;dur=0 (origin returned immediately with error)
Remediation
Remediation
Fix origin SSL configuration:

1. Cloudflare Dashboard → SSL/TLS → Overview
2. Set encryption mode to 'Full' (not 'Full (strict)') if origin has self-signed cert
3. Or install a Cloudflare Origin CA certificate on the origin server
4. Or set to 'Flexible' if origin doesn't support SSL (less secure)
5. Verify: curl -vk https://origin-ip --resolve houstons.tech:443:origin-ip
ISM-1552ISO-A.8.24DISP-ICT
HST-010Low0.8/10 Low

DANE/TLSA Records Not Configured

No DANE TLSA records were found. DANE (DNS-based Authentication of Named Entities) provides an additional layer of certificate validation for email transport when used with DNSSEC.

Likelihood
Impact
Evidence
Evidence
TLSA Records: None found
Note: DANE requires DNSSEC to be enabled first (currently disabled).
Remediation
Remediation
After enabling DNSSEC (HST-006):

1. Generate TLSA record for MX servers
2. Add: _25._tcp.mx1.forwardemail.net TLSA 3 1 1 <hash>
3. Note: Forward Email manages their own DANE; check if they publish TLSA records
4. DANE is informational — focus on DNSSEC first
ISM-1026ISO-A.8.24
HST-011Low0.4/10 Low

BIMI Record Not Configured

No BIMI (Brand Indicators for Message Identification) record exists. BIMI displays your brand logo next to authenticated emails in supporting clients (Gmail, Apple Mail). Requires DMARC reject policy (already in place) and a Verified Mark Certificate (VMC).

Likelihood
Impact
Evidence
Evidence
BIMI Record: Not found
_bimi.houstons.tech TXT → No answer
DMARC Policy: reject (prerequisite met)
Remediation
Remediation
1. Design a square SVG logo (Tiny 1.2 profile)
2. Obtain a VMC from DigiCert or Entrust (~$1,500/year)
3. Host the SVG and VMC at public HTTPS URLs
4. Add DNS record:
   _bimi.houstons.tech TXT "v=BIMI1; l=https://houstons.tech/bimi/logo.svg; a=https://houstons.tech/bimi/cert.pem"
5. Alternative: Some providers accept BIMI without VMC for testing
E8-ML2ISO-A.5.14
HST-012Low0.4/10 Low

security.txt Not Found

No security.txt file was found at /.well-known/security.txt. This RFC 9116 standard file provides security researchers with contact information for responsible disclosure of vulnerabilities.

Likelihood
Impact
Evidence
Evidence
/.well-known/security.txt: Not accessible
Note: HTTP 525 may prevent access to .well-known resources.
Remediation
Remediation
Create /.well-known/security.txt:

Contact: mailto:[email protected]
Expires: 2027-03-06T00:00:00.000Z
Preferred-Languages: en
Canonical: https://houstons.tech/.well-known/security.txt
Policy: https://houstons.tech/security-policy

Host via Cloudflare Workers or origin server.
ISO-A.5.14OWASP-A05
HST-013Info0.4/10 Low

XML Sitemap Not Configured

No sitemap.xml was found. While not a security finding, sitemaps help search engines index the site and can reveal the site structure. The robots.txt also indicates no sitemap directive.

Likelihood
Impact
Evidence
Evidence
Sitemap: Not accessible
Sitemap URL count: 0
Robots.txt: Cloudflare managed content signals present
AI crawler blocks: ClaudeBot, GPTBot, CCBot, Bytespider, Google-Extended, etc.
Remediation
Remediation
If the site has public pages, create a sitemap.xml and reference it in robots.txt:

Sitemap: https://houstons.tech/sitemap.xml
HST-014Info0.4/10 Low

HSTS Preload Not Enrolled

The domain is not on the HSTS preload list maintained by Chromium. HSTS preload protects against first-visit attacks by hardcoding HTTPS enforcement in the browser before any connection is made.

Likelihood
Impact
Evidence
Evidence
HSTS Preload: Not enrolled
Note: HSTS header must be present first (see HST-002).
Remediation
Remediation
After configuring HSTS (HST-002) with preload directive:

1. Verify all subdomains support HTTPS
2. Submit at https://hstspreload.org/
3. Requirements: max-age ≥ 31536000, includeSubDomains, preload directive
ISM-1373CIS-3.10
04 — Risk Assessment

Risk Matrix

Findings plotted by likelihood and impact

Risk Assessment Matrix — Likelihood vs Impact
Negligible
Minor
Moderate
Major
Severe
Almost Certain
Likely
Possible
Unlikely
Rare
05 — Compliance

Compliance & Framework Assessment

Alignment against 9 industry frameworks

IdControlStatusEvidence
ISM-0574SPF specificationpassv=spf1 include:spf.forwardemail.net -all
ISM-1151SPF hardfail verificationpassSPF qualifier: hardfail (-all)
ISM-0269DKIM recordsfail0 of 21 selectors found
ISM-1540DMARC configurationpassv=DMARC1; p=reject; pct=100
ISM-1799DMARC enforcementpassPolicy: reject
ISM-0569Email gateway routingpassMX: mx1/mx2.forwardemail.net
ISM-1589MTA-STS enforcementpartialDNS record exists, policy file not accessible
ISM-1590TLS-RPT reportingpassv=TLSRPTv1; rua=mailto:[email protected]
ISM-1026SMTP STARTTLSpassSTARTTLS supported on MX
ISM-1552HTTPS enforcementpassCloudflare edge HTTPS, but origin 525 error
ISM-1139TLS version compliancepassTLSv1.3
ISM-1369Perfect forward secrecypassPFS enabled
ISM-1372Strong cipher suitespassTLS_AES_256_GCM_SHA384
ISM-1448Certificate validitypass72 days remaining, expires May 17 2026
ISM-1553Certificate authority trustpassGoogle Trust Services
ISM-1485Security headerspartial4/9 present: X-Frame-Options, X-Content-Type-Options, Referrer-Policy, X-XSS-Protection
ISM-1486HSTS configurationfailHSTS header not present
ISM-1488Content Security PolicyfailCSP not configured
ISM-1489Clickjacking protectionpassX-Frame-Options: SAMEORIGIN
ISM-1706DNSSECfailDNSSEC disabled
ISM-1707CAA recordsfailNo CAA records found
ISM-1373HSTS preloadfailNot on preload list
ISM-1554TLS downgrade preventionpassTLS 1.0/1.1 not accepted
ISM-1579Domain reputationfailListed on black.uribl.com
ISM-1412Server info disclosurepassServer: cloudflare (generic, no version)
ISM-1557CORS policypassNo CORS headers (safe default)
ISM-1558Referrer policypasssame-origin
ISM-1559Permissions policyfailHeader not present
ControlStatusEvidence
Encrypt in transitpassTLS 1.3 with PFS
DNS filteringpartialCloudflare DNS, no DNSSEC
DMARC enforcementpassp=reject
DNS infrastructurepartialCloudflare, no DNSSEC/CAA

Overall CSF Score: 43% (13/30)

GOVERN2/5IDENTIFY3/5PROTECT3/5DETECT2/5RESPOND1/5RECOVER2/5
Govern
2/5
Identify
3/5
Protect
3/5
Detect
2/5
Respond
1/5
Recover
2/5
ControlStatusEvidence
Information transferpartialEmail: SPF+DMARC reject, missing DKIM
Malware protection (CSP)failCSP not configured
Network securitypassCloudflare WAF, TLS 1.3
Use of cryptographypassTLS 1.3, PFS, AES-256-GCM
Application securitypartial4/9 security headers, missing CSP/HSTS
06 — Email Authentication

Email Security Deep Dive

SPF, DKIM, DMARC, MTA-STS, TLS-RPT, DANE, and BIMI analysis

ProtocolStatusDetails
SPFMissingNo SPF record
DKIMNot Found
DMARCMissingNo DMARC record
MTA-STSMissingNo MTA-STS policy
TLS-RPTMissingNo TLS-RPT record
DANE/TLSANot FoundNo TLSA records
BIMINot FoundNo BIMI record
07 — DNS & Domain

DNS & Domain Infrastructure

Nameservers, records, and DNSSEC status

Record TypeValue
DNSSECNot Enabled
08 — DNS Quality

DNS Quality Metrics

Nameserver diversity, propagation, and configuration health

No DNS quality data available.

09 — Security Headers

HTTP Security Headers

Analysis of security-related HTTP response headers

HeaderStatusValue
Strict-Transport-SecurityMissing
Content-Security-PolicyMissing
X-Frame-OptionsMissing
X-Content-Type-OptionsMissing
Referrer-PolicyMissing
Permissions-PolicyMissing
X-XSS-ProtectionMissing
Cross-Origin-Opener-PolicyMissing
Cross-Origin-Resource-PolicyMissing
Cross-Origin-Embedder-PolicyMissing
Cache-ControlMissing
ServerMissing
10 — Web Security

Cookie, CORS & Web Security

Cookie flags, CORS policy, mixed content, and CSP analysis

CORS Policy

Access-Control-Allow-Origin: Not set

11 — Reputation

Blacklist & Email Reputation

DNSBL and domain reputation checks

No blacklist data available.

12 — Protection

MITM Attack Surface

Man-in-the-Middle resistance across web and email channels

39/100
MEDIUM RISK

Lower is better. Score based on detected vulnerabilities.

TLS Version Support

VersionSupportedStatus
TLSv1 No OK
TLSv1.1 No OK
TLSv1.2 Yes OK
TLSv1.3 Yes OK

HSTS Preload Status

CheckResult
PreloadedNo
Statusnot enrolled

HTTP → HTTPS Redirect Chain

Mixed Content

No mixed content detected

SMTP STARTTLS

CheckResult
ConnectedYes
STARTTLSSupported
Required (REQUIRETLS)Opportunistic
13 — SMTP

SMTP Analysis

Mail server banner, capabilities, and encryption

CheckResult
BannerN/A
EHLO CapabilitiesN/A
STARTTLSNot Supported
PTR RecordN/A
14 — OSINT

OSINT & Historical Intelligence

Certificate transparency, archived snapshots, and subdomain enumeration

Typosquatting & Similar Domains

Common misspellings and confusable domain variants that could be used for phishing or brand impersonation. These should be monitored or defensively registered.

72 variants generated: 12 tld variant, 2 homoglyph, 7 transposed, 31 adjacent key, 8 missing letter, 8 doubled letter, 4 hyphenation

houstons.com TLD variant WHOIS ↗
hоustons.tech Homoglyph WHOIS ↗
ohustons.tech Transposed WHOIS ↗
goustons.tech Adjacent key WHOIS ↗
oustons.tech Missing letter WHOIS ↗
hhoustons.tech Doubled letter WHOIS ↗
h-oustons.tech Hyphenation WHOIS ↗
houstons.net TLD variant WHOIS ↗
houstоns.tech Homoglyph WHOIS ↗
huostons.tech Transposed WHOIS ↗
joustons.tech Adjacent key WHOIS ↗
hustons.tech Missing letter WHOIS ↗
hooustons.tech Doubled letter WHOIS ↗
hou-stons.tech Hyphenation WHOIS ↗
houstons.org TLD variant WHOIS ↗
hosutons.tech Transposed WHOIS ↗
youstons.tech Adjacent key WHOIS ↗
hostons.tech Missing letter WHOIS ↗
houustons.tech Doubled letter WHOIS ↗
houst-ons.tech Hyphenation WHOIS ↗
houstons.io TLD variant WHOIS ↗
houtsons.tech Transposed WHOIS ↗
noustons.tech Adjacent key WHOIS ↗
houtons.tech Missing letter WHOIS ↗

Showing 24 of 72 variants (highest-threat first)

No OSINT data available (quick scan mode or data collection failed).

15 — Technology

Technology Stack

Detected platform, CDN, WAF, and server details

ComponentDetails
16 — Hosting

Hosting & Infrastructure

Hosting provider, server software, CMS detection, and certificate history

No hosting data available.

17 — WHOIS & Domain Intel

WHOIS & Domain Intelligence

Domain registration, expiry, and registrar details

No WHOIS data available.

18 — SEO & Visibility

SEO & Visibility

Meta tags, Open Graph, structured data, and sitemap analysis

No SEO data available.

19 — Monitoring

Proactive Monitoring Recommendations

Recommended monitoring and alerting setup

MonitorToolFrequency
DNSBL monitoringHetrixTools or UptimeRobotEvery 6 hours
SSL certificate expiryUptime Kuma or CertbotDaily
DMARC aggregate reportsForward Email built-in or dmarcianWeekly review
Security header regressionsecurityheaders.comMonthly
20 — Roadmap

Recommendations & Remediation Roadmap

Prioritized actions grouped by timeline

Immediate (0-48 hours)

FindingSeverityActionEffort
HST-001CriticalConfigure DKIM via Forward Email30 min
HST-004HighInvestigate and request URIBL delisting30 min

Short Term (1-2 weeks)

FindingSeverityActionEffort
HST-002HighEnable HSTS via Cloudflare15 min
HST-003HighAdd CSP header via Cloudflare Transform Rules1 hour
HST-005MediumConfigure MTA-STS policy file30 min
HST-006MediumEnable DNSSEC15 min
HST-007MediumAdd CAA records10 min

Medium Term (1-3 months)

FindingSeverityActionEffort
HST-008MediumAdd Permissions-Policy header15 min
HST-009MediumFix origin SSL configuration1-2 hours
HST-012LowCreate security.txt15 min
HST-014InfoSubmit for HSTS preload after HSTS is configured10 min
21 — Appendices

Appendices

Raw data, glossary, and disclaimers

A. Glossary

TermDefinition
SPFSender Policy Framework — restricts which servers can send email for a domain
DKIMDomainKeys Identified Mail — cryptographic email authentication
DMARCDomain-based Message Authentication, Reporting & Conformance
MTA-STSMail Transfer Agent Strict Transport Security — enforces TLS for email
TLS-RPTTLS Reporting — receive reports about email TLS failures
DANE/TLSADNS-based Authentication of Named Entities — binds certificates to DNS
DNSSECDomain Name System Security Extensions — cryptographic DNS validation
CAACertificate Authority Authorization — restricts which CAs can issue certificates
BIMIBrand Indicators for Message Identification — brand logo in email clients
HSTSHTTP Strict Transport Security — forces HTTPS connections
CSPContent Security Policy — controls which resources a page can load
DNSBLDNS-based Blackhole List — real-time email/IP reputation service

B. Disclaimer

This security assessment was performed using publicly available information only. No intrusive testing, penetration testing, or vulnerability exploitation was conducted.

Severity ratings use a qualitative likelihood x impact risk matrix aligned with ISO 27005. Risk scores are indicative and based on professional judgement.

This document is classified CONFIDENTIAL and is intended solely for the named recipient.

Assessment methodology references: NIST SP 800-177 Rev. 1, OWASP Secure Headers Project, PCI DSS v4.0, UK Cyber Essentials, ACSC Essential Eight, ISO 27005.