CONFIDENTIAL — MDS-SEC-2026-002 — meridiandefence.com.au
Independent Security Assessment

Domain & Email
Security Assessment

A comprehensive security audit of meridiandefence.com.au covering email authentication, DNS infrastructure, web security headers, compliance alignment, and threat intelligence.

Domain
meridiandefence.com.au
Assessment Date
6 March 2026
Document ID
MDS-SEC-2026-002
Scan Mode
Deep Scan
Classification
CONFIDENTIAL
01 — Overview

Executive Summary

High-level findings and risk assessment for meridiandefence.com.au

Meridian Defence Systems demonstrates a strong external security posture befitting a DISP-approved defence contractor. Email authentication is excellent with SPF hardfail, DKIM on three selectors, and DMARC reject policy — placing Meridian in the top tier of Australian defence industry organisations. Web security headers are comprehensive with a well-configured CSP, HSTS preload, and all critical headers present. The primary areas for improvement are the absence of DANE/TLSA records for SMTP transport encryption, no BIMI implementation for brand verification, and a mobile PageSpeed score that falls below optimal thresholds. With 16 findings identified (0 critical, 2 high, 5 medium, 5 low, 4 informational), the organisation's security posture aligns well with DISP membership requirements and Essential Eight ML2 aspirations.

16
Total Findings
2
Critical + High
TLS 1.3
TLS Version
Expires 2026-09-15
Custom
Platform
Critical
0
High
2
Medium
5
Low
5
Info
4
Secure Configuration Verified

The following areas demonstrate excellent security posture and meet or exceed industry best practices:
Email Security: A (92%)
Web Security: A (89%)
DNS & Infrastructure: A (90%)
MITM Resilience: A (91%)

Quick Wins

Submit meridiandefence.com.au to the HSTS preload list at hstspreload.org (5 minutes, after subdomain HTTPS audit)
Add BIMI DNS record with SVG logo for email brand verification (30 minutes)
Increase MTA-STS max_age from 7 days to 1 year (5 minutes)
Add missing CSP directives: object-src 'none'; media-src 'self'; worker-src 'self' (15 minutes via Cloudflare)
Add PGP encryption key to security.txt for encrypted vulnerability disclosures (30 minutes)

IDFindingSeverityStatus
MDS-001DANE/TLSA Records Not Configured for Email TransportHighOpen
MDS-002Mobile PageSpeed Performance Below ThresholdHighOpen
MDS-003BIMI Record Not ConfiguredMediumOpen
MDS-004CSP Contains 'unsafe-inline' for ScriptsMediumOpen
MDS-005Missing CSP Directives: object-src, media-src, worker-srcMediumOpen
MDS-006HSTS max-age Meets Minimum but Preload Not Yet ActiveMediumOpen
MDS-007Subdomain Exposure — 12 Subdomains DiscoveredMediumOpen
MDS-008MTA-STS Policy max_age Below Recommended ValueLowOpen
MDS-009security.txt Missing Encryption Key FieldLowOpen
MDS-010Cookie SameSite Attribute Set to 'Lax' Instead of 'Strict'LowOpen
MDS-011X-XSS-Protection Header Set to '0'LowOpen
MDS-012Certificate Transparency Shows Multiple IssuersLowOpen
MDS-013DNSSEC Enabled — Strong DNS IntegrityInfoOpen
MDS-014Email Authentication Fully Configured — SPF, DKIM, DMARC at Maximum EnforcementInfoOpen
MDS-015MTA-STS Enforce Mode Active with TLS-RPT ReportingInfoOpen
MDS-016Comprehensive Security Headers — 8 of 9 Headers PresentInfoOpen
02 — Scope & Methodology

Assessment Scope

What was tested, how, and what limitations apply

In Scope

  • ✓ DNS records & configuration
  • ✓ Email authentication (SPF, DKIM, DMARC, MTA-STS, TLS-RPT, DANE)
  • ✓ HTTP security headers
  • ✓ SSL/TLS configuration
  • ✓ DNSBL / blacklist checking
  • ✓ SMTP analysis
  • ✓ OSINT & historical intelligence
  • ✓ Compliance framework alignment

Out of Scope

  • ✗ Application security testing
  • ✗ Penetration testing
  • ✗ Source code review
  • ✗ Social engineering
  • ✗ Internal network assessment
Methodology Note

This assessment was performed using publicly available information only. No intrusive testing was conducted. Scan timestamp: 2026-03-06T09:15:22Z. Mode: Deep Scan.

03 — Findings

Detailed Findings

16 findings identified, sorted by severity.

MDS-001High4.8/10 High

DANE/TLSA Records Not Configured for Email Transport

No DANE/TLSA records found for MX endpoints. DANE (DNS-based Authentication of Named Entities) provides cryptographic assurance that SMTP connections use the correct TLS certificate, preventing man-in-the-middle attacks on email delivery. For a defence contractor handling sensitive communications, DANE adds a critical layer of transport security beyond opportunistic TLS.

Likelihood
Impact
Evidence
Evidence
MX: meridiandefence-com-au.mail.protection.outlook.com
TLSA lookup: _25._tcp.meridiandefence-com-au.mail.protection.outlook.com → No records

Note: Microsoft 365 does not natively support DANE for inbound mail. DANE for SMTP is supported for outbound connections only as of March 2024.
Remediation
Remediation
Netier Recommendation: While Microsoft 365 does not support inbound DANE, configure outbound DANE validation in Exchange Online via PowerShell:

Set-TransportConfig -DnsSec Enabled

For full DANE compliance, consider deploying a dedicated MTA gateway (e.g., Sophos Email Gateway) in front of Exchange Online that supports TLSA records. Netier can architect and deploy this as part of the Email Security Enhancement service.
MDS-002High3.6/10 Medium

Mobile PageSpeed Performance Below Threshold

Mobile Lighthouse performance score of 72/100 falls below the recommended 80+ threshold. Largest Contentful Paint (LCP) of 3.2s exceeds the 2.5s 'good' threshold, and Total Blocking Time (TBT) of 180ms indicates JavaScript execution issues on mobile devices. Poor mobile performance can impact user engagement and may indicate unoptimised assets being served to mobile clients.

Likelihood
Impact
Evidence
Evidence
Mobile Lighthouse Scores:
  Performance: 72 (threshold: 80+)
  LCP: 3.2s (threshold: ≤2.5s)
  TBT: 180ms (threshold: ≤200ms — marginal)
  CLS: 0.08 (threshold: ≤0.1 — passing)
  Speed Index: 3.5s (threshold: ≤3.4s — marginal)

Desktop Performance: 88 (passing)
Remediation
Remediation
Netier Recommendation: Engage Netier's Web Performance Optimisation service to:
1. Implement lazy loading for below-fold images and iframes
2. Defer non-critical JavaScript execution (reduce TBT)
3. Serve WebP/AVIF images via Cloudflare Polish (already on Cloudflare)
4. Enable Cloudflare Rocket Loader for JavaScript optimisation
5. Configure Cloudflare Image Resizing for responsive images

Estimated improvement: 72 → 85+ with Cloudflare optimisations alone.
OWASP A05-2021ISO A.8.26
MDS-003Medium2.4/10 Medium

BIMI Record Not Configured

No Brand Indicators for Message Identification (BIMI) record found. BIMI displays your organisation's verified logo in supporting email clients (Apple Mail, Gmail, Yahoo), increasing brand trust and helping recipients identify legitimate emails. For a defence contractor, BIMI provides visual authentication that complements technical email security controls.

Likelihood
Impact
Evidence
Evidence
DNS lookup: default._bimi.meridiandefence.com.au → No records

Prerequisites met:
  ✓ DMARC p=reject (required for BIMI)
  ✓ DKIM signing active (required for BIMI)
  ✗ VMC (Verified Mark Certificate) — required for Gmail/Apple Mail logo display
Remediation
Remediation
Netier Recommendation: Implement BIMI in two phases:

Phase 1 (Immediate, 30 min):
  Add DNS TXT record: default._bimi.meridiandefence.com.au
  Value: v=BIMI1; l=https://meridiandefence.com.au/.well-known/logo.svg
  Host the SVG logo in Tiny PS format at the specified URL.

Phase 2 (2-4 weeks):
  Obtain a Verified Mark Certificate (VMC) from DigiCert or Entrust.
  Cost: ~$1,500 AUD/year. Requires a registered trademark.
  Update BIMI record: v=BIMI1; l=<svg-url>; a=<vmc-url>

Netier can manage the VMC procurement and DNS configuration as part of the Email Security service.
MDS-004Medium3.6/10 Medium

CSP Contains 'unsafe-inline' for Scripts

The Content Security Policy allows 'unsafe-inline' in the script-src directive. While the CSP is otherwise well-configured with explicit source restrictions, 'unsafe-inline' weakens protection against Cross-Site Scripting (XSS) attacks by permitting inline JavaScript execution.

Likelihood
Impact
Evidence
Evidence
Content-Security-Policy: default-src 'self'; script-src 'self' 'unsafe-inline' https://cdn.meridiandefence.com.au; ...

Present directives: default-src, script-src, style-src, img-src, font-src, frame-ancestors, base-uri, form-action, upgrade-insecure-requests
Missing: object-src, media-src, worker-src
Remediation
Remediation
Netier Recommendation: Replace 'unsafe-inline' with CSP nonces or hashes:

1. Generate a random nonce per request in the application server
2. Add nonce to CSP header: script-src 'self' 'nonce-{random}' https://cdn.meridiandefence.com.au
3. Add nonce attribute to all inline <script> tags: <script nonce="{random}">
4. Add missing directives: object-src 'none'; media-src 'self'; worker-src 'self'

Netier's Web Application Security team can implement this during the next scheduled maintenance window.
MDS-005Medium2.4/10 Medium

Missing CSP Directives: object-src, media-src, worker-src

The Content Security Policy is missing explicit directives for object-src, media-src, and worker-src. While default-src 'self' provides a fallback, explicitly defining these directives ensures defence-in-depth and prevents unintended resource loading from the default source.

Likelihood
Impact
Evidence
Evidence
Current CSP directives (9): default-src, script-src, style-src, img-src, font-src, frame-ancestors, base-uri, form-action, upgrade-insecure-requests

Missing (3): object-src, media-src, worker-src

Recommended additions:
  object-src 'none' — blocks Flash/Java plugins
  media-src 'self' — restricts audio/video sources
  worker-src 'self' — restricts service worker origins
Remediation
Remediation
Netier Recommendation: Add the missing directives to the Cloudflare Transform Rule or application header configuration:

object-src 'none'; media-src 'self'; worker-src 'self'

This is a low-risk, high-value change that can be deployed via Cloudflare dashboard without application changes. Netier can implement this within a standard change window (15 minutes).
MDS-006Medium2.4/10 Medium

HSTS max-age Meets Minimum but Preload Not Yet Active

HSTS is configured with max-age=31536000 (1 year), includeSubDomains, and preload directive. However, the domain is not yet on the Chromium HSTS preload list, meaning first-time visitors are still vulnerable to SSL stripping attacks until the browser caches the HSTS policy.

Likelihood
Impact
Evidence
Evidence
strict-transport-security: max-age=31536000; includeSubDomains; preload

HSTS Preload Status: Not on preload list
Preload requirements met:
  ✓ max-age ≥ 31536000
  ✓ includeSubDomains present
  ✓ preload directive present
  ✗ Submitted to hstspreload.org
Remediation
Remediation
Netier Recommendation: Submit meridiandefence.com.au to the HSTS preload list:

1. Visit https://hstspreload.org
2. Enter meridiandefence.com.au
3. Confirm all subdomains support HTTPS (verify: autodiscover, mail, portal, vpn, intranet, dev, staging)
4. Submit for inclusion

Processing time: 2-4 weeks for list inclusion, then distributed via browser updates.

⚠️ WARNING: Preload is permanent. Ensure ALL subdomains serve valid HTTPS before submitting. Netier should audit all 12 known subdomains first.
MDS-007Medium3.2/10 Medium

Subdomain Exposure — 12 Subdomains Discovered

Certificate Transparency logs and DNS enumeration revealed 12 subdomains. While most appear to be standard Microsoft 365 auto-configuration records, subdomains like 'dev', 'staging', 'intranet', and 'vpn' may expose internal infrastructure or development environments if not properly secured.

Likelihood
Impact
Evidence
Evidence
Discovered subdomains (12):
  www, mail, autodiscover, sip, lyncdiscover,
  enterpriseregistration, enterpriseenrollment,
  portal, vpn, intranet, dev, staging

High-interest subdomains:
  dev.meridiandefence.com.au — Development environment
  staging.meridiandefence.com.au — Staging environment
  intranet.meridiandefence.com.au — Internal portal
  vpn.meridiandefence.com.au — VPN gateway
Remediation
Remediation
Netier Recommendation:
1. Verify dev/staging are behind Cloudflare Access (Zero Trust) — restrict to Netier and Meridian IP ranges
2. Ensure intranet is not publicly accessible — should resolve to internal IP only or be behind Zero Trust
3. Review VPN endpoint hardening (certificate-based auth, MFA)
4. Consider removing dev/staging from public DNS if they're internal-only (use split-horizon DNS)

Netier can configure Cloudflare Access policies for all sensitive subdomains as part of the Zero Trust deployment.
MDS-008Low1.2/10 Low

MTA-STS Policy max_age Below Recommended Value

The MTA-STS policy file specifies max_age=604800 (7 days), which is below the recommended minimum of 2592000 (30 days). A shorter max_age means sending MTAs cache the policy for less time, increasing the window during which a downgrade attack could succeed if the policy becomes unavailable.

Likelihood
Impact
Evidence
Evidence
MTA-STS Policy:
  version: STSv1
  mode: enforce
  mx: meridiandefence-com-au.mail.protection.outlook.com
  max_age: 604800 (7 days)

Recommended: max_age ≥ 2592000 (30 days)
Best practice: max_age = 31557600 (1 year)
Remediation
Remediation
Netier Recommendation: Update the MTA-STS policy file at https://mta-sts.meridiandefence.com.au/.well-known/mta-sts.txt:

version: STSv1
mode: enforce
mx: meridiandefence-com-au.mail.protection.outlook.com
max_age: 31557600

Update the DNS TXT record _mta-sts.meridiandefence.com.au with a new id value to trigger cache refresh.

This is a 5-minute change with no risk.
MDS-009Low0.8/10 Low

security.txt Missing Encryption Key Field

The security.txt file is present and well-structured but is missing the optional 'Encryption' field. For a defence contractor, providing a PGP/GPG public key allows security researchers to encrypt vulnerability disclosures, protecting sensitive findings during responsible disclosure.

Likelihood
Impact
Evidence
Evidence
security.txt contents:
  Contact: security@meridiandefence.com.au
  Expires: 2027-03-06T00:00:00.000Z
  Preferred-Languages: en
  Canonical: https://meridiandefence.com.au/.well-known/security.txt
  Policy: https://meridiandefence.com.au/security-policy

Missing: Encryption field (PGP key URL)
Remediation
Remediation
Netier Recommendation: Generate a dedicated GPG key for security disclosures and add to security.txt:

1. gpg --full-generate-key (RSA 4096, security@meridiandefence.com.au)
2. Export public key: gpg --armor --export security@meridiandefence.com.au > security-pgp.asc
3. Host at: https://meridiandefence.com.au/.well-known/security-pgp.asc
4. Add to security.txt: Encryption: https://meridiandefence.com.au/.well-known/security-pgp.asc

Estimated effort: 30 minutes.
ISO A.5.14PSPF GOVSEC-3
MDS-010Low1.6/10 Low

Cookie SameSite Attribute Set to 'Lax' Instead of 'Strict'

Session cookies use SameSite=Lax, which allows cookies to be sent on top-level GET navigations from external sites. While Lax is adequate for most applications, SameSite=Strict provides stronger CSRF protection by preventing cookies from being sent on any cross-site request.

Likelihood
Impact
Evidence
Evidence
Cookie: meridian_session
  Secure: true ✓
  HttpOnly: true ✓
  SameSite: Lax (recommended: Strict for defence applications)
  Path: /
  Domain: meridiandefence.com.au
Remediation
Remediation
Netier Recommendation: Update the session cookie configuration to use SameSite=Strict. Test thoroughly as Strict may break OAuth/SSO redirect flows.

If SSO redirects break with Strict, consider a dual-cookie pattern:
  - Session cookie: SameSite=Strict (primary authentication)
  - SSO redirect cookie: SameSite=Lax (temporary, short-lived)

Netier can implement and test this during the next application maintenance window.
MDS-011Low0.4/10 Low

X-XSS-Protection Header Set to '0'

The X-XSS-Protection header is explicitly set to '0', disabling the browser's built-in XSS filter. While this is actually the current best practice (the XSS auditor in Chrome was removed in 2019 due to bypass vulnerabilities, and a strong CSP supersedes it), some compliance frameworks still check for this header.

Likelihood
Impact
Evidence
Evidence
x-xss-protection: 0

Note: Setting to '0' is correct per modern security guidance:
  - Chrome removed XSS Auditor in v78 (Oct 2019)
  - Mozilla never implemented it in Firefox
  - The auditor could be weaponised for information leakage
  - CSP provides superior XSS protection

However, some automated scanning tools flag '0' as a finding.
Remediation
Remediation
No action required. The current setting of '0' is correct and follows OWASP and Mozilla security guidance. The Content-Security-Policy header provides comprehensive XSS protection.

Note for compliance: If an auditor or scanner flags this, reference:
  - OWASP: 'The X-XSS-Protection header has been deprecated and should be set to 0'
  - MDN: 'Non-standard; Chrome removed the XSS Auditor in Chrome 78'
MDS-012Low0.8/10 Low

Certificate Transparency Shows Multiple Issuers

Certificate Transparency logs show certificates issued by both Let's Encrypt and DigiCert for this domain. While not inherently problematic, multiple certificate issuers can indicate inconsistent certificate management practices or certificates issued for different services (web vs. mail).

Likelihood
Impact
Evidence
Evidence
CT Log Analysis:
  Total certificates logged: 47
  Certificate Issuers:
    - Let's Encrypt (web, wildcard — automated via Cloudflare)
    - DigiCert Inc (mail.meridiandefence.com.au — Exchange Online)

  Recent certificates:
    *.meridiandefence.com.au — Let's Encrypt (Jan 2026)
    meridiandefence.com.au — Let's Encrypt (Jan 2026)
    mail.meridiandefence.com.au — DigiCert (Nov 2025)
Remediation
Remediation
No immediate action required. The dual-issuer pattern is expected:
  - Let's Encrypt: Cloudflare edge certificates (auto-renewed)
  - DigiCert: Microsoft 365 mail certificates (managed by Microsoft)

Netier Recommendation: Ensure CAA records restrict issuance to only these two CAs (already configured ✓). Monitor CT logs via https://crt.sh/?q=meridiandefence.com.au for unexpected issuances.
MDS-013Info0.0/10 Low

DNSSEC Enabled — Strong DNS Integrity

DNSSEC is enabled for meridiandefence.com.au, providing cryptographic verification of DNS responses. This prevents DNS cache poisoning and ensures clients receive authentic DNS data. DNSSEC is a requirement for DISP members handling Defence information.

Evidence
Evidence
DNSSEC: Enabled ✓
DS records present in parent zone (.com.au)
Cloudflare manages DNSSEC signing automatically

Note: .com.au is a DNSSEC-signed TLD (auDA requirement since 2021)
Remediation
Remediation
No action required. DNSSEC is correctly configured and maintained by Cloudflare.
MDS-014Info0.0/10 Low

Email Authentication Fully Configured — SPF, DKIM, DMARC at Maximum Enforcement

All three core email authentication protocols are configured at their strictest enforcement levels: SPF with hardfail (-all), DKIM with three active selectors, and DMARC with reject policy at 100% coverage. This represents best-practice email security and meets ISM, PSPF, and E8 requirements.

Evidence
Evidence
SPF: v=spf1 include:spf.protection.outlook.com include:_spf.sophos.com ip4:203.45.67.0/24 -all
  Qualifier: hardfail (-all) ✓
  Lookup count: 4/10 ✓

DKIM: 3 selectors found (selector1, selector2, sophos) ✓
  selector1: RSA 2048-bit (Microsoft 365)
  selector2: RSA 2048-bit (Microsoft 365)
  sophos: RSA 2048-bit (Sophos Email Gateway)

DMARC: v=DMARC1; p=reject; rua=mailto:...; ruf=mailto:...; fo=1; adkim=s; aspf=s; pct=100
  Policy: reject ✓
  Alignment: strict (adkim=s, aspf=s) ✓
  Reporting: aggregate + forensic ✓
  Coverage: 100% ✓
Remediation
Remediation
No action required. Email authentication is at maximum enforcement. Continue monitoring DMARC reports for authentication failures.

Netier manages DMARC reporting via the Managed Email Security service, with monthly aggregate analysis and incident response for authentication failures.
MDS-015Info0.0/10 Low

MTA-STS Enforce Mode Active with TLS-RPT Reporting

MTA-STS is configured in enforce mode, requiring sending mail servers to use TLS when delivering to Meridian's mail servers. TLS-RPT is also configured, providing visibility into TLS negotiation failures. This combination ensures encrypted email transport with monitoring.

Evidence
Evidence
MTA-STS DNS Record: v=STSv1; id=20260215T000000 ✓
MTA-STS Mode: enforce ✓
MTA-STS Policy File: accessible ✓
TLS-RPT: v=TLSRPTv1; rua=mailto:tls-rpt@meridiandefence.com.au ✓

MTA-STS enforces that sending servers must:
  1. Connect via TLS (not plaintext)
  2. Verify the MX certificate matches the policy
  3. Report failures to the TLS-RPT address
Remediation
Remediation
No action required. MTA-STS and TLS-RPT are correctly configured.

Note: Consider increasing max_age from 604800 (7 days) to 31557600 (1 year) — see finding MDS-008.
MDS-016Info0.0/10 Low

Comprehensive Security Headers — 8 of 9 Headers Present

The web application implements 8 of 9 recommended security headers, achieving an A grade (89%). All critical headers are present including HSTS with preload directive, CSP with explicit source restrictions, and modern clickjacking protection.

Evidence
Evidence
Security Headers Present (8/9):
  ✓ Strict-Transport-Security (max-age=31536000; includeSubDomains; preload)
  ✓ Content-Security-Policy (comprehensive policy with 9 directives)
  ✓ X-Frame-Options (DENY)
  ✓ X-Content-Type-Options (nosniff)
  ✓ Referrer-Policy (strict-origin-when-cross-origin)
  ✓ Permissions-Policy (camera, microphone, geolocation, payment restricted)
  ✓ X-XSS-Protection (0 — correct modern setting)
  ✓ Cache-Control (present via Cloudflare)

  ✗ Cross-Origin-Embedder-Policy (not set)

Header Score: 89% (A)
Remediation
Remediation
Optional enhancement: Add Cross-Origin-Embedder-Policy header for cross-origin isolation:

Cross-Origin-Embedder-Policy: require-corp
Cross-Origin-Opener-Policy: same-origin

⚠️ Test thoroughly — COEP can break third-party resources (images, scripts, iframes) that don't set CORS headers. Only enable if the site doesn't embed external resources.
04 — Risk Assessment

Risk Matrix

Findings plotted by likelihood and impact

Risk Assessment Matrix — Likelihood vs Impact
Negligible
Minor
Moderate
Major
Severe
Almost Certain
Likely
Possible
Unlikely
Rare
05 — Compliance

Compliance & Framework Assessment

Alignment against 10 industry frameworks

4 of 8 controls assessed externally 4 require internal audit
IdControlStatusEvidence
ISM-0574SPF specificationpassSPF record with hardfail (-all), 4 lookups
ISM-1151SPF verificationpassSPF hardfail qualifier
ISM-0269DKIM recordspass3 DKIM selectors active (selector1, selector2, sophos)
ISM-1540DMARC configurationpassDMARC with p=reject, adkim=s, aspf=s
ISM-1799DMARC enforcementpassDMARC p=reject at 100% coverage
ISM-0569Email gateway routingpassMX points to Exchange Online Protection
ISM-1589MTA-STS enforcementpassMTA-STS mode=enforce
ISM-1590TLS-RPT reportingpassTLS-RPT configured with rua= address
ISM-1026SMTP STARTTLSpassSTARTTLS supported on MX
ISM-1552HTTPS enforcementpassHTTP→HTTPS redirect, HSTS with preload directive
ISM-1139TLS version compliancepassTLS 1.2 and 1.3 only, TLS 1.0/1.1 disabled
ISM-1369Perfect forward secrecypassECDH-P256 key exchange, TLS 1.3 (inherent PFS)
ISM-1372Strong cipher suitespassAES-256 cipher
ISM-1448Certificate validitypassCertificate valid, expires 2026-09-15 (193 days)
ISM-1553Certificate authority trustpassIssued by Let's Encrypt (trusted CA)
ISM-1563Certificate key strengthpassECDH-P256 key exchange
ISM-1485Security headerspassHSTS + X-Content-Type-Options + X-Frame-Options + CSP
ISM-1486HSTS configurationpassmax-age=31536000, includeSubDomains, preload
ISM-1488Content Security PolicypartialCSP present with 9 directives but contains unsafe-inline
ISM-1489Clickjacking protectionpassX-Frame-Options: DENY + CSP frame-ancestors 'none'
ISM-0659Content filteringpassCAA records + CSP configured
ISM-1157Gateway securitypassCloudflare WAF active
ISM-1490Cookie securitypassSecure + HttpOnly + SameSite=Lax
ISM-1706DNSSECpassDNSSEC enabled, DS records in parent zone
ISM-1707CAA recordspassCAA restricts to letsencrypt.org and digicert.com
ISM-1710Nameserver diversitypass2 nameservers across different subnets (Cloudflare)
ISM-0580Zone transfer protectionpassCloudflare manages DNS (AXFR not applicable)
ISM-1373HSTS preload enrolmentpartialPreload directive set but not yet on preload list
ISM-1554TLS downgrade preventionpassTLS 1.0/1.1 disabled
ISM-1374Certificate transparencypassCertificates logged in CT, 47 entries
ISM-1579Domain reputationpassNot listed on any DNSBL or RHSBL (0/9)
ISM-1580Subdomain managementpartial12 subdomains discovered, dev/staging may need access restriction
ISM-1412Server info disclosurepassServer: cloudflare (generic, no version)
ISM-1416Directory listingpassNo directory listing detected
ISM-0994HTTP method restrictionpassStandard methods only (GET, POST, HEAD)
ISM-1557CORS policypassNo wildcard origin, credentials not allowed
ISM-1558Referrer policypassstrict-origin-when-cross-origin
ISM-1559Permissions policypasscamera, microphone, geolocation, payment restricted
ControlStatusEvidence
INFOSEC-3: Email authenticationpassSPF ✓, DKIM ✓, DMARC p=reject ✓
INFOSEC-4: Web securitypassHSTS ✓, CSP ✓, all security headers present
INFOSEC-5: DMARC enforcementpassDMARC p=reject at 100% coverage
INFOSEC-6: DNSSEC and CAApassDNSSEC enabled ✓, CAA records configured ✓
INFOSEC-7: TLS standardspassTLS 1.3, HSTS preload directive, PFS enabled
INFOSEC-8: Certificate managementpassAutomated renewal via Cloudflare, valid cert
INFOSEC-9: Content securitypartialCSP present but contains unsafe-inline
INFOSEC-10: E8 alignmentpassML2 on 4/4 externally assessable controls
INFOSEC-11: Email encryptionpartialMTA-STS enforce ✓, TLS-RPT ✓, but DANE not configured
GOVSEC-3: Information disclosurepassNo server version, no directory listing, generic server header
ControlStatusEvidence
Encrypt sensitive data in transitpassTLS 1.3, HSTS, MTA-STS
DNS filteringpassCloudflare DNS with DNSSEC
DMARC enforcementpassDMARC p=reject
Content blockingpassCSP with explicit restrictions
DNS infrastructurepassDNSSEC, CAA, diverse NS
Encrypt web trafficpassTLS 1.3, HSTS preload

Overall CSF Score: 67% (20/30)

GOVERN4/5IDENTIFY4/5PROTECT4/5DETECT3/5RESPOND3/5RECOVER2/5
Govern
4/5
Identify
4/5
Protect
4/5
Detect
3/5
Respond
3/5
Recover
2/5
ControlStatusEvidence
Secure configurationspassSecurity headers, HSTS, CSP
Strong cryptographypassTLS 1.3, AES-256, PFS
Web application attackspassCloudflare WAF, CSP, X-Frame-Options
Public-facing appspassWAF active, security headers configured
Coding vulnerabilitiespartialCSP contains unsafe-inline
ControlStatusEvidence
FirewallspassCloudflare WAF active
Secure Configurationpass8/9 security headers, HSTS, CSP
Access ControlpassCORS restricted, Permissions-Policy set
Malware ProtectionpassCSP blocks unauthorized scripts
Patch ManagementpassTLS 1.3, current certificates
ControlStatusEvidence
Broken Access ControlpassCORS restricted, X-Frame-Options DENY
Cryptographic FailurespassTLS 1.3, PFS, HSTS preload
InjectionpartialCSP present but unsafe-inline weakens XSS protection
Security Misconfigurationpass8/9 headers, DNSSEC, CAA, no info disclosure
Vulnerable ComponentspassNo outdated server software detected
Logging and MonitoringpassDMARC reporting, TLS-RPT, Cloudflare analytics
ControlStatusEvidence
Information transferpassTLS 1.3, MTA-STS enforce, STARTTLS
Cloud servicespassCloudflare (WAF, CDN, DNS), M365 (email)
Legal requirementspassAustralian hosting, security.txt present
CompliancepassE8 ML2, ISM aligned, PSPF compliant
Endpoint devices (HSTS)passHSTS with 1-year max-age + preload
Malware protection (CSP)partialCSP present but contains unsafe-inline
Configuration managementpassSecurity headers configured, DNSSEC enabled
Network securitypassCloudflare WAF, TLS 1.2+, HSTS
Network servicespassDNS quality: consistent propagation, diversity
Use of cryptographypassTLS 1.3, AES-256, ECDH-P256, PFS
Secure developmentpassCSP, cookie security, CORS configured
Application securitypartialStrong headers but mobile performance issues
Defence Industry Security Program
DISP membership compliance assessment
82%
9 pass · 2 partial · 2 N/A

Governance

IdControlStatusEvidence
DISP-GOV-01Security governancepasssecurity.txt present, DMARC forensic reporting configured
DISP-GOV-02Defence industry obligationspassAustralian-hosted (Cloudflare Sydney), .com.au domain with auDA governance

Personnel Security

IdControlStatusEvidence
DISP-PERS-01Personnel securityN/ARequires internal assessment — clearance status not externally verifiable

Physical Security

IdControlStatusEvidence
DISP-PHYS-01Physical securityN/ARequires internal assessment — physical controls not externally verifiable

ICT Security

IdControlStatusEvidence
DISP-ICT-01ICT security — encryptionpassTLS 1.3, AES-256, PFS, MTA-STS enforce
DISP-ICT-02ICT security — emailpassSPF -all, DKIM 3 selectors, DMARC reject, MTA-STS enforce
DISP-ICT-03ICT security — webpass8/9 security headers, CSP, HSTS preload, WAF
DISP-ICT-04ICT security — DNSpassDNSSEC enabled, CAA configured, diverse nameservers
DISP-ICT-05ICT security — patchingpassTLS 1.3, current certificates, no known CVEs
DISP-ICT-06ICT security — access controlpartialCORS restricted, but dev/staging subdomains may need Zero Trust
DISP-ICT-07ICT security — monitoringpassDMARC aggregate+forensic, TLS-RPT, CT monitoring, Cloudflare analytics

ISM Alignment

IdControlStatusEvidence
DISP-ISM-01ISM alignmentpass35/38 ISM controls pass, 3 partial (CSP unsafe-inline, HSTS preload, subdomain mgmt)

Essential Eight

IdControlStatusEvidence
DISP-E8-01Essential Eight ML2partialML2 on 4/4 externally assessable, 4/4 require internal assessment
06 — Email Authentication

Email Security Deep Dive

SPF, DKIM, DMARC, MTA-STS, TLS-RPT, DANE, and BIMI analysis

ProtocolStatusDetails
SPFFoundv=spf1 include:spf.protection.outlook.com include:_spf.sophos.com ip4:203.45.67.0/24 -all
Qualifier: -all
DKIMFoundChecked 20 selectors
Found: selector1, selector2, sophos
DMARCFoundv=DMARC1; p=reject; rua=mailto:dmarc-rua@meridiandefence.com.au; ruf=mailto:dmarc-ruf@meridiandefence.com.au; fo=1; adkim=s; aspf=s; pct=100
Policy: reject
MTA-STSenforcev=STSv1; id=20260215T000000
TLS-RPTConfiguredv=TLSRPTv1; rua=mailto:tls-rpt@meridiandefence.com.au
DANE/TLSANot FoundNo TLSA records
BIMINot FoundNo BIMI record

Advanced Email Protocols

MTA-STS Configured
Mode: enforce
Enforces TLS for inbound email delivery, preventing downgrade attacks.
TLS-RPT Configured
TLS reporting enabled — receives notifications when email TLS negotiation fails.
DANE/TLSA Not Configured
No TLSA records found. DANE provides additional email transport security beyond MTA-STS.
BIMI Not Configured
No BIMI record. Adding a verified brand logo increases email trust and recipient engagement.

SPF Mechanism Analysis

4
Total Mechanisms
2/10
DNS Lookups
OK
2
Includes
-all
Qualifier
Hardfail (strict)
include:spf.protection.outlook.cominclude:_spf.sophos.comip4:203.45.67.0/24-all
Email Security: A (92%) — This section meets or exceeds industry best practices.
07 — DNS & Domain

DNS & Domain Infrastructure

Nameservers, records, and DNSSEC status

Record TypeValue
CAA{"flags":0,"tag":"issue","value":"letsencrypt.org"}
{"flags":0,"tag":"issue","value":"digicert.com"}
{"flags":0,"tag":"issuewild","value":"letsencrypt.org"}
{"flags":0,"tag":"iodef","value":"mailto:security@meridiandefence.com.au"}
DNSSECNot Enabled

Infrastructure Geolocation

IPLocationISP / Org
104.18.32.47Sydney, AustraliaCloudflare, Inc.
104.18.33.47Sydney, AustraliaCloudflare, Inc.
DNS & Infrastructure: A (90%) — This section meets or exceeds industry best practices.
08 — DNS Quality

DNS Quality Metrics

Nameserver diversity, propagation, and configuration health

2
Nameservers
true
NS Providers
3650d
SOA Serial Age
No
Wildcard DNS

DNS Propagation Check

Consistent

DNS resolution is consistent across global resolvers.

ResolverResults
N/A
N/A
N/A

TTL Values

Record TypeTTL (seconds)
A300
MX300
NS86400
09 — Security Headers

HTTP Security Headers

Analysis of security-related HTTP response headers

A
8/9 security headers present (89%)
HeaderStatusValue
Strict-Transport-SecurityPresentmax-age=31536000; includeSubDomains; preload
Content-Security-PolicyPresentdefault-src 'self'; script-src 'self' 'unsafe-inline' https://cdn.meridiandefence.com.au; style-src 'self' 'unsafe-inline'; img-src 'self' data: https:; font-src 'self' https://fonts.gstatic.com; frame-ancestors 'none'; base-uri 'self'; form-action 'self'; upgrade-insecure-requests
X-Frame-OptionsPresentDENY
X-Content-Type-OptionsPresentnosniff
Referrer-PolicyPresentstrict-origin-when-cross-origin
Permissions-PolicyPresentcamera=(), microphone=(), geolocation=(), payment=()
X-XSS-ProtectionPresent0
Cross-Origin-Opener-PolicyMissing
Cross-Origin-Resource-PolicyMissing
Cross-Origin-Embedder-PolicyMissing
Cache-ControlMissing
ServerPresentcloudflare
Web Security: A (89%) — This section meets or exceeds industry best practices.
10 — Web Security

Cookie, CORS & Web Security

Cookie flags, CORS policy, mixed content, and CSP analysis

Cookies

CookieSecureHttpOnlySameSite
__cf_bmYesYesNone
_cf_clearanceYesYesNone
ASP.NET_SessionIdYesYesStrict
__RequestVerificationTokenYesYesStrict

CORS Policy

Access-Control-Allow-Origin: Not set

CSP Analysis

Content-Security-Policy
{
  "directives": [
    {
      "name": "default-src",
      "value": "'self'",
      "score": "good"
    },
    {
      "name": "script-src",
      "value": "'self' 'unsafe-inline' https://cdn.meridiandefence.com.au",
      "score": "warning",
      "note": "'unsafe-inline' weakens script-src"
    },
    {
      "name": "style-src",
      "value": "'self' 'unsafe-inline'",
      "score": "warning",
      "note": "'unsafe-inline' weakens style-src"
    },
    {
      "name": "img-src",
      "value": "'self' data: https:",
      "score": "good"
    },
    {
      "name": "font-src",
      "value": "'self' https://fonts.gstatic.com",
      "score": "good"
    },
    {
      "name": "frame-ancestors",
      "value": "'none'",
      "score": "good"
    },
    {
      "name": "base-uri",
      "value": "'self'",
      "score": "good"
    },
    {
      "name": "form-action",
      "value": "'self'",
      "score": "good"
    },
    {
      "name": "upgrade-insecure-requests",
      "value": "",
      "score": "good"
    }
  ],
  "raw": "default-src 'self'; script-src 'self' 'unsafe-inline' https://cdn.meridiandefence.com.au; style-src 'self' 'unsafe-inline'; img-src 'self' data: https:; font-src 'self' https://fonts.gstatic.com; frame-ancestors 'none'; base-uri 'self'; form-action 'self'; upgrade-insecure-requests",
  "missingDirectives": [
    {
      "name": "object-src",
      "severity": "medium",
      "recommendation": "Add object-src 'none' to prevent Flash/plugin execution"
    },
    {
      "name": "worker-src",
      "severity": "low",
      "recommendation": "Add worker-src 'self' to control web worker origins"
    },
    {
      "name": "connect-src",
      "severity": "low",
      "recommendation": "Add connect-src to restrict XHR/fetch/WebSocket origins"
    }
  ]
}
11 — Reputation

Blacklist & Email Reputation

DNSBL and domain reputation checks

IP Blacklist Checks

DNSBLStatus
Spamhaus ZENClean
BarracudaClean
SpamCopClean
Spamhaus ZENClean
BarracudaClean
SpamCopClean

Domain Blacklist Checks

DNSBLStatus
Spamhaus DBLClean
SURBLClean
URIBLClean
Google Safe BrowsingClean
PhishTankClean
OpenPhishClean
URLhausClean
12 — Protection

MITM Attack Surface

Man-in-the-Middle resistance across web and email channels

88/100
LOW RISK

Lower is better. Score based on detected vulnerabilities.

TLS Version Support

VersionSupportedStatus
TLSv1 No OK
TLSv1.1 No OK
TLSv1.2 Yes OK
TLSv1.3 Yes OK

HSTS Preload Status

CheckResult
PreloadedNo
Statuseligible

HTTP → HTTPS Redirect Chain

Mixed Content

No mixed content detected

SMTP STARTTLS

CheckResult
ConnectedYes
STARTTLSSupported
Required (REQUIRETLS)Yes
MITM Resilience: A (91%) — This section meets or exceeds industry best practices.
13 — SMTP

SMTP Analysis

Mail server banner, capabilities, and encryption

CheckResult
Banner220 meridiandefence-com-au.mail.protection.outlook.com Microsoft ESMTP MAIL Service ready
EHLO CapabilitiesN/A
STARTTLSSupported
PTR Record[object Object]
14 — OSINT

OSINT & Historical Intelligence

Certificate transparency, archived snapshots, and subdomain enumeration

Typosquatting & Similar Domains

Common misspellings and confusable domain variants that could be used for phishing or brand impersonation. These should be monitored or defensively registered.

126 variants generated: 12 tld variant, 8 homoglyph, 14 transposed, 52 adjacent key, 15 missing letter, 15 doubled letter, 10 hyphenation

meridiandefence.com TLD variant WHOIS ↗
mеridiandefence.com.au Homoglyph WHOIS ↗
emridiandefence.com.au Transposed WHOIS ↗
neridiandefence.com.au Adjacent key WHOIS ↗
eridiandefence.com.au Missing letter WHOIS ↗
mmeridiandefence.com.au Doubled letter WHOIS ↗
m-eridiandefence.com.au Hyphenation WHOIS ↗
meridiandefence.net TLD variant WHOIS ↗
merіdiandefence.com.au Homoglyph WHOIS ↗
mreidiandefence.com.au Transposed WHOIS ↗
jeridiandefence.com.au Adjacent key WHOIS ↗
mridiandefence.com.au Missing letter WHOIS ↗
meeridiandefence.com.au Doubled letter WHOIS ↗
me-ridiandefence.com.au Hyphenation WHOIS ↗
meridiandefence.org TLD variant WHOIS ↗
meridіandefence.com.au Homoglyph WHOIS ↗
meirdiandefence.com.au Transposed WHOIS ↗
keridiandefence.com.au Adjacent key WHOIS ↗
meidiandefence.com.au Missing letter WHOIS ↗
merridiandefence.com.au Doubled letter WHOIS ↗
mer-idiandefence.com.au Hyphenation WHOIS ↗
meridiandefence.io TLD variant WHOIS ↗
meridiаndefence.com.au Homoglyph WHOIS ↗
merdiiandefence.com.au Transposed WHOIS ↗

Showing 24 of 126 variants (highest-threat first)

Discovered Subdomains (12)

Subdomain
www
mail
autodiscover
sip
lyncdiscover
enterpriseregistration
enterpriseenrollment
portal
vpn
intranet
dev
staging
OSINT Exposure: B (82%) — This section meets or exceeds industry best practices.
15 — Technology

Technology Stack

Detected platform, CDN, WAF, and server details

145ms
Response Time
Fast
3ms
DNS Lookup
142ms
Server Processing
ComponentDetails
PlatformCustom
CDNCloudflare
WAFCloudflare
Servercloudflare
FrameworkASP.NET
TLS VersionTLS 1.3
Cipher SuiteAes256
SSL Expiry2026-09-15
Perfect Forward SecrecyYes
16 — Hosting

Hosting & Infrastructure

Hosting provider, server software, CMS detection, and certificate history

ComponentDetails
Hosting ProviderCloudflare
ASN OrganizationCloudflare, Inc.

Certificate Issuer History

IssuerCertificatesFirst SeenLast Seen
undefined
undefined
17 — WHOIS & Domain Intel

WHOIS & Domain Intelligence

Domain registration, expiry, registrant contacts, and TLD-specific status analysis via RDAP

9y 11m
Domain Age
374d
Until Expiry
2
Status Codes
9y 11m old — 91% of registration period elapsed
Registered: 2016-03-15TodayExpires: 2027-03-15

Domain Profile

FieldValue
RegistrarCloudflare Registrar
Registry / WHOIS ServerauDA
TLD.com.au
Registered2016-03-15 (9y 11m ago)
Expires2027-03-15 (374 days remaining)
Registrant PrivacyNo (public registration)
RDAP Sourcehttps://rdap.afilias-srs.net/rdap/com.au/

Contact Information

RoleNameOrganisationCountryEmail
RegistrantMeridian Defence Systems Pty LtdMeridian Defence Systems Pty LtdAUdomains@meridiandefence.com.au
AdministrativeIT OperationsMeridian Defence Systems Pty LtdAUit@meridiandefence.com.au
TechnicalNetier IT SolutionsNetier Pty LtdAUsupport@netier.com.au

Domain Status Codes

Status CodeInterpretationSeverity
serverTransferProhibitedRegistry lock prevents unauthorized transfersinfo
clientTransferProhibitedRegistrar lock prevents unauthorized transfersinfo
.com.au — auDA Governed
Governed by the Australian Domain Administration (auDA). Registrants must meet Australian presence requirements. serverRenewProhibited is standard auDA behaviour and does not indicate a problem.

RDAP Nameservers

ada.ns.cloudflare.com
duke.ns.cloudflare.com
18 — SEO & Visibility

SEO & Visibility

Meta tags, Open Graph, structured data, and sitemap analysis

CheckStatusDetails
Title TagFoundMeridian Defence Systems | Sovereign Defence Engineering Solutions (62 chars - over recommended 60)
Meta DescriptionFoundAustralia's leading sovereign defence engineering company. DISP-approved contractor delivering advan... (196 chars - over recommended 160)
Canonical URLFoundhttps://meridiandefence.com.au/
Viewport MetaFoundPresent
JSON-LD Structured DataFoundPresent
Twitter CardFound[object Object]
SitemapFoundAccessible (120 URLs)

Open Graph Tags

PropertyValue
og:titleMeridian Defence Systems | Sovereign Defence Engineering
og:descriptionAustralia's leading sovereign defence engineering company. DISP-approved contractor delivering advanced systems integration and cybersecurity solutions.
og:imagehttps://meridiandefence.com.au/images/og-banner.jpg
og:urlhttps://meridiandefence.com.au
og:typewebsite
og:site_nameMeridian Defence Systems

Social Share Previews

How this site appears when shared on social platforms.

iMessage / Link Preview
Meridian Defence Systems | Sovereign Defence Engineering
meridiandefence.com.au
Twitter / X
Preview
Meridian Defence Systems | Sovereign Defence Engineering
Australia's leading sovereign defence engineering company. DISP-approved contractor delivering advanced systems integration and cybersecurity solutions.
meridiandefence.com.au
Facebook
Preview
meridiandefence.com.au
Meridian Defence Systems | Sovereign Defence Engineering
Australia's leading sovereign defence engineering company. DISP-approved contractor delivering advanced systems integration and cybersecurity solutions.

robots.txt Directives (2)

Parsed Directives
index
follow
19 — PageSpeed & Performance

PageSpeed & Performance

Google Lighthouse performance analysis via PageSpeed Insights API

Mobile

72
Performance
Needs Work
88
Accessibility
Needs Work
undefined
Best Practices
Poor
91
SEO
Good

Improvement Opportunities

OpportunityPotential Savings
Reduce unused JavaScript0.8 s
Properly size images0.5 s
Eliminate render-blocking resources0.4 s
Serve images in next-gen formats0.3 s

Desktop

88
Performance
Needs Work
95
Accessibility
Good
undefined
Best Practices
Poor
96
SEO
Good

Improvement Opportunities

OpportunityPotential Savings
Properly size images0.3 s
Serve images in next-gen formats0.2 s

Data from Google PageSpeed Insights API (Lighthouse). Scores are 0–100. ● Good (90+) ● Needs Work (50–89) ● Poor (<50)

20 — Site Structure

Site Structure & Crawl Analysis

Pages discovered via HTTP crawl compared against sitemap.xml

45
Pages Crawled
120
Sitemap URLs
0%
Sitemap Coverage
0
Broken Links
In Both (Crawl + Sitemap)
Crawl Only (not in sitemap)
Sitemap Only (not crawled)
Broken (4xx/5xx/timeout)

Site Map Diagram

100%
graph TD
    A["/ — Home"] --> B["about/"]
    A --> C["capabilities/"]
    A --> D["projects/"]
    A --> E["innovation/"]
    A --> F["careers/"]
    A --> G["news/"]
    A --> H["contact/"]
    A --> I["security-policy/"]
    A --> J["privacy-policy/"]
    A --> K["terms/"]
    B --> B1["leadership/"]
    B --> B2["history/"]
    B --> B3["locations/"]
    B --> B4["partnerships/"]
    C --> C1["systems-integration/"]
    C --> C2["cybersecurity/"]
    C --> C3["platform-sustainment/"]
    C --> C4["electronic-warfare/"]
    C --> C5["simulation-training/"]
    C --> C6["autonomous-systems/"]
    C --> C7["c4isr/"]
    C --> C8["maritime-systems/"]
    C --> C9["land-systems/"]
    C --> C10["aerospace/"]
    D --> D1["jp-9101/"]
    D --> D2["land-400/"]
    D --> D3["sea-5000/"]
    D --> D4["air-6500/"]
    D --> D5["dsp-1234/"]:::broken
    D --> D6["overlander/"]
    E --> E1["research/"]
    E --> E2["patents/"]
    E --> E3["partnerships/"]:::redirect
    F --> F1["open-positions/"]
    F --> F2["graduate-program/"]
    F --> F3["culture/"]
    F --> F4["benefits/"]
    G --> G1["contract-award-jp9101/"]
    G --> G2["disp-recertification/"]
    G --> G3["avalon-airshow/"]
    G --> G4["graduate-intake/"]
    H --> H1["canberra/"]
    H --> H2["adelaide/"]
    B2 --> X1["old-brochure.pdf"]:::broken
    G --> X2["press-kit-2024/"]:::broken
    classDef broken fill:#ef5350,stroke:#c62828,color:#fff
    classDef redirect fill:#ffa400,stroke:#e65100,color:#fff
Mermaid diagram (enable JavaScript or view in a Mermaid-compatible renderer) graph TD A["/ — Home"] --> B["about/"] A --> C["capabilities/"] A --> D["projects/"] A --> E["innovation/"] A --> F["careers/"] A --> G["news/"] A --> H["contact/"] A --> I["security-policy/"] A --> J["privacy-policy/"] A --> K["terms/"] B --> B1["leadership/"] B --> B2["history/"] B --> B3["locations/"] B --> B4["partnerships/"] C --> C1["systems-integration/"] C --> C2["cybersecurity/"] C --> C3["platform-sustainment/"] C --> C4["electronic-warfare/"] C --> C5["simulation-training/"] C --> C6["autonomous-systems/"] C --> C7["c4isr/"] C --> C8["maritime-systems/"] C --> C9["land-systems/"] C --> C10["aerospace/"] D --> D1["jp-9101/"] D --> D2["land-400/"] D --> D3["sea-5000/"] D --> D4["air-6500/"] D --> D5["dsp-1234/"]:::broken D --> D6["overlander/"] E --> E1["research/"] E --> E2["patents/"] E --> E3["partnerships/"]:::redirect F --> F1["open-positions/"] F --> F2["graduate-program/"] F --> F3["culture/"] F --> F4["benefits/"] G --> G1["contract-award-jp9101/"] G --> G2["disp-recertification/"] G --> G3["avalon-airshow/"] G --> G4["graduate-intake/"] H --> H1["canberra/"] H --> H2["adelaide/"] B2 --> X1["old-brochure.pdf"]:::broken G --> X2["press-kit-2024/"]:::broken classDef broken fill:#ef5350,stroke:#c62828,color:#fff classDef redirect fill:#ffa400,stroke:#e65100,color:#fff

Broken Links (3)

URLStatusLinked From
https://meridiandefence.com.au/projects/dsp-1234/404
https://meridiandefence.com.au/old-brochure.pdf404
https://meridiandefence.com.au/media/press-kit-2024/404
Crawled 45 pages in 0.0s • Max depth: 2 • Max pages: 30 • Sitemap: https://meridiandefence.com.au/sitemap.xml
21 — Monitoring

Proactive Monitoring Recommendations

Recommended monitoring and alerting setup

MonitorToolFrequency
DMARC aggregate report analysisValimail / dmarcianWeekly
Certificate Transparency monitoringcrt.sh / Cloudflare CT alertsReal-time
DNSBL/RHSBL monitoringHetrixToolsEvery 6 hours
SSL certificate expiryUptime Kuma / Netier RMMDaily
Security header changesNetier domain-monitorEvery 6 hours
PageSpeed performance regressionLighthouse CI / Cloudflare ObservatoryWeekly
22 — Roadmap

Recommendations & Remediation Roadmap

Prioritized actions grouped by timeline

Immediate (0-48 hours)

FindingSeverityActionEffort
MDS-005MediumAdd missing CSP directives via Cloudflare Transform Rule15 min
MDS-008LowIncrease MTA-STS max_age to 315576005 min
MDS-009LowGenerate PGP key and add Encryption field to security.txt30 min

Short Term (1-2 weeks)

FindingSeverityActionEffort
MDS-003MediumConfigure BIMI DNS record and host SVG logo30 min
MDS-006MediumAudit all subdomains for HTTPS support, then submit to HSTS preload list2 hours
MDS-004MediumReplace CSP unsafe-inline with nonce-based script loading4-8 hours
MDS-007MediumPlace dev/staging behind Cloudflare Access Zero Trust2 hours

Medium Term (1-3 months)

FindingSeverityActionEffort
MDS-001HighEvaluate DANE/TLSA via dedicated MTA gateway for email transport security2-3 days
MDS-002HighMobile performance optimisation via Cloudflare features and code changes1-2 days
MDS-003MediumObtain VMC (Verified Mark Certificate) for full BIMI compliance in Gmail/Apple Mail2-4 weeks (trademark required)
23 — Appendices

Appendices

Raw data, glossary, and disclaimers

A. robots.txt

robots.txt
User-agent: *
Allow: /
Disallow: /admin/
Disallow: /portal/
Disallow: /api/
Disallow: /intranet/
Disallow: /staging/
Sitemap: https://meridiandefence.com.au/sitemap.xml

B. Glossary

TermDefinition
SPFSender Policy Framework — restricts which servers can send email for a domain
DKIMDomainKeys Identified Mail — cryptographic email authentication
DMARCDomain-based Message Authentication, Reporting & Conformance
MTA-STSMail Transfer Agent Strict Transport Security — enforces TLS for email
TLS-RPTTLS Reporting — receive reports about email TLS failures
DANE/TLSADNS-based Authentication of Named Entities — binds certificates to DNS
DNSSECDomain Name System Security Extensions — cryptographic DNS validation
CAACertificate Authority Authorization — restricts which CAs can issue certificates
BIMIBrand Indicators for Message Identification — brand logo in email clients
HSTSHTTP Strict Transport Security — forces HTTPS connections
CSPContent Security Policy — controls which resources a page can load
DNSBLDNS-based Blackhole List — real-time email/IP reputation service

C. Disclaimer

This security assessment was performed using publicly available information only. No intrusive testing, penetration testing, or vulnerability exploitation was conducted.

Severity ratings use a qualitative likelihood x impact risk matrix aligned with ISO 27005. Risk scores are indicative and based on professional judgement.

This document is classified CONFIDENTIAL and is intended solely for the named recipient.

Assessment methodology references: NIST SP 800-177 Rev. 1, OWASP Secure Headers Project, PCI DSS v4.0, UK Cyber Essentials, ACSC Essential Eight, ISO 27005.