diff --git a/playbooks/roles/nginx/templates/edx/app/nginx/sites-available/cms.j2 b/playbooks/roles/nginx/templates/edx/app/nginx/sites-available/cms.j2 index 9633f484c7b..b858dbad539 100644 --- a/playbooks/roles/nginx/templates/edx/app/nginx/sites-available/cms.j2 +++ b/playbooks/roles/nginx/templates/edx/app/nginx/sites-available/cms.j2 @@ -45,6 +45,9 @@ error_page {{ k }} {{ v }}; add_header Strict-Transport-Security "max-age={{ NGINX_HSTS_MAX_AGE }}"; {% endif %} + # prevent potential XSS Reflection attack + add_header X-XSS-Protection "1; mode=block"; + # Prevent invalid display courseware in IE 10+ with high privacy settings add_header P3P '{{ NGINX_P3P_MESSAGE }}'; diff --git a/playbooks/roles/nginx/templates/edx/app/nginx/sites-available/lms.j2 b/playbooks/roles/nginx/templates/edx/app/nginx/sites-available/lms.j2 index fb201a72b75..a531dc0fdb8 100644 --- a/playbooks/roles/nginx/templates/edx/app/nginx/sites-available/lms.j2 +++ b/playbooks/roles/nginx/templates/edx/app/nginx/sites-available/lms.j2 @@ -93,6 +93,9 @@ error_page {{ k }} {{ v }}; add_header Strict-Transport-Security "max-age={{ NGINX_HSTS_MAX_AGE }}"; {% endif %} + # prevent potential XSS Reflection attack + add_header X-XSS-Protection "1; mode=block"; + # Prevent invalid display courseware in IE 10+ with high privacy settings add_header P3P '{{ NGINX_P3P_MESSAGE }}';