← All Guides

HSTS (HTTP Strict Transport Security)

Protocols & Standards

HSTS is a web security policy mechanism that forces web browsers and user agents to interact with servers only over secure HTTPS connections, preventing protocol downgrade attacks.

What to Know

HSTS prevents man-in-the-middle attacks that attempt to downgrade secure HTTPS connections to unencrypted HTTP, exposing sensitive data to interception. Once a server sends an HSTS header, browsers and applications refuse to connect over HTTP for the specified duration, eliminating the brief window of vulnerability during initial connection attempts. For MDM servers handling device commands, credentials, and corporate data, HSTS provides essential protection against sophisticated network-level attacks.

Without HSTS, users or misconfigured applications might accidentally connect to MDM servers via HTTP, exposing authentication credentials or device commands in plaintext. HSTS also protects against SSL stripping attacks where attackers intercept the first HTTP request before it’s upgraded to HTTPS. For organizations with strict security requirements, HSTS is often mandated as part of security compliance frameworks.

Common Scenarios

Enterprise IT: Enterprise MDM servers should enable HSTS with long max-age values (typically 1-2 years) and include subdomains to protect all related services. IT must ensure HTTPS infrastructure is stable before enabling HSTS, as broken certificates or misconfigurations cannot be worked around once HSTS is cached by devices. Security audits often verify HSTS headers are present on MDM and web application servers.

MSP: MSPs hosting MDM infrastructure should enable HSTS on all client-facing MDM instances to meet security best practices and compliance requirements. MSPs must coordinate HSTS enablement with certificate lifecycle management to prevent client outages if certificates expire or are misconfigured. HSTS preload list submission may be required for high-security clients but requires permanent HTTPS commitment.

Education: Educational MDM deployments should enable HSTS to protect student and staff devices from network-based attacks on shared school Wi-Fi networks. Student devices on public Wi-Fi outside school are particularly vulnerable to SSL stripping attacks that HSTS prevents. Education IT should verify HSTS compatibility with any legacy systems before deployment to avoid connectivity issues with older devices or applications.

In Addigy

Addigy’s cloud-hosted MDM infrastructure implements HSTS across its service endpoints, ensuring all device communication occurs over encrypted HTTPS connections. Addigy’s HSTS headers prevent protocol downgrade attacks and protect data in transit between devices and Addigy servers. Administrators do not need to configure HSTS manually — it is enforced automatically by Addigy’s infrastructure.

For organizations deploying custom applications or internal web services through Addigy-managed devices, admins can verify HSTS implementation by inspecting server headers or using online SSL testing tools. Addigy’s security posture benefits from HSTS as part of a defense-in-depth approach to protecting MDM communications.

Also Known As

  • Strict-Transport-Security
  • Force HTTPS