Title here
Summary here
Security headers are a low-cost way to harden your site at the edge.
Use these headers for all routes (example for Netlify):
[[headers]]
for = "/*"
[headers.values]
Strict-Transport-Security = "max-age=31536000; includeSubDomains; preload"
X-Content-Type-Options = "nosniff"
X-Frame-Options = "SAMEORIGIN"
Referrer-Policy = "strict-origin"
Permissions-Policy = "geolocation=(self), microphone=(), camera=()"Treat CSP as its own policy and iterate carefully as scripts and integrations evolve.
default-src 'self'unsafe-inlineApply long-lived caching to fingerprinted static assets, and shorter/revalidated caching to HTML.
In browser dev tools and scanners, confirm: