Fortinet white logo
Fortinet white logo

User Guide

Security Headers

Security Headers

Monitor and review detailed insights for incidents where the security header was modified on payments-related pages.

Unexpected changes to headers can weaken client-side protections. Monitoring header modifications ensures the payment page maintains required security controls and alerts you to risky or non-compliant changes.

Security Headers graph

Use this graph to track the instances of security header changes over the selected time frame.

The numbers at the bottom of the graph correspond to the date of the detected security header change.

Security header categories

Refer to the table below for descriptions of all security header categories.

X-Frame-Options

Controls whether your site can be displayed inside an iframe to prevent clickjacking attacks.

Access-Control-Allow-Origin

Specifies which origins are allowed to access your site’s resources via cross-origin requests.

Strict-Transport-Security

Forces browsers to use HTTPS only, protecting against protocol downgrade and cookie hijacking attacks.

Cross-Origin-Resource-Policy

Restricts which origins can load your site's resources (e.g., images, scripts) to prevent data leaks.

Cross-Origin-Embedder-Policy

Requires all embedded resources to explicitly grant permission, enabling secure cross-origin isolation.

Referrer-Policy

Controls how much referrer information (URL details) the browser sends when navigating away from your site.

Permissions-Policy

Allows or denies access to powerful browser features (e.g., camera, geolocation, microphone).

X-Content-Type-Options

Prevents browsers from MIME-type sniffing by enforcing the declared content type (reducing script injection risks).

Content-Security-Policy

Defines allowed sources for content (scripts, images, styles) to mitigate XSS, data injection, and related attacks.

Cross-Origin-Opener-Policy

Isolates your browsing context from cross-origin pages to protect against certain cross-origin side-channel attacks (e.g., Spectre-like attacks) and cross-window interference.

X-XSS-Protection

Legacy header instructing browsers to enable basic cross-site scripting filters (mostly deprecated).

View cell details

To view the events for a specific cell in the graph, click the cell and the table below will filter to show only the events associated with it.

Security Headers table

The table lists all detected security header change events over the selected time period.

To view the events associated with a specific cell in the Security Headers graph, click the cell in the graph and the Security Headers table below will filter to show only those events.

Column

Description

Application

The application for which the security header change took place.

Page

The URL of the web page on which the security header change was detected.

Header

The type of header affected in the change. For descriptions on each security header, please refer to Security header categories.

Last Updated

The date and time of the most recent activity relating to the tracked incident.

From

The header value prior to security header change

For example, if the header value changed from AAA to BBB, then the From value would be AAA.

To

The header value prior after the security header change.

For example, if the header value changed from AAA to BBB, then the To value would be BBB.

If the header was removed in the change, the To value would be [Removed].

Risk

The Risk indicates the likelihood that a security header change event poses a security concern.

  • Very Low

  • Low

  • Medium

  • High

  • Very High

PCI Compliance

Indicates whether the header change incident has been reviewed for PCI DSS 4.0 compliance. Click the edit icon under Action to complete the review.

Under PCI DSS 4.0, each JavaScript file and security header configuration on the payment page must include a Justification. The justification demonstrates that the item is intentionally allowed, necessary for business or technical operations, and has been evaluated for risk. This information is used as evidence for internal security teams and QSA auditors.

A complete Justification must include:

  • Purpose: Why the script or header is needed.

  • Risk Evaluation: Any associated risks and why those risks are acceptable.

  • Mitigation: Controls that manage or reduce risk (for example, CSP, SRI, or monitoring).

When writing justifications, include the following elements. These do not need to be long, but the information must be complete:

  • Business Purpose: What business need does the script or header address?

  • Data/Risk Impact: Does it interact with payment forms or potentially access sensitive data such as PAN, CVV, or cardholder information?

  • Controls/Mitigations: What protections are in place (for example, version locking, domain allowlists, integrity checks, monitoring)?

  • Scope & Ownership: Which URLs does it apply to, and which team is responsible?

  • Exception/Timeline (if applicable): If this is a required relaxation, is it temporary or long-term? What is the remediation plan and timeline?

Sample justification for a CAPTCHA script on a checkout page: Used to provide bot protection and prevent automated card-testing attacks on the payment form. The acquiring bank requires CAPTCHA as part of its fraud prevention controls.

Action

Click the edit icon to review a script for PCI DSS compliance and enter a Justification. For details on what the Justification must include, please see the description for PCI compliance.

Please note, the Block action is not yet supported.

View Incident details

To view the full, unshortened details of an incident, click it to expand the complete values for From, To, and Last Updated.

Security Headers

Security Headers

Monitor and review detailed insights for incidents where the security header was modified on payments-related pages.

Unexpected changes to headers can weaken client-side protections. Monitoring header modifications ensures the payment page maintains required security controls and alerts you to risky or non-compliant changes.

Security Headers graph

Use this graph to track the instances of security header changes over the selected time frame.

The numbers at the bottom of the graph correspond to the date of the detected security header change.

Security header categories

Refer to the table below for descriptions of all security header categories.

X-Frame-Options

Controls whether your site can be displayed inside an iframe to prevent clickjacking attacks.

Access-Control-Allow-Origin

Specifies which origins are allowed to access your site’s resources via cross-origin requests.

Strict-Transport-Security

Forces browsers to use HTTPS only, protecting against protocol downgrade and cookie hijacking attacks.

Cross-Origin-Resource-Policy

Restricts which origins can load your site's resources (e.g., images, scripts) to prevent data leaks.

Cross-Origin-Embedder-Policy

Requires all embedded resources to explicitly grant permission, enabling secure cross-origin isolation.

Referrer-Policy

Controls how much referrer information (URL details) the browser sends when navigating away from your site.

Permissions-Policy

Allows or denies access to powerful browser features (e.g., camera, geolocation, microphone).

X-Content-Type-Options

Prevents browsers from MIME-type sniffing by enforcing the declared content type (reducing script injection risks).

Content-Security-Policy

Defines allowed sources for content (scripts, images, styles) to mitigate XSS, data injection, and related attacks.

Cross-Origin-Opener-Policy

Isolates your browsing context from cross-origin pages to protect against certain cross-origin side-channel attacks (e.g., Spectre-like attacks) and cross-window interference.

X-XSS-Protection

Legacy header instructing browsers to enable basic cross-site scripting filters (mostly deprecated).

View cell details

To view the events for a specific cell in the graph, click the cell and the table below will filter to show only the events associated with it.

Security Headers table

The table lists all detected security header change events over the selected time period.

To view the events associated with a specific cell in the Security Headers graph, click the cell in the graph and the Security Headers table below will filter to show only those events.

Column

Description

Application

The application for which the security header change took place.

Page

The URL of the web page on which the security header change was detected.

Header

The type of header affected in the change. For descriptions on each security header, please refer to Security header categories.

Last Updated

The date and time of the most recent activity relating to the tracked incident.

From

The header value prior to security header change

For example, if the header value changed from AAA to BBB, then the From value would be AAA.

To

The header value prior after the security header change.

For example, if the header value changed from AAA to BBB, then the To value would be BBB.

If the header was removed in the change, the To value would be [Removed].

Risk

The Risk indicates the likelihood that a security header change event poses a security concern.

  • Very Low

  • Low

  • Medium

  • High

  • Very High

PCI Compliance

Indicates whether the header change incident has been reviewed for PCI DSS 4.0 compliance. Click the edit icon under Action to complete the review.

Under PCI DSS 4.0, each JavaScript file and security header configuration on the payment page must include a Justification. The justification demonstrates that the item is intentionally allowed, necessary for business or technical operations, and has been evaluated for risk. This information is used as evidence for internal security teams and QSA auditors.

A complete Justification must include:

  • Purpose: Why the script or header is needed.

  • Risk Evaluation: Any associated risks and why those risks are acceptable.

  • Mitigation: Controls that manage or reduce risk (for example, CSP, SRI, or monitoring).

When writing justifications, include the following elements. These do not need to be long, but the information must be complete:

  • Business Purpose: What business need does the script or header address?

  • Data/Risk Impact: Does it interact with payment forms or potentially access sensitive data such as PAN, CVV, or cardholder information?

  • Controls/Mitigations: What protections are in place (for example, version locking, domain allowlists, integrity checks, monitoring)?

  • Scope & Ownership: Which URLs does it apply to, and which team is responsible?

  • Exception/Timeline (if applicable): If this is a required relaxation, is it temporary or long-term? What is the remediation plan and timeline?

Sample justification for a CAPTCHA script on a checkout page: Used to provide bot protection and prevent automated card-testing attacks on the payment form. The acquiring bank requires CAPTCHA as part of its fraud prevention controls.

Action

Click the edit icon to review a script for PCI DSS compliance and enter a Justification. For details on what the Justification must include, please see the description for PCI compliance.

Please note, the Block action is not yet supported.

View Incident details

To view the full, unshortened details of an incident, click it to expand the complete values for From, To, and Last Updated.