Don't miss your chance to take the Fabric Data Engineer (DP-700) exam on us!
Learn moreNext up in the FabCon + SQLCon recap series: The roadmap for Microsoft SQL and Maximizing Developer experiences in Fabric. All sessions are available on-demand after the live show. Register now
We have 3 main security issues that need support to fix as follows:
- Missing security headers :
Best practice measures recommend the implementation of the following headers to aid in strengthening user protection within modern browsers:
1. X-Frame-Options
2. X-Xss-Protection
3. Strict-Transport-Security
4. X-Content-Length
5. Content-Security-Policy
-Server Fingerprinting:
The application responses expose information about the server. This will help the threat actor to find known vulnerabilities.
Recommendation: Any information that could indicate the back-end technologies should be removed or modified. Please disable "Server" in response headers.
-Missing HTTP Only and Secure Flags
The application uses several cookies missing one or more cookie security flags such as HTTP only and secure. Cookie flags must be set appropriately to avoid compromise of user session cookies.
Recommendation: Ensure that cookies have only HTTP and secure, flags set.
kindly we need step by step guide to fix the above issues
If you have recently started exploring Fabric, we'd love to hear how it's going. Your feedback can help with product improvements.
A new Power BI DataViz World Championship is coming this June! Don't miss out on submitting your entry.
Share feedback directly with Fabric product managers, participate in targeted research studies and influence the Fabric roadmap.
| User | Count |
|---|---|
| 3 | |
| 2 | |
| 2 | |
| 2 | |
| 2 |