From 2d98e1beae8ef950b662d2b4cb908f60c9e1b2f8 Mon Sep 17 00:00:00 2001 From: Maximo Comperatore <131000419+pyoneerC@users.noreply.github.com> Date: Sat, 17 Aug 2024 07:55:02 -0300 Subject: [PATCH] Add x frame resource (#6621) --- .../best-practices/api-security/content/x-frame-options-deny.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/src/data/best-practices/api-security/content/x-frame-options-deny.md b/src/data/best-practices/api-security/content/x-frame-options-deny.md index bf6e7450b..70217a521 100644 --- a/src/data/best-practices/api-security/content/x-frame-options-deny.md +++ b/src/data/best-practices/api-security/content/x-frame-options-deny.md @@ -3,3 +3,5 @@ > Send `X-Frame-Options: deny` header. The `X-Frame-Options` header prevents the page from being displayed in an iframe, which is commonly used in clickjacking attacks. By setting the value of this header to `deny`, you are telling the browser not to display the page in any iframe. This helps prevent the page from being embedded within an attacker's website and reduces the risk of clickjacking attacks. + +- [@video@Tutorial - X-Frame-Options HTTP Header and Click-Jacking](https://www.youtube.com/watch?v=Els0GRj0CQM) \ No newline at end of file