HTTPS · TLS 1.3 enforced
1.0 / 1.1 refused. Modern cipher suites only. Valid cert in date with auto-renewal monitored.
SSL/TLS primer →A working SSL cert is the start, not the finish line. YesGov configures the full transport-security stack — TLS 1.2+ enforcement, HSTS preload, modern cipher suites, security headers, subresource integrity — and hosts the site on infrastructure we control.
Each one is verifiable from outside — the same checks our open-data scanner runs against every U.S. government agency, nightly.
1.0 / 1.1 refused. Modern cipher suites only. Valid cert in date with auto-renewal monitored.
SSL/TLS primer →Browsers refuse plain HTTP for your domain — preload list submission included so it works on first visit too.
HSTS guide →CSP, X-Content-Type-Options, X-Frame-Options / frame-ancestors, Referrer-Policy — all set, all sane defaults.
Security headers →Every third-party script loaded with an integrity hash. Tampering at the CDN doesn’t silently inject code on your pages.
SRI →WordPress / Drupal / static-site renderer patched on a documented cadence. Plugin inventory reviewed each quarter.
WordPress security →No consumer hosting. Sites run in isolated containers on hardware we operate — segmented network, scoped credentials.
Infrastructure →Attacker on hotel Wi-Fi or a compromised router forces the citizen’s browser to http://, intercepts forms and logins.
Your page is iframed inside a hostile site, citizens click controls they can’t see, actions execute under their session.
An attacker posts content that runs JavaScript in other visitors’ browsers, exfiltrating sessions or scraping form data.
A widget vendor gets hacked, the JS they ship gets replaced, your site silently runs the attacker’s code.
How modern HTTPS works, what your cert chain has to look like, and how to renew automatically.
Forced HTTPS, the preload list, and what happens on a citizen’s first visit.
CSP, X-Frame, X-Content-Type, Referrer-Policy, Permissions-Policy — what to set and why.
Plugin hygiene, login lockdown, file-system permissions, and the attack surface to monitor.
What an external scan tells you about a site — and what it can’t see from outside.
Cipher suites, protocol versions, OCSP stapling, and the modern Mozilla profile.
Custom design included. We rebuild or migrate the site, configure every transport-security control, host it on hardware we control, and document every step.