TL;DR
This 15-item checklist covers critical Netlify security configurations: environment variables, security headers, access control, and Netlify Functions. 5 critical items must be fixed before launch, 6 important items within the first week, and 4 recommended items when you can.
Quick Checklist (5 Critical Items)
Environment Variables 4
Security Headers 4
Access & Deployment 4
Netlify Functions 3
Netlify Security Defaults
Netlify provides automatic HTTPS, DDoS protection, and a secure CDN. However, you need to add security headers manually using a _headers file or netlify.toml configuration. Without custom headers, your site misses important protections like CSP and clickjacking prevention.
For sites using Netlify Functions, remember that functions are public endpoints by default. Anyone can call them directly. Always implement authentication and input validation.
How do I add security headers on Netlify?
Create a _headers file in your publish directory (usually public/ or build/). Add headers for all paths using /* or specific paths. Alternatively, add headers in netlify.toml under [[headers]] sections.
Are Netlify environment variables secure?
Netlify environment variables are encrypted and available during build time and in Netlify Functions. They are not automatically exposed to the browser. However, if your build process embeds them in JS bundles, they become public. Use Functions for secret-dependent operations.
How do I protect Netlify deploy previews?
Enable password protection in Site Settings > Access Control, or use Netlify Identity to require login. You can also disable deploy previews entirely if they expose sensitive features before launch.
Check Your Netlify Site
Our scanner reviews headers, exposed secrets, and common misconfigurations.
Start Free Scan