Search engines treat security signals as ranking and trust factors, but most SEO audits stop at meta tags and Core Web Vitals. The gap between a site that passes Lighthouse and one that's actually secure is huge — and it shows up in crawl budget, indexation, and how browsers warn users before they ever reach your page.
This checklist focuses on the technical security issues that overlap with SEO: things that affect crawlers, render-blocking warnings, link equity, and trust signals. Run through it on any client site you inherit or as part of a quarterly review.
1. HTTPS and Certificate Health
HTTPS has been a ranking signal since 2014, but the implementation details still trip up plenty of sites.
- Certificate validity: Check expiry date and issuer. An expired cert tanks rankings within days because Googlebot stops crawling.
- Full chain serving: Many servers serve the leaf cert without intermediates. Test with
openssl s_client -connect example.com:443 -servername example.comand verify the chain resolves. - TLS version: TLS 1.0 and 1.1 are deprecated. Require TLS 1.2 minimum, prefer 1.3.
- SAN coverage: Confirm the cert covers both
wwwand apex domains, plus any subdomains crawlers might hit. - HSTS: Add
Strict-Transport-Security: max-age=31536000; includeSubDomains; preloadand submit to the HSTS preload list once you're confident.
Common failure pattern
A site redirects HTTP to HTTPS, but the HTTPS version of www.example.com returns a cert error because the SAN only lists example.com. Googlebot follows the redirect, hits the error, drops the page. Fixed by reissuing the cert with both names.
2. Redirect Chains and Canonical Consistency
Security and SEO collide hard in the redirect layer.
- Pick one canonical host (
https://www.example.comorhttps://example.com). - All other variants should 301 to that host in a single hop. No HTTP → HTTPS → www → trailing slash chains.
- Test with
curl -IL http://example.comand count the hops. More than two is a problem. - Make sure internal links use the canonical form. Don't rely on redirects to fix lazy linking.
Each extra redirect leaks PageRank and burns crawl budget. On a site with 50,000 URLs, shaving one redirect hop typically increases daily crawled URLs by 15-25%.
3. Security Headers That Affect Crawl and Render
Headers don't directly rank pages, but missing or misconfigured headers trigger browser warnings that destroy click-through rates from SERPs.
The non-negotiable set
- Content-Security-Policy: Even a permissive starting policy beats nothing. Lock down
frame-ancestorsat minimum to prevent clickjacking. - X-Content-Type-Options: nosniff — prevents MIME confusion attacks.
- Referrer-Policy: Use
strict-origin-when-cross-originto preserve referrer data for analytics without leaking paths. - Permissions-Policy: Disable APIs you don't use (camera, microphone, geolocation) to reduce attack surface.
A scanner like WebSentry grades each of these and shows the exact header values it received, which makes it easier to spot the difference between "header present but misconfigured" and "missing entirely."
4. Mixed Content and Resource Integrity
Mixed content warnings push users away and signal a half-finished migration to crawlers.
- Crawl the site and flag any
http://references insrc,href,action, or CSSurl()values. - Pay special attention to CMS-injected content: old WordPress posts often have hardcoded HTTP image URLs.
- Add Subresource Integrity (
integrityattribute) to third-party scripts you load by URL. If the CDN is compromised, the browser refuses the script instead of executing malicious code. - Audit your
rel="noopener"usage on external links opened withtarget="_blank".
5. Cookie Configuration
Cookies set without proper flags are a security finding and increasingly a compliance one.
- Secure flag on every cookie, no exceptions.
- HttpOnly on session and auth cookies.
- SameSite=Lax as the default,
Strictfor sensitive flows,Noneonly when you genuinely need cross-site and always paired withSecure. - Check for cookies set by third-party scripts (analytics, chat widgets, ad tags). These often ignore your standards and create the worst findings on audit reports.
6. DNS and Email Authentication
DNS hygiene affects deliverability and domain reputation, which feeds back into how search engines weigh your domain's trust.
- SPF: One TXT record, lookup count under 10.
- DKIM: Active selectors published, keys rotated annually.
- DMARC: Start with
p=nonefor monitoring, move toquarantinethenreject. - CAA records: Specify which CAs can issue certs for your domain. Prevents rogue issuance.
- DNSSEC: Optional but increasingly expected on high-trust domains.
7. CORS Misconfigurations
CORS bugs leak data and create vulnerabilities that automated scanners flag publicly. The two patterns to catch:
Access-Control-Allow-Origin: *combined withAccess-Control-Allow-Credentials: true— invalid per spec and a serious finding.- Reflective origins: the server echoes back whatever
Originheader was sent, effectively allowing any site to make authenticated requests.
Test by sending requests with custom Origin headers and inspecting the response. WebSentry surfaces this in its CORS section if you don't want to script it yourself.
8. Crawler-Facing Issues
Some security configurations break Googlebot specifically.
- Aggressive bot protection: Cloudflare's "Under Attack Mode" or overly strict WAF rules can block Googlebot. Whitelist verified crawler IPs.
- JavaScript challenges: If your CDN serves a challenge page to crawlers, that's what gets indexed.
- Rate limiting: Set crawler-friendly limits. A 429 to Googlebot reduces crawl rate for days.
- robots.txt accessibility: Must return 200 over HTTPS, not redirect, not be behind any auth or rate limit.
9. Outdated Software Fingerprints
Server headers that leak version numbers (Server: Apache/2.2.15, X-Powered-By: PHP/5.6) give attackers a roadmap and signal neglect.
- Strip or generalise
Serverheaders. - Remove
X-Powered-Byentirely. - Hide WordPress version meta tag and generator strings.
- Patch the underlying software anyway — hiding version numbers is defence in depth, not the actual fix.
10. Build the Audit Into a Repeatable Workflow
One-off audits don't scale. The agencies that handle this well do three things:
- Run an automated scan on every new client during onboarding to baseline the issues.
- Schedule monthly re-scans and track grade changes over time.
- Include a security section in monthly reports alongside ranking and traffic data.
If you want a fast starting point, run a free scan at websentry.dev — you'll get an A–F grade across SSL, headers, CSP, cookies, DNS, and CORS, with the specific values that failed each check so you can hand the report straight to a developer.
Check your own site
Run a free security scan and see if your site has the issues covered in this article. Results in under 30 seconds.