All articles
Technical SEOSecurity AuditWeb Performance

The Technical SEO Security Audit Checklist That Actually Moves Rankings

A practical technical SEO security audit checklist covering HTTPS, headers, mixed content, redirects, CSP, and crawler-facing issues that hurt rankings.

WebSentry TeamMay 20, 20266 min read

Search engines treat security signals as ranking and trust factors, but most SEO audits stop at meta tags and Core Web Vitals. The gap between a site that passes Lighthouse and one that's actually secure is huge — and it shows up in crawl budget, indexation, and how browsers warn users before they ever reach your page.

This checklist focuses on the technical security issues that overlap with SEO: things that affect crawlers, render-blocking warnings, link equity, and trust signals. Run through it on any client site you inherit or as part of a quarterly review.

1. HTTPS and Certificate Health

HTTPS has been a ranking signal since 2014, but the implementation details still trip up plenty of sites.

  • Certificate validity: Check expiry date and issuer. An expired cert tanks rankings within days because Googlebot stops crawling.
  • Full chain serving: Many servers serve the leaf cert without intermediates. Test with openssl s_client -connect example.com:443 -servername example.com and verify the chain resolves.
  • TLS version: TLS 1.0 and 1.1 are deprecated. Require TLS 1.2 minimum, prefer 1.3.
  • SAN coverage: Confirm the cert covers both www and apex domains, plus any subdomains crawlers might hit.
  • HSTS: Add Strict-Transport-Security: max-age=31536000; includeSubDomains; preload and submit to the HSTS preload list once you're confident.

Common failure pattern

A site redirects HTTP to HTTPS, but the HTTPS version of www.example.com returns a cert error because the SAN only lists example.com. Googlebot follows the redirect, hits the error, drops the page. Fixed by reissuing the cert with both names.

2. Redirect Chains and Canonical Consistency

Security and SEO collide hard in the redirect layer.

  1. Pick one canonical host (https://www.example.com or https://example.com).
  2. All other variants should 301 to that host in a single hop. No HTTP → HTTPS → www → trailing slash chains.
  3. Test with curl -IL http://example.com and count the hops. More than two is a problem.
  4. Make sure internal links use the canonical form. Don't rely on redirects to fix lazy linking.

Each extra redirect leaks PageRank and burns crawl budget. On a site with 50,000 URLs, shaving one redirect hop typically increases daily crawled URLs by 15-25%.

3. Security Headers That Affect Crawl and Render

Headers don't directly rank pages, but missing or misconfigured headers trigger browser warnings that destroy click-through rates from SERPs.

The non-negotiable set

  • Content-Security-Policy: Even a permissive starting policy beats nothing. Lock down frame-ancestors at minimum to prevent clickjacking.
  • X-Content-Type-Options: nosniff — prevents MIME confusion attacks.
  • Referrer-Policy: Use strict-origin-when-cross-origin to preserve referrer data for analytics without leaking paths.
  • Permissions-Policy: Disable APIs you don't use (camera, microphone, geolocation) to reduce attack surface.

A scanner like WebSentry grades each of these and shows the exact header values it received, which makes it easier to spot the difference between "header present but misconfigured" and "missing entirely."

4. Mixed Content and Resource Integrity

Mixed content warnings push users away and signal a half-finished migration to crawlers.

  • Crawl the site and flag any http:// references in src, href, action, or CSS url() values.
  • Pay special attention to CMS-injected content: old WordPress posts often have hardcoded HTTP image URLs.
  • Add Subresource Integrity (integrity attribute) to third-party scripts you load by URL. If the CDN is compromised, the browser refuses the script instead of executing malicious code.
  • Audit your rel="noopener" usage on external links opened with target="_blank".

5. Cookie Configuration

Cookies set without proper flags are a security finding and increasingly a compliance one.

  • Secure flag on every cookie, no exceptions.
  • HttpOnly on session and auth cookies.
  • SameSite=Lax as the default, Strict for sensitive flows, None only when you genuinely need cross-site and always paired with Secure.
  • Check for cookies set by third-party scripts (analytics, chat widgets, ad tags). These often ignore your standards and create the worst findings on audit reports.

6. DNS and Email Authentication

DNS hygiene affects deliverability and domain reputation, which feeds back into how search engines weigh your domain's trust.

  • SPF: One TXT record, lookup count under 10.
  • DKIM: Active selectors published, keys rotated annually.
  • DMARC: Start with p=none for monitoring, move to quarantine then reject.
  • CAA records: Specify which CAs can issue certs for your domain. Prevents rogue issuance.
  • DNSSEC: Optional but increasingly expected on high-trust domains.

7. CORS Misconfigurations

CORS bugs leak data and create vulnerabilities that automated scanners flag publicly. The two patterns to catch:

  1. Access-Control-Allow-Origin: * combined with Access-Control-Allow-Credentials: true — invalid per spec and a serious finding.
  2. Reflective origins: the server echoes back whatever Origin header was sent, effectively allowing any site to make authenticated requests.

Test by sending requests with custom Origin headers and inspecting the response. WebSentry surfaces this in its CORS section if you don't want to script it yourself.

8. Crawler-Facing Issues

Some security configurations break Googlebot specifically.

  • Aggressive bot protection: Cloudflare's "Under Attack Mode" or overly strict WAF rules can block Googlebot. Whitelist verified crawler IPs.
  • JavaScript challenges: If your CDN serves a challenge page to crawlers, that's what gets indexed.
  • Rate limiting: Set crawler-friendly limits. A 429 to Googlebot reduces crawl rate for days.
  • robots.txt accessibility: Must return 200 over HTTPS, not redirect, not be behind any auth or rate limit.

9. Outdated Software Fingerprints

Server headers that leak version numbers (Server: Apache/2.2.15, X-Powered-By: PHP/5.6) give attackers a roadmap and signal neglect.

  • Strip or generalise Server headers.
  • Remove X-Powered-By entirely.
  • Hide WordPress version meta tag and generator strings.
  • Patch the underlying software anyway — hiding version numbers is defence in depth, not the actual fix.

10. Build the Audit Into a Repeatable Workflow

One-off audits don't scale. The agencies that handle this well do three things:

  1. Run an automated scan on every new client during onboarding to baseline the issues.
  2. Schedule monthly re-scans and track grade changes over time.
  3. Include a security section in monthly reports alongside ranking and traffic data.

If you want a fast starting point, run a free scan at websentry.dev — you'll get an A–F grade across SSL, headers, CSP, cookies, DNS, and CORS, with the specific values that failed each check so you can hand the report straight to a developer.

Check your own site

Run a free security scan and see if your site has the issues covered in this article. Results in under 30 seconds.