Github user krishna-pandey commented on the issue:

    https://github.com/apache/spark/pull/19419
  
    @tgravescs These generic headers are about providing available client-side 
protection for the application. I also think even if there is no sensitive data 
to formulate an attack by itself here, the information can be used in 
conjunction to target other ecosystem components. Also, in future we may add an 
interface for data access. Now is the time to think of Security First. 
Cross-site Scripting is one of the most prevalent attack vector and has been an 
OWASP Top 10 risk for web applications for decades. As the effort to have these 
in place here is minimal, IMHO we should set these. 
    
    As you rightly mentioned, deployment on cloud can expand the attack surface 
pretty wide in absence of right firewall policy. Also let's not forget insider 
threat inside corporate networks.
    
    Going forward may be we will have enough insight to choose which headers 
are needed to be enabled by default and enforce them from application side and 
not leave it to Users.


---

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to