Creating Secure Web Pages and Forms: What You Need to Know

September 25th, 2017

Fred is a busy small business CEO.  He hired a cheap developer online to setup his secure medical web site for him.  The developer got an SSL certificate and setup pages where patients can make appointments and the doctor can receive patient requests and notices, “securely”.  However, the developer didn’t have any real training in security, none in HIPAA, and as a result, PHI was being sent in the clear, there were no audit trails or logs, SSL security was not enforced, and may other serious issues plagued the site.  The worst part — No one knew.

Luckily, Fred was made aware of the situation before a serious security breach happened (that he knew of); however, he had to re-do the site from scratch, more than doubling his time and money costs.

Creating a web site that has “secure” components requires more than slapping together some web pages and adding an SSL Certificate.  All such a certificate really does is create a thin veneer of security — one that does not go very far to protect whatever sensitive data necessitated security in the first place.  In fact, naive attempts at security can ultimately make the data less secure and more likely to be compromised by creating an appetizing target for the unscrupulous.

So, beyond paying big bucks to hire a developer with significant security expertise, what do you do? Start with this article — its purpose is to shed light on many of the most significant factors in secure web site programming/design and what you can do to address them.  At a minimum, reading this article will help you to intelligently discuss your web site security with the developers that you ultimately hire.

What is Involved In Web Site Security?

Web site security is a deep and complex topic. We will only be hitting some of the high points. The focus of this article is to address the security issues involved with a web site form that is designed to securely collect information from your visitors. What could be simpler, right?

Well, not quite. Here are some of the issues that need to be considered:

  1. SSL – Is the form secured so that data is transmitted from the end user securely and does your site therefore evoke trust?  Is your for page itself protected with SSL so as to prevent tampering with its contents?  (Here we use “SSL” as the common term used for TLS: SSL vs TLS … what is the difference?)
  2. Web page content – Is the HTML content sent to the end user protected from Cross Site Scripting (XSS) issues and does it avoid loading objects insecurely and/or from third parties?
  3. Script Security – Are the scripts or programs that process the submitted data written with security in mind? Do they have any vulnerabilities?
  4. Infrastructure – Is the web site hosting provider you are using trusted and known for good security? Are you on a shared server when you should be on a dedicated one?
  5. The Data – What do you do with the data once it is submitted? Is that data secured?
  6. Tracking – Do you track events such as access to and submission of data?
  7. Archival and Backup – Are there processes in place to make backups and permanent archives of important data?

SSL – Web Security Starts Here

An SSL Certificate is absolutely required for a secure web site.  The SSL Certificate allows:

  1. The data sent to and from your web server and your users to be encrypted
    • so it can’t be eavesdropped on
    • so it can’t be tampered with and changed.
  2. Your users to trust that they are connecting to your web site securely and know that your site is secure

An SSL certificate on a properly configured web server provides encryption of your web site data as it flows to and from your end users.

To get an SSL certificate, you can either order one directly from a third party, like Comodo, or contact your web hosting provider and to see if they can obtain one for you.  In either case, your web host will need to install the certificate on the server where your web site is hosted, and then you will need to make changes to your site to take full advantage of the secure channel that you have added.

SSL and Encryption

By far the most significant reason that people use SSL to secure their web site pages is to provide encryption of the data sent to and from their web site and the end user.  When the end user visits a page of yours that is protected by SSL, their web browser communicates over a secure channel with the web server, and so that all data transmitted is sent over this encrypted channel.  This helps to prevent eavesdropping and “man-in-the-middle” attacks on the data (more on these below).

Without SSL encryption, there is little or no protection of the data.  We will now review how to make sure that you set things up correctly to make maximal use of SSL and to prevent it from being circumvented.

See also : How Does Secure Socket Layer (SSL or TLS) Work?

SSL and Trust

The most overlooked and misunderstood aspect of SSL is the establishment of trust.  That is, enabling your end users to trust that they are connecting to your actual web site.  What else could they be connecting to, you may ask?

  1. Someone with access to the network between the end user and your site could be trying to intercept and read all the web traffic and/or altering your web site pages themselves (e.g. changing your forms to submit the data to them instead of to you).  This is a man-in-the-middle who is eavesdropping, and it is trivial to do without SSL security.  Even with SSL security, it is easy to do if the man-in-the-middle can present the end user with an SSL Certificate for your domain name that they trust and which looks good (i.e. like a forged ID card).
  2. The users could be visiting another web site that is pretending to be yours (i.e. it looks just like yours).  This “phishing” web site could be trying to collect information from your users for their own purposes.  Unless your users can identify that this site is not legitimate, they could easily be duped into revealing user names, passwords, and personal information.  How could they end up at a phishing web site like this?  This can happen by, for example, clicking on a web site link emailed to them in a malicious email or by them going to a misspelled version of your web site address.  No site is immune from such attacks, but you can work to mitigate them.

So, how can your SSL Certificate help mitigate the possibility of eavesdropping, man-in-the-middle, and phishing?

SSL Certificates are signed by a third-party authority, the so-called “Certificate Authority“.  This can be:

  1. You, if you sign your own certificates
  2. A respected third party issuing:
    1. A cheap or free certificate validating only your domain
    2. A more expensive “Extended Validation” certificate that also validates your organization

If you sign your own certificates, then your web site will generate trust warnings when anyone comes to visit it.  These can be made to “go away” on a per-visitor basis if the visitor chooses to permanently trust your self-signed certificate.  However, this is never recommended for a public web site as self-signed certificates provide no inherent trust that they are legitimate (anyone can generate one and pose as your site), they look amateurish, and they are annoying to the end user.  Self-signed certificates should only be used in internal or test environments.

When ordering a certificate from a trusted third party authority (e.g. Comodo or Verisign), there are various types of certificates that you can order.   The quick and cheap ones merely send an email to your domain contact and if you can click on a link there — you get the certificate.  These “domain validated” certificates are fine and provide great security; however, as no humans are involved in the validation process, it may be easier for an attacker to get an illegitimate one of these certificates.

You can also order Extended Validation certificates.  They cost more because real people actually validate your organization and your ownership of the domain.  They make phone calls and ensure that everything looks right.  If you have one of these certificates, then the address bar of your browser turns green when visitors come there … to indicate that “hey, this is a really trusted site!”  If you want to maximize trust and make it very easy for your end users to identify your site as legitimate and to be able to easily tell if someone is trying to trick them with a fake certificate, you will want to use an Extended Validation certificate.  These cost more, but are well worth it in terms of the security and trust that they provide.  See: Extended Validation (EV) SSL Certificates and Why choose an OV SSL Certificate?

If EV and OV certificates are outside of your budget, you should still use with an SSL certificate from some trusted third party.

Securing your Web Form with SSL

Once your web site has an SSL Certificate and it has been installed by your web host, your web pages can be accessed with addresses that start with “https://” instead of just “http://”.  The “s” in “https” means “secure“.  Note:

  1. When you are connected to a web page using a secure address like “”, the web browser will show a “lock” icon to let you know that the connection is secure.
  2. Web pages that end in “.shtml” are not necessarily secureThe “s” there means “server” (i.e. server-parsed page) and not “secure”. So, for example, “” is not a secure page, but “” is a secure page.
  3. In many default web server configurations that have SSL enabled, you can access the same page both securely and insecurely.  I.e. both “” and “” work and show the form — the only difference being the use of SSL or not.

So, lets say that you have a web form located at “”.  You have gotten an SSL Certificate and your web host has installed it.  Next you want to:

  1. Make sure people connect securely to your form page
  2. Make sure that no one can connect to your form page insecurely

These two goals might sound the same, but they are not.

Make sure people connect securely to your form page

Since your regular web site pages are probably insecure, you need to make sure that the links to your secure form page are absolute links starting with the prefix “https://”.  This will ensure that anyone clicking on these links will be taken to your form page on a secure connection.

The best solution is to use a HSTS (HTTP Strict Transport Security), which tells browsers that they should always use the secure version of your web site.  If you choose to have both the insecure (http) and secure (https) versions of your site running at the same time (not recommended), then you need to be careful with your links so that your sensitive pages are secured:

Wrong Links: Relative links are not recommended because, if the user is on an insecure page of your site, relative links will always take them to insecure versions of the destination page.  So relative links like the following should be avoided:

<A href="/form.html">Fill out my form!</a>

<a href="form.html">Fill out my form!</a>

Correct Links: Absolute links will ensure a secure connection by specifying that SSL must be used via the link prefix “https://”.  For example:

<a href="">Fill out my form!</a>

Be sure that ALL links to all secure pages of your site use this secure format with the “https://” prefix.

Side Note: These days, it is recommended that you use SSL for ALL pages of your web site, not just the “important ones”.  This is good for user trust, security, and privacy.  It is also good for Search Engine Optimization (as Google will reward you for securing your site).  If you have set up your site so all pages are secure, always, then relative links are safe once more.

Make sure that no one can connect to your form page insecurely

So, now all of the links on your site will take your users to the proper secure version of your form.  However, as mentioned before, most web hosts leave the insecure version of the form there and it can still be accessed by users if they enter the insecure address directly (or if you missed some of the links in your updates).  As a next step, you should ensure that it is not possible to access the form page via an insecure connection.  This is locking down or enforcing the use of SSL for this page.

There are several different ways that this can be done.  Some of these include:

  1. Separate space for SSL pages: If your web host has this feature, you can configure your web site so that web pages for secure (SSL) connections are stored in a different directory from those for insecure pages.  If you enable this feature, you would put your form page and any other secure pages in the secure directory and make sure that there are not any copies of these pages in the insecure directory.  Thus, any insecure requests for these pages would result in a “page not found” error.  You could, then, implement some server-side redirection rules where if someone does request the insecure page, they are automatically redirected to the secure version (this can be done using .htaccess files and the “Redirect” directive).  If you did this, then secure AND insecure requests for the page would take the user to the secure version with no errors, warnings or issues for the end user.
  2. Scripted pages: If your form page is generated by a server-side script (i.e. PHP, Perl, Python, or JAVA), then your script itself can look and see if the request is secure or not (e.g. by looking at the server environment variables).  For secure requests, it can render the form as usual.  For insecure requests, it can either give the user an error or redirect the user seamlessly to the proper secure location.
  3. Securing all pages: (Recommended) You can configure your site so that all requests for insecure pages are automatically redirected to the respective secure page.  In this way, all pages will be secure and any accidental / incorrect requests for the insecure pages will still get people to the right place.  If you have set this up pervasively for your site, then security is greatly improved.

If my form is posting securely to a secure form processing script, then why does the form itself need to be secured?

This question is usually asked when the form processing is managed by a third party — is securing the form itself with SSL needed?

E.g.  does the web site owner need to undergo the time and money cost of actually getting an SSL Certificate for his/her web site?

The answer is based on the following facts:

  1. The data sent from your end users to the server will be secure and encrypted during transmission.  This is critical for some applications, such as HIPAA compliance.
  2. The form itself will be sent to the end user unencrypted.  If there is nothing sensitive in the form itself, this is risky.  A man-in-the-middle could silently change this insecure form so that it submits to the attackers server (securely), capturing your users’ sensitive data.
  3. End users who are non-technical will have no way of knowing if their data will be submitted securely until they actually try it. Many end users will not want to submit their data to an insecure form on your site for this reason.
  4. End users have no way of knowing if they are viewing your site, or a phishing site, or if there is eavesdropping and modification going on.  Many users will not trust the connection and will not want to submit their data through your site.
  5. If your form page is insecure, it is very easy for any malicious party to perform a man-in-the-middle attack to eavesdrop on connections, to modify your form in transit to change what is collected and where the data is sent, and to set up phishing sites.  It is impossible for your end users to tell if this is going on.

If you do not SSL-secure your web form itself, you make it very vulnerable to attack and provide no way for your end users to trust your site.  If there is nothing untoward going on, you do have transmission security to rely on; however, that minimal level of security is not recommended for production web sites or anywhere that compliance is required.

Other Aspects of Web Forms Security

Proper use and locking down of the SSL connection for encryption and trust is only part of web form security.  There are many other aspects that you must be concerned with in order to protect your users, your application, and your company’s reputation.  These include (but are not limited to):

  1. Cross Site Scripting (XSS).  If you include dynamic content on your web pages (i.e. things submitted by other users or content submitted via form fields) and that content is not cleaned of such things as JavaScript and HTML, then it is possible that people could make arbitrary content appear on your web site, capture data from your users, and worse.    All data displayed should be cleaned of undesirable content (script tags, special characters, HTML, and other things).  This is one of the biggest security issues with dynamic web pages across the internet.
  2. Secure Server-Side Programming: The scripts and programs that accept and process the data from your form must be created with security in mind.  They must validate all submitted data as needed, not making any assumptions about its format and content.  They must not provide avenues for attack such as “SQL Injection” and use of submitted content as actual file names or URLs for loading remote content.  They should log any strange errors or problems for later analysis.  They should provide a mechanism, if possible, for blocking undesirable actions or users from using the scripts.
  3. Validation: Validation of all input data is something that is part of the above two points.  However, it is so essential, that we will repeat it and go over some of the fundamental points:
    • If you validate submitted content, always perform your validation on the server side.  Even if you use JavaScript to validate the data on the client side, you should always re-validate on the server side. Why? Because people can get around your JavaScript and submit arbitrary content directly to your scripts — the scripts  should be able to handle that.
    • Always de-taint submitted data.  What does that mean?  It means to never trust the submitted data and to take pains to ensure that the submitted data matches what you expect.  For example, if you have a select list that sends your script a number as the value, do not assume that you are actually getting a number!  Instead, check that it really is a numeric value or convert whatever is submitted into a number.
    • Remove disallowed content from text submitted by users.  I.e. special characters, embedded codes and other things that “should not be there” should be checked for and removed or blocked.
    • Make sure the submitted data is not “too big” to be used.
    • Do not assume anything — program defensively.
  4. Preserving State with Hidden Form Fields or Cookies: If your program remembers things from one page to another by saving the data in hidden form fields, then your program must also make sure that the content of those fields was not tampered with!  One good way to do this is to make a hash of all the data, together with a secret value, and to include that hash in the form data as well.  Then, when the form is submitted, you can recompute the hash and compare it with what passed from the form.  If they match, you are OK; if they do not, then the data has been tampered with.  No one can break this scheme without knowing your secret value or without breaking your hashing algorithm.  This method can also be used to validate data saved in cookies.  You can go a step further and use time stamps to prevent replay attacks.
  5. Third-Party Applications: If you install programs from third parties on your web site, then you must take care that there are not any known security issues with these programs, and you must be sure to update these programs as soon as new versions are released.  If you let your web site languish with an older, vulnerable version of a program on it, it will become a target for hackers as they constantly search the Internet for such web sites.  Your site will likely be hacked in these cases, possibly causing loss of business, deactivation of your web site, and tarnishing of your web site’s reputation.  Using a third-party application is quick and easy, but you need to make sure to pick a good one, and that places the burden of keeping it updated on you.  An exception is using a third-party application that is hosted by the third party itself.  In these cases, the third party ensures that the program is always updated with anything needed to address any security issues that may arise — the burden is on them and not you.  If you choose a good, respectable vendor, then you should have no problems, E.g. see: WordPress for HIPAA and ePHI?

All of these things, and more, are critical to the development of a secure web application.

Securing the Data After it Arrives

Ensuring that your users’ data is transmitted securely to your web server is certainly critical, as is ensuring that your application itself is secure and will not be hacked.  However, what happens to that data after your program receives it?  Do you still need to protect it in any way?  Does it need to remain encrypted?  How do you access or receive the data?  Many people forget that getting the data from the web server to them securely may require just as much preparation as getting it from their users in the first place!

In the following subsections, we will look at three different ways of saving and retrieving your users’ data and see what is needed in each case to preserve the data security from your users to your eyes, and then to being saved on disk and in backups.

1. Emailing the data to you

By far the most common action that data processing scripts do is email the submitted data to the web site owner’s email address.  The web site owner knows when there are new submissions just by checking his/her email and can access the data immediately there.  As most people running web sites checks their email fairly often, this integrates well with their business operations.

However, the standard ways of sending email are completely insecure. To understand why, see The Case For Email Security.  So, what can be done to still use email, but ensure that the data is secure and viewable only by the intended viewers?

  1. Have your web site script encrypt the data.
  2. Send this encrypted data (or a link to download the encrypted data) to the intended viewers via regular email.

As the form data is encrypted within the email message, most insecurities inherent in email are obviated.

For more details on securing your emailed form data in this way, see Recipe: Completely Secure Collection of Web Form Data using SSL and PGP or S/MIME. You can also use secure third-party services to have your form data emailed to you securely without the need to program anything yourself.

2. Saving the data in a database

Many web site owners like to have the submitted form data saved in a database (even if it is also being emailed to them).  Why?

  1. The data is saved online and potentially accessible from anywhere
  2. If the emailed copies of the data are lost, the copies in the database are still there
  3. The data in the database can be accessed through a web browser if there is a suitable user interface
  4. The data is presumably backed up for you

Ok, so if storage in an online database is for you, then you need to:

  1. Optionally – use some kind of encryption, like SSL or PGP, to ensure that the data is stored in the database in an encrypted manner.   Why?  The contents of database tables are not encrypted or secure in general.  Storing unencrypted data  makes that data available to anyone else with access to the database or its backups.See: Encryption and Auditing of MySQL Databases for HIPAA.
  2. Provide a user interface that allows you to access the database data.  This user interface must be secure, have strong access controls, and should provide a means for decrypting the encrypted data for you.

If you are really interested in security, the database option actually requires quite a lot of work or cost to make a solution that is secure and usable.  For this reason, most small organizations do not end up using secure database storage for important form data.

3. Saving the data in files

The file storage option is the “quick and dirty” alternative to secure database storage.  Essentially, your program will:

  1. Make a file containing all of the form data
  2. Encrypt that file using PGP or SSL
  3. Save that encrypted file in a directory on the web server that is not accessible from the web site or save it in an online file sharing service.

Then, the web site owners can login to the web server using Secure FTP and download these files as needed.  They can be decrypted locally when the data must be accessed.  Or, in the case of the files being saved in an online file share, other simpler mechanisms for accessing the data are available.

This solution is secure and provides a good backup to securely emailed data.

How Secure is Your Web Host?

The choice of web hosting provider and environment is critical for the security of your web site application.

  1. A web hosting provider that does not specialize in security will likely not have an especially secure infrastructure, and the software they use is more likely to have unpatched vulnerabilities.  This will result in your web site being significantly less secure.
  2. If your web hosting provider does not have good security and privacy policies or is generally not well trusted in terms of the sanctity of your data, you may have a problem.  System administrators and technical support staff at the provider can access your web site application and raw data.  If the data is not encrypted, they can read and copy it.  They can modify the application to capture and store information.  Do you have a good sense that this will not happen?
  3. Are you on a dedicated or shared web server?  If you are on a shared web server and another web site on that server or the server itself is compromised, then your web site and data could also be compromised (depending on the nature of the issue).  If you can afford it, dedicated servers and virtual private servers provide your site with a much higher level of security than a shared hosting account will offer.

Other Technical Security Tips

There are many, many other considerations in developing and maintaining a production secure web site.  It would be impossible to cover or even list them all here.  However, here are some more interesting and useful tips.

Use Secure Cookies

If your secure site is using cookies for anything, be sure to set the “secure” cookie flag (and the “httpOnly” flag).  This will ensure that these cookies are never sent insecurely over the Internet when the visitor arrives at any insecure pages of your web site (they are not sent at all to insecure pages) and thus helps preserve the security of the contents of these secure cookies.

Prevent Form Spam

Form spam occurs when automated programs find your web forms and try to submit data through them so as to send you spam.  Form spam can result in hundreds or thousands of useless form posts each day.   Once you start getting form spam, stopping it will be your desperate goal.  There are two primary ways:

  1. CAPTCHA – This method requires end users to read text embedded in an image and type that text successfully into a form field.  This is then validated by the back-end program.  Since most spam programs cannot read text embedded in images, it will successfully block almost all automated form spam.  However, CAPTCHA does require that the users perform one more step and can be a little annoying.
  2. JavaScript and Cookies – Most automated form spam programs do not process JavaScript or use cookies.  If your web form requires JavaScript to successfully submit the form, the form bots will not be able to do this and most form spam will be blocked.   This method is a little less reliable than CAPTCHA; however, it does not require any extra work on the part of the end user.  Note that if you wish to use the JavaScript method, you must be sure that arbitrary submissions to the default action URL of your forms will never succeed — only submissions made after the execution of your custom JavaScript should succeed.

Minimize the Need for Trust

A good rule of thumb is to minimize the need to trust third parties, and to trust only the trustworthy.

  1. If you do not trust your internal IT staff, do not host your web application on your own servers or give them access to the server used.
  2. If you do not fully trust the third party hosting your web site, be sure to encrypt the form data as soon as possible.  This helps ensure that the data is not saved anywhere in plain text and also is not backed up in plain text, thus minimizing your exposure to nosy people at the web hosting provider.  Further, be sure that the private keys and passwords needed to decrypt the data are NOT stored on the web host’s servers, if possible, so that they cannot decrypt the data themselves (and so no hacker who has broken into their systems can do so).
  3. Ensure that only authorized staff can access the submitted form data.  Ideally, it should always be encrypted and only authorized people should have the capability to decrypt it.

These are just a few obvious points.  As you evaluate your web application itself and the flow of data, ask yourself “who can access the raw data and how” at each stage.  Are there stages where you are trusting people who should not be trusted? Are you using “security by obscurity“?  If so, re-evaluate.

Forced use of strong encryption in SSL

The strength of encryption used by SSL is a function of both the user’s web browser and the server.  Even if your web server supports very good encryption, like AES256, the browser may choose a weaker level of encryption so as to make things slower.  Older versions of Internet Explorer are notable for choosing weaker encryption in the interest of speed.

You can modify your web server configuration so that only levels of encryption that you approve can be used to access your site.  For more information, What Level of TLS and SSL is required by HIPAA?

Use Two Factor Authentication

Two factor authentication is almost standard on very secure sites now.  It means that you require both a password and something else (e.g. a token obtained from the person’s phone) to validate their identity.  Without both, the user cannot login.  See DuoSecurity for a good solution that is free for small web sites.  Google Authenticator is also very good.  Try to stay away from using only SMS (text messaging) as the second factor, as that is no longer considered secure.

So, what to do?

Thinking that maybe outsourcing your form hosting an processing is the fastest and most cost effective solution?

See: LuxSci SecureForm

Some Further Background Reading

Download the eBook: HIPAA-compliant web site basics


For more details on aspects of web site application security, see also:

OWASP Guide to Building Secure Web Applications:

World Wide Web security FAQ:

CERT advisory 97.25.CGI:

CERT advisory CA-2000-02

Secure Programming for Linux and Unix HOWTO (David A. Wheeler):

Preventing HTML form tampering: