Non-.gov Domain Detected

Pursuant to OMB Memorandum M-23-10, issued in coordination with the Department of Homeland Security and the Cybersecurity and Infrastructure Security Agency (CISA), all U.S. government websites, including those operated by state, tribal, county, municipal, special district, and school district entities, are strongly directed to operate under a .gov domain. Existing government websites should be migrated to, and permanently redirected to, a .gov domain in order to strengthen authenticity, public trust, cybersecurity posture, and protection against impersonation and spoofing.

Government Entity
COUNTY OF GRANT
County • Grant County • Washington • Pop. 102,678
View Full Profile

Executive Summary

Domain Name
grantcountyweb.com
Scan Timestamp
Overall Result
Security Issues Detected
Checks Passed
0 / 16
0% compliance rate
Risk Posture Statement
This domain has critical security deficiencies that pose significant risk and require immediate remediation.
Passed Checks (0)
No checks passed
Failed Checks (16)
SSL/TLS
HTTPS
HSTS
Certificate
CAA
X-Frame-Options
X-Content-Type
Security.txt
SPF
DKIM
DMARC
MTA-STS
TLS-RPT
DNSSEC
IPv6
RPKI
Action Required

Failing even 1 check is a major security concern and should be addressed immediately. Each failing control represents a potential attack vector that could be exploited by malicious actors.

Check ID: 7a3958c4-a5ca-4ed6-97d8-fb1583278565

Domain & DNS Security

Layer: Internet resolution and authenticity. Checks included: DNSSEC validation, nameserver configuration, IPv6 DNS support for name servers and web servers. Why this matters: DNS is foundational. If DNS is compromised, everything else is irrelevant. Attackers can redirect traffic, intercept communications, or impersonate your domain if DNS security is weak. Responsibility: Domain administrator manages DNS records, DNSSEC keys, and nameserver configuration.

Web Transport Security (HTTPS & TLS)

Layer: Client-to-server encryption. Checks included: HTTPS availability, HTTPS redirect enforcement, TLS version support, cipher configuration, TLS renegotiation security, 0-RTT status, compression settings, HSTS configuration. Why this matters: TLS is one logical system that protects data in transit between browsers and servers. Weak TLS configuration allows attackers to intercept, decrypt, or modify communications. Modern standards require TLS 1.2 or higher with secure cipher suites. Responsibility: Web and infrastructure team configures web server TLS settings, certificate deployment, and HTTPS redirect rules.

Certificate & Trust Policy

Layer: Cryptographic trust and issuance control. Checks included: Certificate validity, trust chain verification, public key validation, signature verification, domain name matching, CAA (Certificate Authority Authorization) records. Why this matters: Certificates and CAA are about who is allowed to issue trust, not transport mechanics. Invalid certificates or missing CAA records allow attackers to obtain fraudulent certificates for your domain, enabling man-in-the-middle attacks. Trust chain validation ensures certificates are issued by legitimate Certificate Authorities. Responsibility: Security and PKI administrators manage certificate lifecycle, CAA DNS records, and trust chain configuration.

HTTP Application Security Headers

Layer: Browser-side attack prevention. Checks included: X-Frame-Options, X-Content-Type-Options, Referrer-Policy, security.txt file presence. Why this matters: Headers mitigate XSS, clickjacking, data leakage. They are not TLS controls but application-level security directives that instruct browsers how to handle your content. Missing headers allow attackers to embed your site in malicious frames, execute XSS attacks, or leak sensitive referrer information. The security.txt file provides a standardized way for security researchers to report vulnerabilities. Responsibility: Web application owner configures HTTP response headers in web server or application framework settings.

Email Authentication & Transport Security

Layer: Identity and message integrity. Checks included: SPF (Sender Policy Framework), DKIM (DomainKeys Identified Mail), DMARC (Domain-based Message Authentication, Reporting & Conformance), MTA-STS (Mail Transfer Agent Strict Transport Security), TLS-RPT (TLS Reporting). Why this matters: Email is a completely separate attack surface from web security. Without proper authentication, attackers can spoof emails from your domain, leading to phishing attacks, reputation damage, and email delivery failures. SPF defines authorized sending servers, DKIM cryptographically signs messages, DMARC provides policy enforcement, MTA-STS enforces secure email transport, and TLS-RPT provides visibility into email transport security issues. Responsibility: Email and messaging administrators configure DNS records for SPF, DKIM, and DMARC, deploy MTA-STS policies, and monitor TLS-RPT reports.

Hosting & Platform Information

Informational – Not a Security Control

Layer: Transparency and context. Information included: Hosting provider identification, web and email IP addresses, MX record configuration, platform detection (WordPress), website scanning results (email addresses found, broken links). Why this matters: This section provides context for auditors and IT staff but does not represent security controls. Understanding hosting infrastructure helps assess risk exposure, identify shared hosting concerns, and track platform dependencies. WordPress detection helps identify if version monitoring is required. Website scanning identifies potential information disclosure issues. Responsibility: IT staff and auditors use this information for risk assessment and compliance documentation.

Network & Infrastructure Trust

Layer: Internet routing and reputation. Checks included: RPKI (Resource Public Key Infrastructure) validation for route origin authorization, IP abuse checks against blacklists, domain reputation analysis, PTR record validation. Why this matters: These controls protect against hijacking, spoofing, and reputation-based blocking. RPKI prevents BGP route hijacking by cryptographically validating that IP address blocks are announced by authorized networks. IP abuse checks identify if your IP addresses are on spam or malware blacklists, which can cause email delivery failures and website blocking. Domain reputation affects email deliverability and search engine rankings. Responsibility: ISP and infrastructure providers manage RPKI ROA (Route Origin Authorization) records, IP address allocation, and network routing announcements.

Historical Checks

View previous check results for this domain.

0 out of 16 checks passed
FWeb Security0/8
Web Security
SSL/TLS
HTTPS
HSTS
Cert
CAA
X-Frame
X-Content
sec.txt
FEmail Security0/5
Email Security
SPF
DKIM
DMARC
MTA-STS
TLS-RPT
FDNS & Infrastructure0/3
DNS & Infrastructure
DNSSEC
IPv6
RPKI

🔔 Subscribe to Alerts

Get notified when security status changes for this domain. You must use an email address at this domain or a .gov email address.

Check Another Domain Get Help Securing Your Domain