SSL Verification Bypassed
The server's SSL certificate could not be verified. The analysis was completed using insecure mode. Data may be less reliable.
Reason:
Hostname Mismatch - certificate is issued for www2.cms.gov, api.developer.cms.gov, aps.portal-beta.cms.gov, bi.cms.gov, confluence.cms.gov, edit.openpaymentsdata.cms.gov, edit.pfs.data.cms.gov, elmo.portal-beta.cms.gov, fm-prod.insuranceoversight.cms.gov, not for api.developer.cms.gov.edgekey.net
Open
Cached
·
just now
72/100
SECURITY SCORE
Certificate Information
Subject
C=US, ST=Maryland, L=Baltimore, O=Centers for Medicare & Medicaid Services, CN=www2.cms.gov
Issuer
C=US, O=DigiCert Inc, CN=DigiCert Global G3 TLS ECC SHA384 2020 CA1
Valid From
November 19, 2025
Valid Until
February 04, 2026
21 days
Public Key
ECDSA
256 bit
(P-256)
Adequate
Signature Algorithm
ECDSA-SHA384
SHA-256 Fingerprint
A1:42:4E:70:C8:E1:FF:6E:3F:90:91:73:47:6C:DE:04:6A:98:E1:AD:CA:16:66:50:CF:A3:A0:93:E6:EB:4F:3A
Alternative Names
Security Configuration
TLS Protocols
TLS 1.2
TLS 1.3
Forward Secrecy
Supported
(Modern clients use PFS)
HTTP Security Headers
Status
Strict-Transport-Security
Missing
Not configured
Content-Security-Policy
Missing
Not configured
X-Frame-Options
Missing
Not configured
X-Content-Type-Options
Missing
Not configured
Referrer-Policy
Missing
Not configured
Permissions-Policy
Missing
Not configured
Recommendations
- • Add Strict-Transport-Security header with max-age of at least 1 year
- • Add Content-Security-Policy header to prevent XSS attacks
- • Add X-Frame-Options: DENY or SAMEORIGIN to prevent clickjacking
- • Add X-Content-Type-Options: nosniff
- • Add Referrer-Policy header (recommended: strict-origin-when-cross-origin)
- • Consider adding Permissions-Policy to control browser features
CAA Records (Certificate Authority Authorization)
CAA Records
Not Configured
(Any CA can issue certificates)
CAA Issues
- • No CAA records configured - any CA can issue certificates
Recommendations
- • Implement CAA records to restrict which CAs can issue certificates for your domain
- • This adds an extra layer of security against unauthorized certificate issuance
- • Example: Add CAA record 'example.com. CAA 0 issue "letsencrypt.org"'
- • Consider adding 'iodef' record to receive security incident reports
Subject Alternative Names
27 domains
api.developer.cms.gov
aps.portal-beta.cms.gov
bi.cms.gov
confluence.cms.gov
edit.openpaymentsdata.cms.gov
edit.pfs.data.cms.gov
elmo.portal-beta.cms.gov
fm-prod.insuranceoversight.cms.gov
github.cms.gov
github.test.cms.gov
hipchat.cms.gov
jira.cms.gov
jira.prodnr.cms.gov
load.openpaymentsdata.cms.gov
pecosai.portal-beta.cms.gov
pfs.data.cms.gov
pm-analytics.insuranceoversight.cms.gov
pm.insuranceoversight.cms.gov
prod2-edit.openpaymentsdata.cms.gov
prod2.openpaymentsdata.cms.gov
qic-edit.cms.gov
qic.cms.gov
scclia.cms.gov
sei.cms.gov
tableau.bi.cms.gov
www2.cms.gov
vpn.aws.healthcare.gov