In this chapter, we covered several security vulnerabilities, as well employing Spring Security to circumvent those vulnerabilities. After reading this chapter, you should understand the threat of CSRF and use of the synchronizer tokens to prevent CSRF.
You should also know how to include various HTTP headers to protect against common security vulnerabilities using the Cache-Control, Content-Type Options, HSTS, X-Frame-Options, and X-XSS-Protection methods.
In the next chapter, we will discuss how to migrate from Spring Security 3.x to Spring Security 4.2.