Dynamic CSP Management for Headless and Hybrid Optimizely CMS with Next.js
In the evolving realm of web security, Content Security Policy (CSP) is essential for defending against XSS and injection attacks. Traditional approaches often fall short because policies are embedded in code and hard to coordinate across environments.
Optimizely CMS supports dynamic CSP in a headed setup, where the CMS renders pages. This is straightforward with third-party modules such as the Stott Security Optimizely module. Installation is simple, configuration is clear, and the headers flow with the response.
Headless and hybrid architectures introduce a gap. The frontend is separate, so CSP headers often end up fixed in the application tier. That limits agility for security and content teams.
By combining the Stott Security module with Next.js middleware, dynamic CSP becomes possible in headless and hybrid environments. Policies remain CMS-managed, even when the site is delivered through a decoupled frontend.
What we’re solving
- Policy changes without releases: Update CSP in CMS and apply instantly.
- Environment variations: Manage dev, staging, and production policies centrally.
- Cross-team flow: Security and marketing can adjust policies without blocking frontend teams.
Headed vs headless
In headed Optimizely CMS, dynamic CSP is native to the page response. This remains a solid and current pattern. In headless and hybrid setups, the CMS serves content APIs while a separate frontend handles rendering. Without a bridge, CSP is usually hardcoded in that frontend. The approach below restores the same dynamic control you expect in headed.
Architecture
User Request → Next.js Middleware → Stott Security API → Optimizely CMS → Dynamic CSP Headers
- The user requests a page from the Next.js app.
- Middleware intercepts the request.
- Middleware calls the Stott Security endpoint to retrieve current headers.
- Headers are applied to the response before it is returned.
Implementation in Next.js middleware
The example below removes development-only branches. It always sources headers from CMS for consistency.
import { NextRequest } from "next/server";
export async function middleware(request: NextRequest) {
const baseCmsUrl = process.env.DXP_URL || "https://localhost:5000";
const headersUrl = `${baseCmsUrl}/stott.security.optimizely/api/compiled-headers/list/`;
// Create or reuse a Response object from your app logic prior to this point.
// For illustration we assume you already have a 'response' to enrich.
let response = new Response();
try {
const cmsResponse = await fetch(headersUrl, {
headers: { "Content-Type": "application/json" },
// Consider short caching and timeouts at edge to keep latency tight
});
if (!cmsResponse.ok) {
// Replace with your logger
console.error({
status: cmsResponse.status,
statusText: cmsResponse.statusText,
url: headersUrl,
path: request.nextUrl.pathname,
context: "middleware - security headers fetch failed"
});
return response; // graceful fallback
}
const securityHeaders: Array<{ key: string; value: string }> = await cmsResponse.json();
securityHeaders.forEach(h => response.headers.set(h.key, h.value));
return response;
} catch (error) {
// Replace with your logger
console.error({
error,
url: headersUrl,
path: request.nextUrl.pathname,
context: "middleware - security headers processing error"
});
return response; // fail safely
}
}
In your production app, you’ll attach these headers to the actual page or asset response you are returning from Next.js. Keep the fetch lean, and prefer edge runtime where possible.
Key benefits
- CMS-managed security: Update CSP without code changes. See the effect immediately.
- Environment flexibility: Dev can be relaxed, staging can mirror production with test tools, production can stay strict.
- Operational speed: Emergency updates and new integrations go live from CMS.
- Resilience: If the CMS API is unavailable, the site continues with safe defaults.
- Developer experience: Clear separation of concerns. No more per-environment hardcoding.
Practical considerations
Performance
- Enable caching at the CMS endpoint for short periods.
- Return compact JSON from the Stott Security module.
- Use edge middleware for minimal latency.
Security
- Rely on the module’s validation to prevent invalid CSP syntax.
- Keep an audit trail of edits to support compliance.
Workflow
- Document your policy structure in CMS.
- Align environments through content, not code.
- Test policy variations in staging, then promote.
Why the Stott Security module
- Comfortable CMS UI for policy editing.
- Validation before changes go live.
- CSP violation reporting integration.
- Support for multiple sites and additional security headers.
Explore the module on GitHub: GeekInTheNorth/Stott.Security.Optimizely.
Conclusion
Headed Optimizely CMS already delivers dynamic CSP with ease. The approach above brings the same control to headless and hybrid builds. Policies stay in CMS, the frontend stays decoupled, and security remains responsive to change.
With Next.js middleware, Optimizely CMS, and the Stott Security module, CSP moves from static configuration to a manageable, collaborative capability. It works with the speed of your teams and the realities of modern delivery.
Comments