Technical Infrastructure
When an AI agent assesses a website’s credibility, the first thing it checks is not your products but your technical infrastructure. Just as a bank reviews your credit history before approving a loan, AI agents inspect your domain’s security posture first.
This chapter covers every technical infrastructure element that affects AI trust evaluation, ordered by importance.
2.1 SSL/TLS Certificates
What is SSL: SSL (Secure Sockets Layer) and its successor TLS (Transport Layer Security) are protocols that encrypt website communications. The lock icon in your browser’s address bar indicates an active SSL/TLS connection.
Why AI agents care: A website without SSL is immediately flagged as “insecure.” This is the most basic threshold.
Configuration guidelines:
| Item | Recommendation | Notes |
|---|
| Certificate type | DV (Domain Validation) is sufficient | OV/EV certificates earn additional trust points |
| Certificate authority | Let’s Encrypt (free) or commercial CA | Self-signed certificates are penalized |
| Protocol version | TLS 1.2+ | TLS 1.0/1.1 are not acceptable |
| Certificate chain | Complete | Intermediate certificates must not be missing |
Getting started for free: Most hosting providers (Cloudflare, Vercel, Netlify) automatically provide SSL. If yours does not, use Let’s Encrypt with Certbot to obtain a free certificate.
Verification: Visit https://yourdomain.com and confirm the browser shows a lock icon. For detailed analysis, use SSL Labs.
2.2 DNSSEC
What is DNSSEC: DNS Security Extensions. It uses digital signatures to ensure DNS resolution results have not been tampered with.
Plain-language explanation: You write “deliver to 123 Main Street, New York” on a shipping label. DNSSEC ensures that address cannot be changed to “456 Oak Avenue, Chicago” during transit.
Why it matters: DNS hijacking is a real security threat. AI agents check whether your domain has DNSSEC enabled as an important security signal.
Configuration steps:
- Confirm your domain registrar supports DNSSEC (most do)
- Enable DNSSEC in your registrar’s dashboard:
- Cloudflare: Dashboard → DNS → DNSSEC → Enable (one click)
- Namecheap: Domain List → Select domain → Advanced DNS → DNSSEC → Enable
- GoDaddy: My Products → DNS → DNSSEC → Add
- Google Domains: DNS → DNSSEC → Enable
- Wait for propagation: Typically 24-48 hours
Verification:
# Verify using dig
dig +dnssec yourdomain.com
# Or use an online tool
# https://dnssec-debugger.verisignlabs.com/
DNSSEC is free, and most registrars require just one toggle. This is one of the highest-ROI security configurations you can make.
2.3 DMARC + SPF + DKIM
These three protocols work together to prevent your email domain from being spoofed. AI agents check all three.
SPF (Sender Policy Framework)
Purpose: Tells mail servers “only these IPs/servers are authorized to send email on behalf of my domain.”
Configuration: Add a TXT record to your DNS:
Name: @ (or your domain)
Type: TXT
Value: v=spf1 include:_spf.google.com include:sendgrid.net ~all
Replace the include: entries with your actual email service providers. Common ones:
- Google Workspace:
include:_spf.google.com
- Microsoft 365:
include:spf.protection.outlook.com
- Zoho:
include:zoho.com
- Resend / Amazon SES:
include:amazonses.com
DKIM (DomainKeys Identified Mail)
Purpose: Adds a digital signature to every email you send, allowing recipients to verify the email genuinely came from you.
Configuration: Typically provided by your email service. Obtain the DKIM key from your Google Workspace / Microsoft 365 admin panel, then add a TXT record to your DNS.
DMARC (Domain-based Message Authentication)
Purpose: Tells recipients “here is how to handle emails that fail SPF and DKIM verification.”
Configuration: Add a TXT record to your DNS:
Name: _dmarc
Type: TXT
Value: v=DMARC1; p=quarantine; rua=mailto:dmarc-reports@yourdomain.com
DMARC policy options:
p=none — Monitor only, take no action (use during initial rollout)
p=quarantine — Quarantine suspicious emails (recommended)
p=reject — Reject outright (strictest; use only after confirming SPF/DKIM work correctly)
Start with p=none and monitor for a few weeks. Once you confirm legitimate emails pass verification, upgrade to p=quarantine. Setting p=reject immediately may cause legitimate emails to be blocked.
Verification:
# Check SPF
dig TXT yourdomain.com
# Check DMARC
dig TXT _dmarc.yourdomain.com
# Online tool
# https://mxtoolbox.com/
2.4 HSTS (HTTP Strict Transport Security)
What is HSTS: Tells browsers “this domain must always use HTTPS,” preventing downgrade attacks to HTTP.
Configuration: Add the following HTTP response header:
Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
Platform-specific setup:
- Nginx: Add
add_header Strict-Transport-Security "max-age=31536000; includeSubDomains; preload" always; to your server block
- Cloudflare: SSL/TLS → Edge Certificates → Always Use HTTPS + HSTS → Enable
- Apache: Add
Header always set Strict-Transport-Security "max-age=31536000; includeSubDomains; preload" to .htaccess
2.5 CAA Records
What is CAA: Certificate Authority Authorization — specifies which CAs are permitted to issue certificates for your domain.
Why it matters: Prevents unauthorized CAs from issuing certificates for your domain. AI agents check this configuration.
Configuration: Add a CAA record to your DNS:
Name: @
Type: CAA
Value: 0 issue "letsencrypt.org"
If you use multiple CAs, add one record for each.
2.6 Configuration Priority
If your time is limited, configure in this order:
| Priority | Item | Time Required | Difficulty |
|---|
| 1 | SSL/TLS | 5 minutes | Low (usually already present) |
| 2 | SPF + DMARC | 15 minutes | Low |
| 3 | DNSSEC | 5 minutes | Low (one-click enable) |
| 4 | DKIM | 15 minutes | Medium (requires email provider coordination) |
| 5 | HSTS | 5 minutes | Low |
| 6 | CAA | 5 minutes | Low |
The entire setup takes approximately one hour. Once complete, your Security dimension (S dimension) score will see a significant improvement.
Next chapter: Schema.org in Practice — Making your product information machine-readable for AI agents