CIS Google Chrome Benchmark v3.0.0
CIS Google Chrome Benchmark v3.0.0
Benchmark
v3.0.0 - 01-29-2024
Terms of Use
Please see the below link for our current terms of use:
https://www.cisecurity.org/cis-securesuite/cis-securesuite-membership-terms-of-use/
Page 1
Table of Contents
Terms of Use ..................................................................................................................... 1
Table of Contents ............................................................................................................. 2
Overview ............................................................................................................................ 8
--- USAGE NOTES --- ............................................................................................................... 8
Recommendation Order ............................................................................................................ 8
Enforced Defaults...................................................................................................................... 9
Viewing the Resulting "Policies" in Chrome.............................................................................. 9
Intended Audience ..................................................................................................................... 9
Consensus Guidance............................................................................................................... 10
Typographical Conventions .................................................................................................... 11
Recommendation Definitions ....................................................................................... 12
Title............................................................................................................................................. 12
Assessment Status .................................................................................................................. 12
Automated ............................................................................................................................................. 12
Manual.................................................................................................................................................... 12
Profile ......................................................................................................................................... 12
Description ................................................................................................................................ 12
Rationale Statement ................................................................................................................. 12
Impact Statement...................................................................................................................... 13
Audit Procedure........................................................................................................................ 13
Remediation Procedure ........................................................................................................... 13
Default Value ............................................................................................................................. 13
References ................................................................................................................................ 13
CIS Critical Security Controls® (CIS Controls®) .................................................................... 13
Additional Information ............................................................................................................. 13
Profile Definitions ..................................................................................................................... 14
Acknowledgements .................................................................................................................. 15
Recommendations ......................................................................................................... 16
1 Enforced Defaults .................................................................................................................. 16
1.1 HTTP authentication ....................................................................................................................... 17
1.1.1 (L1) Ensure 'Cross-origin HTTP Authentication prompts' is set to 'Disabled' (Automated)
................................................................................................................................................... 18
1.2 Safe Browsing settings .................................................................................................................. 20
1.2.1 (L1) Ensure 'Configure the list of domains on which Safe Browsing will not trigger
warnings' is set to 'Disabled' (Automated) ................................................................................. 21
1.2.2 (L1) Ensure 'Safe Browsing Protection Level' is set to 'Enabled: Safe Browsing is active
in the standard mode.' or higher (Manual) ................................................................................ 23
Page 2
1.3 (L1) Ensure 'Allow Google Cast to connect to Cast devices on all IP addresses' is set to
'Disabled' (Automated) .............................................................................................................. 25
1.4 (L1) Ensure 'Allow queries to a Google time service' is set to 'Enabled' (Automated) ....... 27
1.5 (L1) Ensure 'Allow the audio sandbox to run' is set to 'Enabled' (Automated) ................... 29
1.6 (L1) Ensure 'Ask where to save each file before downloading' is set to 'Enabled'
(Automated) ............................................................................................................................... 31
1.7 (L1) Ensure 'Continue running background apps when Google Chrome is closed' is set to
'Disabled' (Automated) .............................................................................................................. 33
1.8 (L2) Ensure 'Control SafeSites adult content filtering' is set to 'Enabled: Filter top level
sites (but not embedded iframes) for adult content' (Automated) ............................................. 35
1.9 (L1) Ensure 'Determine the availability of variations' is set to 'Enable all variations'
(Manual) ..................................................................................................................................... 37
1.10 (L1) Ensure 'Disable Certificate Transparency enforcement for a list of Legacy Certificate
Authorities' is set to 'Disabled' (Automated) .............................................................................. 39
1.11 (L1) Ensure 'Disable Certificate Transparency enforcement for a list of
subjectPublicKeyInfo hashes' is set to 'Disabled' (Automated) ................................................. 41
1.12 (L1) Ensure 'Disable Certificate Transparency enforcement for a list of URLs' is set to
'Disabled' (Automated) .............................................................................................................. 43
1.13 (L1) Ensure 'Disable saving browser history' is set to 'Disabled' (Automated) ................. 45
1.14 (L1) Ensure 'DNS interception checks enabled' is set to 'Enabled' (Automated) ............. 47
1.15 (L1) Ensure 'Enable component updates in Google Chrome' is set to 'Enabled'
(Automated) ............................................................................................................................... 49
1.16 (L1) Ensure 'Enable globally scoped HTTP auth cache' is set to 'Disabled' (Automated) 51
1.17 (L1) Ensure 'Enable online OCSP/CRL checks' is set to 'Disabled' (Automated) ............ 53
1.18 (L1) Ensure 'Enable security warnings for command-line flags' is set to 'Enabled'
(Automated) ............................................................................................................................... 55
1.19 (L1) Ensure 'Enable third party software injection blocking' is set to 'Enabled' (Automated)
................................................................................................................................................... 57
1.20 (L1) Ensure 'Enables managed extensions to use the Enterprise Hardware Platform API'
is set to 'Disabled' (Automated) ................................................................................................. 59
1.21 (L1) Ensure 'Ephemeral profile' is set to 'Disabled' (Automated) ...................................... 61
1.22 (L1) Ensure 'Import autofill form data from default browser on first run' is set to 'Disabled'
(Automated) ............................................................................................................................... 63
1.23 (L1) Ensure 'Import of homepage from default browser on first run' is set to 'Disabled'
(Automated) ............................................................................................................................... 65
1.24 (L1) Ensure 'Import search engines from default browser on first run' is set to 'Disabled'
(Automated) ............................................................................................................................... 67
1.25 (L1) Ensure 'List of names that will bypass the HSTS policy check' is set to 'Disabled'
(Automated) ............................................................................................................................... 69
1.26 (L1) Ensure 'Origins or hostname patterns for which restrictions on insecure origins
should not apply' is set to 'Disabled' (Automated) ..................................................................... 71
1.27 (L1) Ensure 'Suppress lookalike domain warnings on domains' is set to 'Disabled'
(Automated) ............................................................................................................................... 73
1.28 (L1) Ensure 'Suppress the unsupported OS warning' is set to 'Disabled' (Automated) .... 75
1.29 (L1) Ensure 'URLs for which local IPs are exposed in WebRTC ICE candidates' is set to
'Disabled' (Automated) .............................................................................................................. 77
2 Attack Surface Reduction .................................................................................................... 79
2.1 Update settings (Google section of GPO).................................................................................... 80
2.1.1 (L1) Ensure 'Update policy override' is set to 'Enabled' with 'Always allow updates
(recommended)' or 'Automatic silent updates' specified (Automated) ...................................... 81
2.1.2 (L1) Ensure 'Auto-update check period override' is set to any value except '0'
(Automated) ............................................................................................................................... 83
2.2 Content settings ............................................................................................................................. 84
2.2.1 (L1) Ensure 'Control use of insecure content exceptions' is set to 'Enabled: Do not allow
any site to load mixed content' (Automated) ............................................................................. 85
Page 3
2.2.2 (L2) Ensure 'Control use of the Web Bluetooth API' is set to 'Enabled: Do not allow any
site to request access to Bluetooth devices via the Web Bluetooth API' (Automated) ............. 87
2.2.3 (L2) Ensure 'Control use of the WebUSB API' is set to 'Enabled: Do not allow any site to
request access to USB devices via the WebUSB API' (Automated) ........................................ 89
2.2.4 (L2) Ensure 'Default notification setting' is set to 'Enabled: Do not allow any site to show
desktop notifications' (Automated) ............................................................................................ 91
2.2.5 (L1) Ensure 'Allow local file access to file:// URLs on these sites in the PDF Viewer' Is
Disabled (Automated) ................................................................................................................ 93
2.3 Extensions ....................................................................................................................................... 95
2.3.1 (L1) Ensure 'Blocks external extensions from being installed' is set to 'Enabled'
(Automated) ............................................................................................................................... 96
2.3.2 (L1) Ensure 'Configure allowed app/extension types' is set to 'Enabled: extension,
hosted_app, platform_app, theme' (Automated) ....................................................................... 98
2.3.3 (L1) Ensure 'Configure extension installation blocklist' is set to 'Enabled: *' (Automated)
.................................................................................................................................................100
2.3.4 (L2) Ensure 'Default third-party storage partitioning setting' Is Enabled and Blocked
(Automated) .............................................................................................................................102
2.3.5 (L1) Ensure 'Block third-party storage partitioning for these origins' Is Configured
(Manual) ...................................................................................................................................104
2.3.6 (L2) Ensure 'Control Manifest v2 extension availability' Is Set to Forced Only
(Automated) .............................................................................................................................106
2.3.7 (L1) Ensure 'Control availability of extensions unpublished on the Chrome Web Store' Is
Disabled (Automated) ..............................................................................................................108
2.4 HTTP authentication .....................................................................................................................110
2.4.1 (L2) Ensure 'Supported authentication schemes' is set to 'Enabled: ntlm, negotiate'
(Automated) .............................................................................................................................111
2.5 Native Messaging .........................................................................................................................113
2.5.1 (L2) Ensure 'Configure native messaging blocklist' is set to 'Enabled: *' (Automated) ..114
2.6 Password manager .......................................................................................................................116
2.6.1 (L1) Ensure 'Enable saving passwords to the password manager' is Explicitly Configured
(Manual) ...................................................................................................................................117
2.7 Printing ..........................................................................................................................................119
2.7.1 (L1) Ensure 'Enable Google Cloud Print Proxy' is set to 'Disabled' (Automated) ..........120
2.8 Remote access (Chrome Remote Desktop) ...............................................................................122
2.8.1 Ensure 'Allow remote access connections to this machine' is set to 'Disabled' (Manual)
.................................................................................................................................................123
2.8.2 (L1) Ensure 'Allow remote users to interact with elevated windows in remote assistance
sessions' is set to 'Disabled' (Automated) ...............................................................................125
2.8.3 (L1) Ensure 'Configure the required domain names for remote access clients' is set to
'Enabled' with a domain defined (Manual)...............................................................................127
2.8.4 (L1) Ensure 'Enable curtaining of remote access hosts' is set to 'Disabled' (Automated)
.................................................................................................................................................129
2.8.5 (L1) Ensure 'Enable firewall traversal from remote access host' is set to 'Disabled'
(Automated) .............................................................................................................................131
2.8.6 (L1) Ensure 'Enable or disable PIN-less authentication for remote access hosts' is set to
'Disabled' (Automated) ............................................................................................................133
2.8.7 (L1) Ensure 'Enable the use of relay servers by the remote access host' is set to
'Disabled'. (Automated) ...........................................................................................................135
2.9 First-Party Sets Settings ..............................................................................................................137
2.9.1 (L1) Ensure 'Enable First-Party Sets' Is Disabled (Manual) ...........................................138
2.10 Microsoft Active Directory Management Settings ..................................................................140
2.10.1 (L1) Ensure 'Allow automatic sign-in to Microsoft cloud identity providers' Is Enabled
(Manual) ...................................................................................................................................141
2.11 (L1) Ensure 'Allow download restrictions' is set to 'Enabled: Block malicious downloads'
(Automated) .............................................................................................................................143
Page 4
2.12 (L2) Ensure 'Allow proceeding from the SSL warning page' is set to 'Disabled'
(Automated) .............................................................................................................................145
2.13 (L1) Ensure 'Disable proceeding from the Safe Browsing warning page' is set to 'Enabled'
(Automated) .............................................................................................................................147
2.14 (L1) Ensure 'Require Site Isolation for every site' is set to 'Enabled' (Automated) .........149
2.15 (L2) Ensure 'Force Google SafeSearch' is set to 'Enabled' (Automated) .......................151
2.16 (L1) Ensure 'Notify a user that a browser relaunch or device restart is recommended or
required' is set to 'Enabled: Show a recurring prompt to the user indication that a relaunch is
required' (Automated) ..............................................................................................................153
2.17 (L1) Ensure 'Proxy settings' is set to 'Enabled' and does not contain "ProxyMode":
"auto_detect" (Automated) ......................................................................................................155
2.18 (L2) Ensure 'Require online OCSP/CRL checks for local trust anchors' is set to 'Enabled'
(Automated) .............................................................................................................................157
2.19 (L1) Ensure 'Set the time period for update notifications' is set to 'Enabled: 86400000'
(Automated) .............................................................................................................................159
2.20 (L1) Ensure 'Allow Web Authentication requests on sites with broken TLS certificates' Is
Disabled (Automated) ..............................................................................................................161
2.21 (L1) Ensure 'Allow reporting of domain reliability related data' Is Disabled (Automated)
.................................................................................................................................................163
2.22 (L1) Ensure 'Enable TLS Encrypted ClientHello' Is Enabled (Automated) .....................165
2.23 (L2) Ensure 'Determines whether the built-in certificate verifier will enforce constraints
encoded into trust anchors loaded from the platform trust store' Is Enabled (Automated) .....167
2.24 (L1) Ensure 'Keep browsing data when creating enterprise profile by default' Is Enabled
(Automated) .............................................................................................................................169
2.25 (L1) Ensure 'Allow file or directory picker APIs to be called without prior user gesture' Is
Disabled (Automated) ..............................................................................................................171
2.26 (L1) Ensure 'Enable Google Search Side Panel' Is Disabled (Automated) ....................173
2.27 (L1) Ensure 'Http Allowlist' Is Properly Configured (Manual) ..........................................175
2.28 (L1) Ensure 'Enable automatic HTTPS upgrades' Is Enabled (Automated) ...................177
2.29 (L1) Ensure 'Insecure Hashes in TLS Handshakes Enabled' Is Disabled (Automated) .179
2.30 (L1) Ensure 'Enable Renderer App Container' Is Enabled (Automated).........................181
2.31 (L1) Ensure 'Enable strict MIME type checking for worker scripts' Is Enabled (Automated)
.................................................................................................................................................183
2.32 Ensure 'Allow remote debugging' is set to 'Disabled' (Automated) .................................185
3 Privacy .................................................................................................................................. 187
3.1 Content settings ...........................................................................................................................188
3.1.1 (L2) Ensure 'Default cookies setting' is set to 'Enabled: Keep cookies for the duration of
the session' (Automated) .........................................................................................................189
3.1.2 (L1) Ensure 'Default geolocation setting' is set to 'Enabled: Do not allow any site to track
the users' physical location' (Automated) ................................................................................191
3.2 Google Cast ...................................................................................................................................193
3.2.1 (L1) Ensure 'Enable Google Cast' is set to 'Disabled' (Automated) ...............................194
3.3 (L1) Ensure 'Allow websites to query for available payment methods' is set to 'Disabled'
(Automated) .............................................................................................................................196
3.4 (L1) Ensure 'Block third party cookies' is set to 'Enabled' (Automated) ............................198
3.5 (L2) Ensure 'Browser sign in settings' is set to 'Enabled: Disabled browser sign-in'
(Automated) .............................................................................................................................200
3.6 (L1) Ensure 'Control how Chrome Cleanup reports data to Google' is set to 'Disabled'
(Automated) .............................................................................................................................202
3.7 (L1) Ensure 'Disable synchronization of data with Google' is set to 'Enabled' (Automated)
.................................................................................................................................................204
3.8 (L1) Ensure 'Enable alternate error pages' is set to 'Disabled' (Automated) ....................206
3.9 (L1) Ensure 'Enable deleting browser and download history' is set to 'Disabled'
(Automated) .............................................................................................................................208
Page 5
3.10 (L1) Ensure 'Enable predict network actions` is set to 'Enabled: Do not predict actions on
any network connection' (Automated) .....................................................................................210
3.11 (L1) Ensure 'Enable or disable spell checking web service' is set to 'Disabled'
(Automated) .............................................................................................................................212
3.12 (L1) Ensure 'Enable reporting of usage and crash-related data' is set to 'Disabled'
(Automated) .............................................................................................................................214
3.13 (L1) Ensure 'Enable Safe Browsing for trusted sources' is set to 'Disabled' (Automated)
.................................................................................................................................................216
3.14 (L2) Ensure 'Enable search suggestions' is set to 'Disabled' (Automated) .....................218
3.15 (L2) Ensure 'Enable Translate' is set to 'Disabled' (Automated) .....................................220
3.16 (L1) Ensure 'Enable URL-keyed anonymized data collection' is set to 'Disabled'
(Automated) .............................................................................................................................222
4 Data Loss Prevention.......................................................................................................... 224
4.1 Allow or deny screen capture .....................................................................................................225
4.1.1 (L2) Ensure 'Allow or deny screen capture' is set to 'Disabled' (Automated).................226
4.2 Content settings ...........................................................................................................................228
4.2.1 (L2) Ensure 'Control use of the Serial API' is set to 'Enabled: Do not allow any site to
request access to serial ports via the Serial API' (Automated) ...............................................229
4.2.2 (L2) Ensure 'Default Sensors Setting' is set to 'Enabled: Do not allow any site to access
sensors' (Automated)...............................................................................................................231
4.2.3 (L1) Ensure 'Allow clipboard for these sites' Is Configured (Manual) ............................233
4.2.4 (L1) Ensure 'Block clipboard on these sites' Is Configured (Manual) ............................235
4.2.5 (L1) Ensure 'Default clipboard setting' Is 'Enabled' to 'Deny Permissions' (Automated)
.................................................................................................................................................237
4.2.6 (L2) Ensure 'Default Window Management permissions setting' Is 'Enabled' to 'Deny
Permission' (Automated) .........................................................................................................239
4.2.7 (L2) Ensure 'Allow Window Management permission on these sites' Is Configured
(Manual) ...................................................................................................................................241
4.2.8 (L2) Ensure 'Block Window Management permission on these sites' Is Configured
(Manual) ...................................................................................................................................243
4.3 (L2) Ensure 'Allow invocation of file selection dialogs' is set to 'Disabled' (Automated) ...245
4.4 (L2) Ensure 'Allow or deny audio capture' is set to 'Disabled' (Automated)......................247
4.5 (L2) Ensure 'Allow or deny video capture' is set to 'Disabled' (Automated) ......................249
4.6 (L1) Ensure 'Allow user feedback' is set to 'Disabled' (Automated) ..................................251
4.7 (L2) Ensure 'Controls the mode of DNS-over-HTTPS' is set to 'Enabled: DNS-over-HTTPS
without insecure fallback' (Automated) ....................................................................................253
4.8 (L2) Ensure 'Enable AutoFill for addresses' is set to 'Disabled' (Automated) ...................255
4.9 (L1) Ensure 'Enable AutoFill for credit cards' is set to 'Disabled' (Automated) .................257
4.10 (L1) Ensure 'Import saved passwords from default browser on first run' is set to 'Disabled'
(Automated) .............................................................................................................................259
4.11 (L1) Ensure 'List of types that should be excluded from synchronization' is set to
'Enabled: passwords' (Automated) ..........................................................................................261
4.12 (L2) Ensure 'Allow or deny screen capture' is set to 'Disabled' (Automated)..................263
5 Forensics (Post Incident) ................................................................................................... 265
5.1 (L2) Ensure 'Enable guest mode in browser' is set to 'Disabled' (Automated) .................266
5.2 (L2) Ensure 'Incognito mode availability' is set to 'Enabled: Incognito mode disabled'
(Automated) .............................................................................................................................268
5.3 (L1) Ensure 'Set disk cache size, in bytes' is set to 'Enabled: 250609664' (Automated) .270
Appendix: Summary Table .......................................................................................... 272
Appendix: CIS Controls v7 IG 1 Mapped Recommendations ................................. 283
Appendix: CIS Controls v7 IG 2 Mapped Recommendations ................................. 285
Appendix: CIS Controls v7 IG 3 Mapped Recommendations ................................. 290
Page 6
Appendix: CIS Controls v7 Unmapped Recommendations .................................... 296
Appendix: CIS Controls v8 IG 1 Mapped Recommendations ................................. 297
Appendix: CIS Controls v8 IG 2 Mapped Recommendations ................................. 301
Appendix: CIS Controls v8 IG 3 Mapped Recommendations ................................. 307
Appendix: CIS Controls v8 Unmapped Recommendations .................................... 313
Appendix: Change History .......................................................................................... 314
Page 7
Overview
All CIS Benchmarks focus on technical configuration settings used to maintain and/or
increase the security of the addressed technology, and they should be used in
conjunction with other essential cyber hygiene tasks like:
• Monitoring the base operating system for vulnerabilities and quickly updating with
the latest security patches
• Monitoring applications and libraries for vulnerabilities and quickly updating with
the latest security patches
In the end, the CIS Benchmarks are designed as a key component of a comprehensive
cybersecurity program.
•
Chrome
•
Google Update
Recommendation Order
This Benchmark has high-level sections based on various security related concerns
(Enforced Defaults, Privacy, etc.). Within each of these major sections the
recommendations are ordered alphabetically, and are grouped in the relevant sub-
section where the setting is located in the Google Chrome GPO as shown in the
Microsoft Group Policy Management Editor when the GPO is sorted alphabetically by
setting (Clicking the Setting column in the Microsoft Group Policy Management Editor
right pane view).
Page 8
Enforced Defaults
Many of the settings specified in this Benchmark are also the default settings for the
browser. These are specified for the following reasons:
1. The default (Unset) setting may have the same effect as what is prescribed, but
they allow the user to change these settings at any time. Actually configuring the
browser setting to the prescribed value will prevent the user from changing it.
2. Many organizations want the ability to scan systems for Benchmark compliance
and configuration drift using CIS (CIS-CAT) or CIS certified third party tools (CIS
Vendor Partners). Having these settings specified in the Benchmark allows for
this.
This benchmark is designed to use Windows Group Policy on a domain joined system
to set the appropriate Windows registry values that pertain to Google Chrome. In the
end, these settings change the internal "policy" configuration of Google Chrome. These
"Policy" settings can be viewed in Google Chrome directly by typing chrome://policy/
directly into the Google Chrome address box.
Intended Audience
The Google Chrome CIS Benchmarks are written for Microsoft Windows Active
Directory domain-joined systems using Group Policy, not standalone/workgroup
systems. Adjustments/tailoring to some recommendations will be needed to maintain
functionality if attempting to implement CIS hardening on standalone systems.
Page 9
Consensus Guidance
This CIS Benchmark was created using a consensus review process comprised of a
global community of subject matter experts. The process combines real world
experience with data-based information to create technology specific guidance to assist
users to secure their environments. Consensus participants provide perspective from a
diverse set of backgrounds including consulting, software development, audit and
compliance, security research, operations, government, and legal.
Each CIS Benchmark undergoes two phases of consensus review. The first phase
occurs during initial Benchmark development. During this phase, subject matter experts
convene to discuss, create, and test working drafts of the Benchmark. This discussion
occurs until consensus has been reached on Benchmark recommendations. The
second phase begins after the Benchmark has been published. During this phase, all
feedback provided by the Internet community is reviewed by the consensus team for
incorporation in the Benchmark. If you are interested in participating in the consensus
process, please visit https://workbench.cisecurity.org/.
Page 10
Typographical Conventions
The following typographical conventions are used throughout this guide:
Convention Meaning
Page 11
Recommendation Definitions
The following defines the various components included in a CIS recommendation as
applicable. If any of the components are not applicable it will be noted or the
component will not be included in the recommendation.
Title
Concise description for the recommendation's intended configuration.
Assessment Status
An assessment status is included for every recommendation. The assessment status
indicates whether the given recommendation can be automated or requires manual
steps to implement. Both statuses are equally important and are determined and
supported as defined below:
Automated
Represents recommendations for which assessment of a technical control can be fully
automated and validated to a pass/fail state. Recommendations will include the
necessary information to implement automation.
Manual
Represents recommendations for which assessment of a technical control cannot be
fully automated and requires all or some manual steps to validate that the configured
state is set as expected. The expected state can vary depending on the environment.
Profile
A collection of recommendations for securing a technology or a supporting platform.
Most benchmarks include at least a Level 1 and Level 2 Profile. Level 2 extends Level 1
recommendations and is not a standalone profile. The Profile Definitions section in the
benchmark provides the definitions as they pertain to the recommendations included for
the technology.
Description
Detailed information pertaining to the setting with which the recommendation is
concerned. In some cases, the description will include the recommended value.
Rationale Statement
Detailed reasoning for the recommendation to provide the user a clear and concise
understanding on the importance of the recommendation.
Page 12
Impact Statement
Any security, functionality, or operational consequences that can result from following
the recommendation.
Audit Procedure
Systematic instructions for determining if the target system complies with the
recommendation.
Remediation Procedure
Systematic instructions for applying recommendations to the target system to bring it
into compliance according to the recommendation.
Default Value
Default value for the given setting in this recommendation, if known. If not known, either
not configured or not defined will be applied.
References
Additional documentation relative to the recommendation.
Additional Information
Supplementary information that does not correspond to any other field but may be
useful to the user.
Page 13
Profile Definitions
The following configuration profiles are defined by this Benchmark:
This profile extends the "Level 1 (L1)" profile. Items in this profile exhibit one or
more of the following characteristics:
o are intended for environments or use cases where security is more critical
than manageability and usability;
o may negatively inhibit the utility or performance of the technology; and
o limit the ability of remote management/access.
Note: Implementation of Level 2 requires that both Level 1 and Level 2 settings
are applied.
Page 14
Acknowledgements
This Benchmark exemplifies the great things a community of users, vendors, and
subject matter experts can accomplish through consensus collaboration. The CIS
community thanks the entire consensus team with special recognition to the following
individuals who contributed greatly to the creation of this guide:
Contributor
Jordan Rakoske
Brian Howson
Johannes Goerlich , Siemens AG
Fletcher Oliver
Adrian Clark
Joe Goerlich , Siemens AG
Patrick Stoeckle , Siemens AG
John Mahlman
Joseph Musso
Loren Hudziak
Daniel Christopher
Kari Byrd
Editor
Phil White , Center for Internet Security, New York
Edward Byrd , Center for Internet Security, New York
Josh Franklin
Page 15
Recommendations
1 Enforced Defaults
This section contains recommendations that are configured by default when you install
Google Chrome. Enforcing these settings at an enterprise level can prevent these
settings from changing to a less secure option.
Page 16
1.1 HTTP authentication
Page 17
1.1.1 (L1) Ensure 'Cross-origin HTTP Authentication prompts' is
set to 'Disabled' (Automated)
Profile Applicability:
Description:
This setting controls whether third-party sub-content can open a HTTP Basic Auth
dialog and is typically disabled.
The recommended state for this setting is: Disabled (0)
Rationale:
This setting is typically disabled to help combat phishing attempts.
Impact:
None - This is the default behavior.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 0:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:AllowCrossOriginAuthPrompt
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Disabled:
Computer Configuration\Policies\Administrative Templates\Google\Google
Chrome\HTTP authentication\Cross-origin HTTP Authentication prompts
Default Value:
Unset (Same as Disabled, but user can change)
References:
1. https://chromeenterprise.google/policies/#AllowCrossOriginAuthPrompt
Page 18
CIS Controls:
Page 19
1.2 Safe Browsing settings
Page 20
1.2.1 (L1) Ensure 'Configure the list of domains on which Safe
Browsing will not trigger warnings' is set to 'Disabled' (Automated)
Profile Applicability:
Description:
The setting determines the functionality of Safe Browsing.
Rationale:
Google Safe Browsing will help protect users from a variety of malicious and fraudulent
sites, or download dangerous files.
Impact:
None - This is the default behavior.
NOTE: The only real impact is possible user annoyance if they are going to a legitimate
site that is falsely considered fraudulent (a rare occurrence). This can be handled by
adding the site to the allowlist and/or notifying Google of the false finding.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This registry path will not exist if it is set to Disabled:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\SafeBrowsingAllowlistDomai
ns\
Page 21
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Disabled:
Computer Configuration\Policies\Administrative Templates\Google\Google
Chrome\Safe Browsing settings\Configure the list of domains on which Safe
Browsing will not trigger warnings.
Default Value:
1. https://chromeenterprise.google/policies/#SafeBrowsingAllowlistDomains
2. https://safebrowsing.google.com/
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 22
1.2.2 (L1) Ensure 'Safe Browsing Protection Level' is set to
'Enabled: Safe Browsing is active in the standard mode.' or higher
(Manual)
Profile Applicability:
Description:
Control whether Google Chrome's Safe Browsing feature is enabled and the mode in
which it operates. If you set this setting as mandatory, users cannot change or override
the Safe Browsing setting in Google Chrome.
If this setting is left not set, Safe Browsing will operate in Standard Protection mode but
users can change this setting.
The recommended state for this setting is: Safe Browsing is active in the standard
mode. (1) or higher
Rationale:
Google Safe Browsing will help protect users from a variety of malicious and fraudulent
sites, or from downloading dangerous files.
NOTE: Google recommends using Enhanced Safe Browsing Mode (2). Turning on
Enhanced Safe Browsing will substantially increase protection from dangerous websites
and downloads, but will share more data with Google.
For more details, please refer to the items in the References section below.
Impact:
None - This is the default behavior (Standard Protection).
Page 23
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 1 or 2:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:SafeBrowsingProtectionLeve
l
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled: Safe Browsing is active in the standard mode.:
Computer Configuration\Policies\Administrative Templates\Google\Google
Chrome\Safe Browsing settings\Safe Browsing Protection Level
Default Value:
Unset (Same as Standard Protection, but user can change)
References:
1. https://chromeenterprise.google/policies/#SafeBrowsingProtectionLevel
2. https://security.googleblog.com/2020/05/enhanced-safe-browsing-protection-
now.html
3. https://security.googleblog.com/2021/06/new-protections-for-enhanced-safe.html
4. https://developers.google.com/safe-
browsing?_ga=2.65351149.274800631.1631808382-2031399475.1630502681
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 24
1.3 (L1) Ensure 'Allow Google Cast to connect to Cast devices on
all IP addresses' is set to 'Disabled' (Automated)
Profile Applicability:
Description:
This setting controls whether Google Cast is able to connect to all IP Addresses or only
private IP Addresses as defined in RFC1918 (IPv4) and RFC4193 (IPv6). Note that if
the EnabledMediaRouter setting is set to Disabled there is no positive or negative effect
for this setting.
The recommended state for this setting is: Disabled (0)
Rationale:
Allowing Google Cast to connect to public IP addresses could allow media and other
potentially sensitive data to be exposed to the public. Disabling this setting will ensure
that Google Cast is only able to connect to private (ie: internal) IP addresses.
Impact:
None - This is the default behavior.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 0:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:MediaRouterCastAllowAllIPs
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Disabled:
Computer Configuration\Policies\Administrative Templates\Google\Google
Chrome\Google Cast\Allow Google Cast to connect to Cast devices on all IP
addresses.
Default Value:
Unset (Same as Disabled, but user can change)
References:
1. https://chromeenterprise.google/policies/#MediaRouterCastAllowAllIPs
Page 25
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 26
1.4 (L1) Ensure 'Allow queries to a Google time service' is set to
'Enabled' (Automated)
Profile Applicability:
Description:
This setting controls whether Google Chrome can send queries to a Google time
service for accurate timestamps. This check helps in validation of certificates.
The recommended state for this setting is: Enabled(1)
Rationale:
Google Chrome uses a network time service to randomly track times from a trusted
external service. This allows Google Chrome the ability for verification of a certificate's
validity and is important for certificate validation.
Impact:
None - This is the default behavior.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 1:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:BrowserNetworkTimeQueriesE
nabled
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled:
Computer Configuration\Policies\Administrative Templates\Google\Google
Chrome\Allow queries to a Google time service
Default Value:
1. https://chromeenterprise.google/policies/#BrowserNetworkTimeQueriesEnabled
Page 27
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 28
1.5 (L1) Ensure 'Allow the audio sandbox to run' is set to
'Enabled' (Automated)
Profile Applicability:
Description:
This setting controls whether audio processes in Google Chrome run in a sandbox.
NOTE: Security software setups within your environment might interfere with the
sandbox.
The recommended state for this setting is: Enabled (1)
Rationale:
Having audio processes run in a sandbox ensures that if a website misuses audio
processes that data may not be manipulated or exfiltrated from the system.
Impact:
None - This is the default behavior.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 1:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:AudioSandboxEnabled
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled:
Computer Configuration\Policies\Administrative Templates\Google\Google
Chrome\Allow the audio sandbox to run
Default Value:
Unset (Same as Enabled, but user can change)
References:
1. https://chromeenterprise.google/policies/#AudioSandboxEnabled
Page 29
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 30
1.6 (L1) Ensure 'Ask where to save each file before downloading'
is set to 'Enabled' (Automated)
Profile Applicability:
Description:
Google Chrome offers to download files automatically to the default download directory
without prompting.
If this setting is enabled, users are always asked where to save each file before
downloading.
The recommended state for this setting is: Enabled (1)
Rationale:
Users shall be prevented from the drive-by-downloads threat.
Impact:
None - This is the default behavior.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 1:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:PromptForDownloadLocation
Remediation:
To establish the recommended configuration via Group Policy, set the
following UI path to Enabled:
Computer Configuration\Policies\Administrative Templates\Google\Google
Chrome\Ask where to save each file before downloading
Default Value:
Unset (Same as Enabled, but user can change)
References:
1. https://chromeenterprise.google/policies/#PromptForDownloadLocation
2. https://www.ghacks.net/2017/05/18/you-should-disable-automatic-downloads-in-
chrome-right-now/
Page 31
CIS Controls:
Page 32
1.7 (L1) Ensure 'Continue running background apps when Google
Chrome is closed' is set to 'Disabled' (Automated)
Profile Applicability:
Description:
Chrome allows for processes started while the browser is open to remain running once
the browser has been closed. It also allows for background apps and the current
browsing session to remain active after the browser has been closed.
With this setting Disabled, the browser will close its processes and will stop running
background apps.
The recommended state for this setting is: Disabled (0)
Rationale:
If this setting is enabled, vulnerable or malicious plugins, apps and processes can
continue running even after Chrome has closed.
Impact:
None - This is the default behavior.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 0:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:BackgroundModeEnabled
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Disabled:
Computer Configuration\Policies\Administrative Templates\Google\Google
Chrome\Continue running background apps when Google Chrome is closed
Default Value:
1. https://chromeenterprise.google/policies/#BackgroundModeEnabled
Page 33
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 34
1.8 (L2) Ensure 'Control SafeSites adult content filtering' is set to
'Enabled: Filter top level sites (but not embedded iframes) for
adult content' (Automated)
Profile Applicability:
Description:
Google Chrome can use the Google Safe Search API to classify URLs as pornographic
or not.
The recommended state for this setting is: Enabled with a value of Filter top level
sites (but not embedded iframes) for adult content (1)
Rationale:
Allowing search results to present sites that may have malicious content should be
prohibited to help ensure users do not accidentally visit sites that are more prone to
malicious content including spyware, adware, and viruses.
Impact:
Users' search results will be filtered and content such as adult text, videos, and images
will not be shown.
NOTE: Using Googles Safe Search API may leak information which is typed/pasted by
mistake into the omnibox, e.g. passwords, internal webservices, folder structures, etc.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 1:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:SafeSitesFilterBehavior
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled: Do not filter sites for adult content:
Computer Configuration\Policies\Administrative Templates\Google\Google
Chrome\Control SafeSites adult content filtering.
Default Value:
Unset (Same as Enabled with "Do not filter sites for adult content", but user can
change)
Page 35
References:
1. https://chromeenterprise.google/policies/#SafeSitesFilterBehavior
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 36
1.9 (L1) Ensure 'Determine the availability of variations' is set to
'Enable all variations' (Manual)
Profile Applicability:
Description:
Configuring this setting allows specifying which variations are allowed to be applied in
Google Chrome. Variations provide a means for Google to offer modifications to Google
Chrome without shipping a new version of the browser by selectively enabling or
disabling already existing features.
• Enable all variations (0): Allows all variations to be applied to the browser
(Default value).
• Enable variations concerning critical fixes only (1): Allows only variations
considered critical security or stability fixes to be applied to Google Chrome.
• Disable all variations (2): Prevent all variations from being applied to the
browser. Please note that this mode can potentially prevent the Google Chrome
developers from providing critical security fixes in a timely manner and is thus not
recommended.
The recommended state for this setting is: Enable all variations (0)
NOTE: Google strongly believes there is no added security benefit for turning this to
critical fixes as leaving it on increases the stability of the browser. Disabling variations
can also prevent getting critical security updates in a timely manner.
Rationale:
Google strongly recommends leaving this setting at the default (0 = Enable all
variations), so fixes are gradually enabled (or if necessary, rapidly disabled) via the
Chrome Variations framework.
Impact:
None - This is the default behavior.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 0:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:ChromeVariations
Page 37
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled: Enable all variations:
Computer Configuration\Policies\Administrative Templates\Google\Google
Chrome\Determine the availability of variations
Default Value:
Unset (Same as Disabled, but user can change)
References:
1. https://chromeenterprise.google/policies/#ChromeVariations
2. https://support.google.com/chrome/a/answer/9805991?p=Manage_the_Chrome_
variations_framework&_ga=2.161804159.274800631.1631808382-
2031399475.1630502681&visit_id=637674174853642930-2644817764&rd=1
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 38
1.10 (L1) Ensure 'Disable Certificate Transparency enforcement
for a list of Legacy Certificate Authorities' is set to 'Disabled'
(Automated)
Profile Applicability:
Description:
Google Chrome can disable the enforcing of Certificate Transparency requirements for
a list of Legacy Certificate Authorities.
If this setting is disabled, certificates not properly publicly disclosed as required by
Certificate Transparency are untrusted.
The recommended state for this setting is: Disabled (0)
Rationale:
Legacy Certificate Authorities shall follow the Certificate Transparency policy.
Impact:
None - This is the default behavior.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This registry path will not exist if it is set to Disabled:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\CertificateTransparencyEnf
orcementDisabledForLegacyCas\
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Disabled:
Computer Configuration\Policies\Administrative Templates\Google\Google
Chrome\Disable Certificate Transparency enforcement for a list of Legacy
Certificate Authorities
Default Value:
Unset (Same as Disabled, but user can change)
References:
1. https://chromeenterprise.google/policies/#CertificateTransparencyEnforcementDi
sabledForLegacyCas
Page 39
CIS Controls:
Page 40
1.11 (L1) Ensure 'Disable Certificate Transparency enforcement
for a list of subjectPublicKeyInfo hashes' is set to 'Disabled'
(Automated)
Profile Applicability:
Description:
Google Chrome can exclude certificates by their subjectPublicKeyInfo hashes from
enforcing Certificate Transparency requirements. If this setting is disabled, no
certificates are excluded from Certificate Transparency requirements.
The recommended state for this setting is: Disabled (0)
Rationale:
Certificate Transparency requirements shall be enforced for all certificates.
Impact:
None - This is the default behavior.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This registry path will not exist if it is set to Disabled:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\CertificateTransparencyEnf
orcementDisabledForCas
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Disabled:
Computer Configuration\Policies\Administrative Templates\Google\Google
Chrome\Disable Certificate Transparency enforcement for a list of
subjectPublicKeyInfo hashes
Default Value:
Unset (Same as Disabled, but user can change)
References:
1. https://chromeenterprise.google/policies/#CertificateTransparencyEnforcementDi
sabledForCas
Page 41
CIS Controls:
Page 42
1.12 (L1) Ensure 'Disable Certificate Transparency enforcement
for a list of URLs' is set to 'Disabled' (Automated)
Profile Applicability:
Description:
Google Chrome can specify URLs/hostnames for which Certificate Transparency will
not be enforced. If this setting is disabled, no URLs are excluded from Certificate
Transparency requirements.
The recommended state for this setting is: Disabled (0)
Rationale:
Certificates that are required to be disclosed via Certificate Transparency shall be
treated for all URLs as untrusted if they are not disclosed according to the Certificate
Transparency policy.
Impact:
None - This is the default behavior.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This registry path will not exist if it is set to Disabled:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\CertificateTransparencyEnf
orcementDisabledForUrls
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Disabled:
Computer Configuration\Policies\Administrative Templates\Google\Google
Chrome\Disable Certificate Transparency enforcement for a list of URLs
Default Value:
1. https://chromeenterprise.google/policies/#CertificateTransparencyEnforcementDi
sabledForUrls
Page 43
CIS Controls:
Page 44
1.13 (L1) Ensure 'Disable saving browser history' is set to
'Disabled' (Automated)
Profile Applicability:
Description:
Google Chrome is configured to save the browser history.
The recommended state for this setting is: Disabled (0)
NOTE: This setting will preserve browsing history that could contain a user's personal
browsing history. Please make sure that this setting is in compliance with organizational
policies.
Rationale:
Browser history shall be saved as it may contain indicators of compromise.
Impact:
None - This is the default behavior.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 0:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:SavingBrowserHistoryDisabl
ed
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Disabled:
Computer Configuration\Policies\Administrative Templates\Google\Google
Chrome\Disable saving browser history
Default Value:
1. https://chromeenterprise.google/policies/#SavingBrowserHistoryDisabled
Page 45
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 46
1.14 (L1) Ensure 'DNS interception checks enabled' is set to
'Enabled' (Automated)
Profile Applicability:
Description:
This setting determines whether a local switch is configured for DNS interception
checks. These checks attempt to discover if the browser is behind a proxy that redirects
unknown host names.
The recommended state for this setting is: Enabled (1)
NOTE: This detection might not be necessary in an enterprise environment where the
network configuration is known. It can be disabled to avoid additional DNS and HTTP
traffic on startup and each DNS configuration change.
Rationale:
Disabling these checks could potentially allow DNS hijacking and poisoning.
Impact:
None - This is the default behavior.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 1:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:DNSInterceptionChecksEnabl
ed
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled:
Computer Configuration\Policies\Administrative Templates\Google\Google
Chrome\DNS interception checks enabled
Default Value:
Unset (Same as Enabled, but user can change)
References:
1. https://chromeenterprise.google/policies/#DNSInterceptionChecksEnabled
Page 47
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 48
1.15 (L1) Ensure 'Enable component updates in Google Chrome'
is set to 'Enabled' (Automated)
Profile Applicability:
Description:
Google Chrome's Component Updater updates several components of Google Chrome
on a regular basis (applies only to Chrome browser components).
The recommended state for this setting is: Enabled (1)
NOTE: Updates to any component that does not contain executable code, does not
significantly alter the behavior of the browser, or is critical for its security will not be
disabled (E.g. certificate revocation lists and Safe Browsing data is updated regardless
of this setting). FYI chrome://components lists all components, but not if they are
affected by this setting.
NOTE: Google provided the following list of "some of the components" controlled by
this setting:
• Recovery component
• Pnacl
• Floc
• Optimization hints
• SSL error assistant
• CRL set
• Origin trials
• SW reporter
• PKI metadata
Rationale:
Google Chrome Updater shall be used to keep the components bundled to Chrome up-
to-date.
Impact:
Page 49
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 1:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:ComponentUpdatesEnabled
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled:
Computer Configuration\Policies\Administrative Templates\Google\Google
Chrome\Enable component updates in Google Chrome
Default Value:
Unset (Same as Enabled, but user can change)
References:
1. https://chromeenterprise.google/policies/#ComponentUpdatesEnabled
Additional Information:
To check the current components versions, navigate to chrome://components.
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 50
1.16 (L1) Ensure 'Enable globally scoped HTTP auth cache' is set
to 'Disabled' (Automated)
Profile Applicability:
Description:
This setting controls whether HTTP auth credentials may be automatically used in the
context of another web site visited in Google Chrome.
The recommended state for this setting is: Disabled (0)
NOTE: This setting is intended to give enterprises depending on the legacy behavior a
chance to update their login procedures and will be removed in the future.
Rationale:
Allowing HTTP auth credentials to be shared without the user's consent could lead to a
user sharing sensitive information without their knowledge. Enabling this setting could
also lead to some types of cross-site attacks that would allow users to be tracked
across sites without the use of cookies.
Impact:
None - This is the default behavior.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 0:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:GloballyScopeHTTPAuthCache
Enabled
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Disabled:
Computer Configuration\Policies\Administrative Templates\Google\Google
Chrome\Enable globally scoped HTTP auth cache
Default Value:
Unset (Same as Disabled, but user can change)
Page 51
References:
1. https://chromeenterprise.google/policies/#GloballyScopeHTTPAuthCacheEnable
d
CIS Controls:
Page 52
1.17 (L1) Ensure 'Enable online OCSP/CRL checks' is set to
'Disabled' (Automated)
Profile Applicability:
Description:
Google Chrome can reactivate soft-fail, online revocation checks although they can
provide some benefit in most cases.
If this setting is disabled, unsecure online OCSP/CRL checks are no longer performed.
The recommended state for this setting is: Disabled (0)
Rationale:
CRLSets are primarily a means by which Chrome can quickly block certificates in
emergency situations. As a secondary function they can also contain some number of
non-emergency revocations. These latter revocations are obtained by crawling CRLs
published by CAs.
Online (i.e. OCSP and CRL) checks are not, by default, performed by Chrome. The
underlying system certificate library always performs these checks no matter what
Chrome does, so enabling it here is redundant.
An attacker may block OCSP traffic and cause revocation checks to pass in order to
cause usage of soft-fail behavior. Furthermore, the browser may leak what website is
being accessed and who accesses it to CA servers.
Impact:
None - This is the default behavior.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 0:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:EnableOnlineRevocationChec
ks
Page 53
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Disabled:
Computer Configuration\Policies\Administrative Templates\Google\Google
Chrome\Enable online OCSP/CRL checks
Default Value:
Unset (Same as Disabled, but user can change)
References:
1. https://chromeenterprise.google/policies/#EnableOnlineRevocationChecks
2. https://medium.com/@alexeysamoshkin/how-ssl-certificate-revocation-is-broken-
in-practice-af3b63b9cb3
3. https://dev.chromium.org/Home/chromium-security/crlsets
CIS Controls:
Page 54
1.18 (L1) Ensure 'Enable security warnings for command-line
flags' is set to 'Enabled' (Automated)
Profile Applicability:
Description:
This setting prevents Google Chrome from showing security warnings that potentially
dangerous command-line flags are in use at its launch.
The recommended state of this setting is: Enabled (0)
Rationale:
If Google Chrome is being launched with potentially dangerous flags, this information
should be exposed to the user as a warning. If not, the user may be unintentionally
using non-secure settings and be exposed to security flaws.
Impact:
None - This is the default behavior.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 1:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:CommandLineFlagSecurityWar
ningsEnabled
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled:
Computer Configuration\Policies\Administrative Templates\Google\Google
Chrome\Enable security warnings for command-line flags
Default Value:
1. https://chromeenterprise.google/policies/#CommandLineFlagSecurityWarningsE
nabled
Page 55
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 56
1.19 (L1) Ensure 'Enable third party software injection blocking' is
set to 'Enabled' (Automated)
Profile Applicability:
Description:
Google Chrome can prevent third party software from injecting executable code into
Chrome's processes.
The recommended state for this setting is: Enabled (1)
Rationale:
Third party software shall not be able to inject executable code into Chrome's
processes.
Impact:
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled:
Computer Configuration\Policies\Administrative Templates\Google\Google
Chrome\Enable third party software injection blocking
Default Value:
Unset (Same as Enabled, but user can change)
References:
1. https://chromeenterprise.google/policies/#ThirdPartyBlockingEnabled
Page 57
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 58
1.20 (L1) Ensure 'Enables managed extensions to use the
Enterprise Hardware Platform API' is set to 'Disabled'
(Automated)
Profile Applicability:
Description:
This setting allows extensions installed by enterprise policies to be allowed to use the
Enterprise Hardware Platform API.
The recommended state for this setting is: Disabled (0)
Rationale:
It is recommended that this setting is disabled unless otherwise directed by Enterprise
policies.
Impact:
None - This is the default behavior.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 0:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:EnterpriseHardwarePlatform
APIEnabled
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Disabled:
Computer Configuration\Policies\Administrative Templates\Google\Google
Chrome\Enables managed extensions to use the Enterprise Hardware Platform API
Default Value:
Unset (Same as Disabled, but user can change)
References:
1. https://chromeenterprise.google/policies/#EnterpriseHardwarePlatformAPIEnable
d
Page 59
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 60
1.21 (L1) Ensure 'Ephemeral profile' is set to 'Disabled'
(Automated)
Profile Applicability:
Description:
This setting controls whether user profiles are switched to ephemeral mode. In
ephemeral mode, profile data is saved on disk for the length of the session and then the
data is deleted after the session is over. Therefore, no data is saved to the device.
The recommended state for this setting is: Disabled (0)
Rationale:
Allowing use of ephemeral profiles allows a user to use Google Chrome with no data
being logged to the system. Deleting browser data will delete information that may be
important for a computer investigation and investigators such as Computer Forensics
Analysts may not be able to retrieve pertinent information to the investigation.
Impact:
None - This is the default behavior.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 0:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:ForceEphemeralProfiles
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Disabled:
Computer Configuration\Policies\Administrative Templates\Google\Google
Chrome\Ephemeral profile
Default Value:
1. https://chromeenterprise.google/policies/#ForceEphemeralProfiles
Page 61
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 62
1.22 (L1) Ensure 'Import autofill form data from default browser on
first run' is set to 'Disabled' (Automated)
Profile Applicability:
Description:
This setting controls whether users are allowed to import autofill data from other
browsers into Google Chrome.
If you set this setting to Disabled, users will be unable to perform an import of autofill
data during Google Chrome run. This will also prevent users from importing data after
Google Chrome has been set up.
The recommended state for this setting is: Disabled (0)
Rationale:
Allowing autofill data to be imported could potentially allow sensitive data such as
personally identifiable information (PII) from a non-secured source into Google Chrome.
Considering that storage of sensitive data should be handled with care, disabling this
setting is recommended.
Impact:
None - This is the default behavior.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 0:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:ImportAutofillFormData
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Disabled:
Computer Configuration\Policies\Administrative Templates\Google\Google
Chrome\Import autofill form data from default browser on first run
Default Value:
Unset (Same as Disabled, but user can change)
Page 63
References:
1. https://chromeenterprise.google/policies/#ImportAutofillFormData
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 64
1.23 (L1) Ensure 'Import of homepage from default browser on
first run' is set to 'Disabled' (Automated)
Profile Applicability:
Description:
This setting controls whether users are able to import homepage settings from another
browser into Google Chrome as well as whether homepage settings are imported on
first use.
If you set this setting to Disabled users will be unable to perform an import homepage
settings from other browsers into Google Chrome.
The recommended state for this setting is: Disabled (0)
Rationale:
Having the homepage setting automatically imported or allowing users to import this
setting from another browser into Google Chrome allows for the potential of
compromised settings being imported into Google Chrome.
Impact:
None - This is the default behavior.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 0:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:ImportHomepage
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Disabled:
Computer Configuration\Policies\Administrative Templates\Google\Google
Chrome\Import of homepage from default browser on first run
Default Value:
1. https://chromeenterprise.google/policies/#ImportHomepage
Page 65
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 66
1.24 (L1) Ensure 'Import search engines from default browser on
first run' is set to 'Disabled' (Automated)
Profile Applicability:
Description:
This setting controls whether users are able to import search engine settings from
another browser into Google Chrome as well as whether said setting is imported on first
use.
If you set this setting to Disabled users will be unable to perform an import of their
search engine settings from other browsers into Google Chrome.
The recommended state for this setting is: Disabled (0)
Rationale:
Having search engine settings automatically imported or allowing users to import the
settings from another browser into Google Chrome could allow for a malicious search
engine to be set.
Impact:
None - This is the default behavior.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 0:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:ImportSearchEngine
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Disabled:
Computer Configuration\Policies\Administrative Templates\Google\Google
Chrome\Import search engines from default browser on first run
Default Value:
1. https://chromeenterprise.google/policies/#ImportSearchEngine
Page 67
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 68
1.25 (L1) Ensure 'List of names that will bypass the HSTS policy
check' is set to 'Disabled' (Automated)
Profile Applicability:
Description:
This setting allows a list of names to be specified that will be exempt from HTTP Strict
Transport Security (HSTS) policy checks, then potentially upgraded from http:// to
https://.
The recommended state for this setting is: Disabled (0)
Rationale:
Allowing hostnames to be exempt from HSTS checks could allow for protocol
downgrade attacks and cookie hijackings.
Impact:
None - This is the default behavior.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This registry path will not exist if it is set to Disabled:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\HSTSPolicyBypassList
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Disabled:
Computer Configuration\Policies\Administrative Templates\Google\Google
Chrome\List of names that will bypass the HSTS policy check
Default Value:
Unset (Same as Disabled, but user can change)
References:
1. https://chromeenterprise.google/policies/#HSTSPolicyBypassList
Page 69
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 70
1.26 (L1) Ensure 'Origins or hostname patterns for which
restrictions on insecure origins should not apply' is set to
'Disabled' (Automated)
Profile Applicability:
Description:
Google Chrome can use a list of origins (URLs) or hostname patterns (such as
"*.example.com") for which security restrictions on insecure origins will not apply and
are prevented from being labeled as "Not Secure" in the omnibox.
The recommended state for this setting is: Disabled (0)
Rationale:
Insecure contexts shall always be labeled as insecure.
Impact:
None - This is the default behavior.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This registry path will not exist if it is set to Disabled:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Chrome\OverrideSecurityRestrictionsOnIns
ecureOrigin
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Disabled:
Computer Configuration\Policies\Administrative Templates\Google\Google
Chrome\Origins or hostname patterns for which restrictions on
insecure origins should not apply
Note: The UI path defined in the chrome.adml includes a line break between the on and
the insecure. In some views, the line break is correctly rendered, in others not.
Default Value:
Unset (Same as Disabled, but user can change)
Page 71
References:
1. https://chromeenterprise.google/policies/#OverrideSecurityRestrictionsOnInsecur
eOrigin
CIS Controls:
Page 72
1.27 (L1) Ensure 'Suppress lookalike domain warnings on
domains' is set to 'Disabled' (Automated)
Profile Applicability:
Description:
This setting prevents the display of lookalike URL warnings on the sites listed. These
warnings are typically shown on sites that Google Chrome believes might be trying to
spoof another site with which the user is familiar.
• Disabled (0) or set to an empty list: Warnings may appear on any site the user
visits.
• Enabled(1) and set to one or more domains: No lookalike warnings pages will be
shown when the user visits pages on that domain.
Rationale:
Look-alike domains are intentionally misleading to give users the false impression that
they’re interacting with trusted brands, leading to significant reputation damage,
financial losses, and data compromise for established enterprises.
In addition, this technique is commonly used to host phishing sites, and often leads to
account takeover attacks. Users are prompted to enter their credentials on a fake
website, and scammers take control of their online accounts with little effort to engage in
fraudulent activity.
Impact:
None - This is the default behavior.
NOTE: The only real impact is possible user annoyance if they are going to a legitimate
site that is falsely considered fraudulent (a rare occurrence). This can be handled by
adding the site to the allowlist and/or notifying Google of the false finding.
Page 73
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This registry path will not exist if it is set to Disabled:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\LookalikeWarningAllowlistD
omains
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Disabled:
Computer Configuration\Policies\Administrative Templates\Google\Google
Chrome\Suppress lookalike domain warnings on domains
Default Value:
Unset (Same as Disabled, but user can change)
References:
1. https://chromeenterprise.google/policies/#LookalikeWarningAllowlistDomains
2. https://safebrowsing.google.com/
3. https://bugs.chromium.org/p/chromium/issues/entry?template=Safety+Tips+Appe
als
4. https://krebsonsecurity.com/2018/03/look-alike-domains-and-visual-confusion/
5. https://www.phishlabs.com/blog/the-anatomy-of-a-look-alike-domain-attack/
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 74
1.28 (L1) Ensure 'Suppress the unsupported OS warning' is set to
'Disabled' (Automated)
Profile Applicability:
Description:
Google Chrome will show a warning that appears when Google Chrome is running on a
computer or operating system that is no longer supported.
The recommended state for this setting is: Disabled (0)
Rationale:
The user shall be informed if the used software is no longer supported.
Impact:
None - This is the default behavior.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 0:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:SuppressUnsupportedOSWarni
ng
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Disabled:
Computer Configuration\Polices\Administrative Templates\Google\Google
Chrome\Suppress the unsupported OS warning
Default Value:
Unset (Same as Disabled, but user can change)
References:
1. https://chromeenterprise.google/policies/#SuppressUnsupportedOSWarning
Page 75
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 76
1.29 (L1) Ensure 'URLs for which local IPs are exposed in
WebRTC ICE candidates' is set to 'Disabled' (Automated)
Profile Applicability:
Description:
This setting specifies a list of URLs or patterns for which local IP addresses will be
exposed by WebRTC.
The recommended state for this setting is: Disabled (0)
NOTE: This setting, if Enabled, weakens the protection of local IPs if needed by
administrators.
Rationale:
Enabling this setting and allowing exposure of IP addresses can allow an attacker to
gather information about the internal network that could potentially be utilized to breach
and traverse a network.
Impact:
None - This is the default behavior.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting will have no registry value (the key will not exist) if
it is set to Disabled:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\WebRtcLocalIpsAllowedUrls
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Disabled:
Computer Configuration\Policies\Administrative Templates\Google\Google
Chrome\URLs for which local IPs are exposed in WebRTC ICE candidates
Default Value:
1. https://chromeenterprise.google/policies/#WebRtcLocalIpsAllowedUrls
Page 77
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 78
2 Attack Surface Reduction
This section contains recommendations that help reduce the overall attack surface.
Organizations should review these settings and any potential impacts to ensure they
make sense within the environment since they restrict some browser functionality.
Page 79
2.1 Update settings (Google section of GPO)
These setting are not in the normal \Google\Google Chrome\ section of the GPO.
Page 80
2.1.1 (L1) Ensure 'Update policy override' is set to 'Enabled' with
'Always allow updates (recommended)' or 'Automatic silent
updates' specified (Automated)
Profile Applicability:
Description:
Google Update manages installation of available Google Chrome updates from Google.
This setting allows users to define whether updates are to be applied automatically.
Depending on the business scenario, updates shall be applied periodically or also if the
user seeks for updates.
Disabled (0): Google Update handles available updates as specified by "Update policy
override default".
The recommended state for this setting is: Enabled with a value of Always allow
updates (1) or Automatic silent updates (3)
NOTE: This policy is available only on Windows instances that are joined to a
Microsoft® Active Directory® domain.
Rationale:
Software updates shall be applied as soon as they are available since they may include
latest security patches.
Impact:
Latest updates are automatically applied at least periodically.
Page 81
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 1 or 3:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Update:Update{8A69D345-D564-463C-
AFF1-A69D9E530F96}
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled: Always allow updates (recommended):
Computer Configuration\Polices\Administrative Templates\Google\Google
Update\Applications\Google Chrome\Update policy override
Default Value:
Inherit the value from 'Update policy override default'.
References:
1. https://admx.help/?Category=GoogleUpdate&Policy=Google.Policies.Update::Pol
_UpdatePolicyGoogleChrome
2. https://admx.help/?Category=ChromeEnterprise&Policy=Google.Policies.Update:
:Pol_DefaultUpdatePolicy
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 82
2.1.2 (L1) Ensure 'Auto-update check period override' is set to
any value except '0' (Automated)
Profile Applicability:
Description:
This policy setting configures the minimum number of minutes between automatic
update checks.
The recommended state for this setting is: any value except 0.
Rationale:
Automatic updates can help ensure that the computers in the environment will always
have the most recent critical updates and can decrease the amount of time the system
will remain vulnerable between updates and patches.
Impact:
If using a third-party for patching, an exception to this recommendation will be needed.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to any value except 0.
HKEY_LOCAL_MACHINE\Software\Policies\Google\Update:AutoUpdateCheckPeriodMinut
es
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to any value except 0:
Computer Configuration\Policies\Administrative Templates\Google\Google\Google
Update\Preferences\Auto-update check period override
Default Value:
Page 83
2.2 Content settings
Page 84
2.2.1 (L1) Ensure 'Control use of insecure content exceptions' is
set to 'Enabled: Do not allow any site to load mixed content'
(Automated)
Profile Applicability:
Description:
Setting controls whether users can add exceptions to allow mixed content for specific
sites.
The recommended state for this setting is: Enabled with the value of Do not allow any
site to load mixed content (2)
NOTE: This policy can be overridden for specific URL patterns using the
InsecureContentAllowedForUrls and InsecureContentBlockedForUrls policies.
Rationale:
Allowing mixed (secure / insecure) content from a site can lead to malicious content
being loaded. Mixed content occurs if the initial request is secure over HTTPS, but
HTTPS and HTTP content is subsequently loaded to display the web page. HTTPS
content is secure. HTTP content is insecure.
Impact:
Users will not be able to mix content.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 2:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:DefaultInsecureContentSett
ing
Page 85
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled: Do not allow any site to load mixed content:
Computer Configuration\Polices\Administrative Templates\Google\Google
Chrome\Content Settings\Control use of insecure content exceptions
Default Value:
Unset (Same as Enabled: Allow users to add exceptions to allow mixed content, but
user can change)
References:
1. https://chromeenterprise.google/policies/#DefaultInsecureContentSetting
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 86
2.2.2 (L2) Ensure 'Control use of the Web Bluetooth API' is set to
'Enabled: Do not allow any site to request access to Bluetooth
devices via the Web Bluetooth API' (Automated)
Profile Applicability:
Description:
Google Chrome has an API which allows the access to nearby Bluetooth devices from
the browser with users consent.
• Do not allow any site to request access to Bluetooth devices via the
Web Bluetooth API (2)
• Allow sites to ask the user to grant access to a nearby Bluetooth
device (3)
The recommended state for this setting is: Enabled with a value of Do not allow any
site to request access to Bluetooth devices via the Web Bluetooth API (2)
Rationale:
A malicious website could exploit a vulnerable Bluetooth device.
Impact:
If this setting is configured, websites can no longer access nearby Bluetooth devices via
the API (this includes web cameras, headphones, and other Bluetooth devices) and the
user will never be asked.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 2:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:DefaultWebBluetoothGuardSe
tting
Page 87
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled: Do not allow any site to request access to Bluetooth devices via
the Web Bluetooth API:
Default Value:
Unset (Same as Enabled: Allow sites to ask the user to grant access to a nearby
Bluetooth device, but user can change)
References:
1. https://chromeenterprise.google/policies/#DefaultWebBluetoothGuardSetting
2. https://webbluetoothcg.github.io/web-bluetooth/use-cases.html#security_privacy
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 88
2.2.3 (L2) Ensure 'Control use of the WebUSB API' is set to
'Enabled: Do not allow any site to request access to USB devices
via the WebUSB API' (Automated)
Profile Applicability:
Description:
Google Chrome has an API which allows access to connected USB devices from the
browser
• Do not allow any site to request access to USB devices via the WebUSB
API (2)
• Allow sites to ask the user to grant access to a connected USB device
(3)
The recommended state for this setting is: Enabled with a value of Do not allow any
site to request access to USB devices via the WebUSB API (2)
Rationale:
WebUSB is opening the doors for sophisticated phishing attacks that could bypass
hardware-based two-factor authentication devices (e.g. Yubikey devices).
Impact:
If this setting is configured, websites can no longer access connected USB devices via
the API (this includes web cameras, headphones, and other USB devices) which could
also prevent some two factor authentication (2FA) USB devices from working properly.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 2:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:DefaultWebUsbGuardSetting
Page 89
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled: Do not allow any site to request access to USB devices via the
WebUSB API:
Default Value:
Unset (Same as Enabled: Allow sites to ask the user to grant access to a connected
USB device, but user can change)
References:
1. https://chromeenterprise.google/policies/#DefaultWebUsbGuardSetting
2. https://www.wired.com/story/chrome-yubikey-phishing-webusb/
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 90
2.2.4 (L2) Ensure 'Default notification setting' is set to 'Enabled:
Do not allow any site to show desktop notifications' (Automated)
Profile Applicability:
Description:
Google Chrome offers websites the ability to display desktop notifications. These are
push messages which are sent from the website operator through Google infrastructure
to Chrome.
The recommended state for this setting is: Enabled with a value of Do not allow any
site to show desktop notifications (2)
Rationale:
If the website operator decides to send messages unencrypted, Google's servers may
process it as plain text. Furthermore, potentially compromised or faked notifications
might trick users into clicking on a malicious link.
Impact:
If this setting is enabled and set to Do not allow any site to show desktop
notifications, notifications will not be displayed for any sites and the user will not be
asked.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 2:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:DefaultNotificationsSettin
g
Page 91
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled: Do not allow any site to show desktop notifications:
Computer Configuration\Polices\Administrative Templates\Google\Google
Chrome\Content Settings\Default notification setting
Default Value:
Unset (Same as Enabled, with 'Ask every time a site wants to show desktop
notifications')
References:
1. https://chromeenterprise.google/policies/#DefaultNotificationsSetting
2. https://www.google.com/chrome/privacy/whitepaper.html#notifications
3. https://medium.com/@BackmaskSWE/push-messages-isnt-secure-enough-
69121c683cc6
CIS Controls:
Page 92
2.2.5 (L1) Ensure 'Allow local file access to file:// URLs on these
sites in the PDF Viewer' Is Disabled (Automated)
Profile Applicability:
Description:
This setting will allow specified URLs to access file:// URLs in the PDF Viewer. By
default all domains are blocked from accessing file:// URLs in the PDF Viewer
Rationale:
Blocking all domains, or a restricted list of domains, from opening a downloaded PDF
file blocks the possibility of a malicious file being masked as a PDF. It could also block
unknown or malicious code contained within the PDF that would run on the immediate
opening within a browser tab.
Impact:
Users will be required to open PDF files manually in the PDF Viewer or in the
organization's PDF viewing application.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting will have no registry value (the key will not exist) if
it is set to Disabled:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\PdfLocalFileAccessAllowedF
orDomains\
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Disabled:
Computer Configuration\Policies\Administrative Templates\Google\Google
Chrome\Content settings\Allow local file access to file:// URLs on these
sites in the PDF Viewer
References:
1. https://chromeenterprise.google/policies/#PdfLocalFileAccessAllowedForDomain
s
Page 93
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 94
2.3 Extensions
Page 95
2.3.1 (L1) Ensure 'Blocks external extensions from being installed'
is set to 'Enabled' (Automated)
Profile Applicability:
Description:
Enabling this setting blocks external extensions (an extension that is not installed from
the Chrome Web Store) from being installed.
The recommended state for this setting is: Enabled (1)
Rationale:
Allowing users to install extensions from other locations (not the Chrome Web Store)
can lead to malicious extensions being installed.
Impact:
User will only be allowed to install extension for the Chrome web store.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 1:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:BlockExternalExtensions
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled:
Computer Configuration\Polices\Administrative Templates\Google\Google
Chrome\Extensions\Blocks external extensions from being installed
Default Value:
Unset (Same as Disabled, but user can change)
References:
1. https://chromeenterprise.google/policies/#BlockExternalExtensions
2. https://developer.chrome.com/docs/extensions/mv2/external_extensions/
Page 96
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 97
2.3.2 (L1) Ensure 'Configure allowed app/extension types' is set
to 'Enabled: extension, hosted_app, platform_app, theme'
(Automated)
Profile Applicability:
Description:
Enabling this setting allows you to specify which app/extension types are allowed.
Disabled (0): Results in no restrictions on the acceptable extension and app types.
The recommended state for this setting is: Enabled with the values of extension,
hosted_app, platform_app, theme.
Rationale:
App or extension types that could be misused or are deprecated shall no longer be
installed.
NOTE: Google has removed support for Chrome Apps which includes the types
hosted_app and platform_app. The blog post indicates that these types will require a
setting to be enabled for continued use through June 2022.
Impact:
Extensions already installed will be removed if its type is denylisted and the extension
itself is not allowlisted.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to extension, hosted_app, platform_app, theme:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\ExtensionAllowedTypes:
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled: extension, hosted_app, platform_app, theme:
Computer Configuration\Polices\Administrative Templates\Google\Google
Chrome\Extensions\Configure allowed app/extension types
Default Value:
Unset (Same as Disabled, but user can change)
Page 98
References:
1. https://chromeenterprise.google/policies/#ExtensionAllowedTypes
2. https://blog.chromium.org/2020/08/changes-to-chrome-app-support-timeline.html
3. https://chromium.googlesource.com/chromium/src/+/HEAD/extensions/docs/exte
nsion_and_app_types.md
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 99
2.3.3 (L1) Ensure 'Configure extension installation blocklist' is set
to 'Enabled: *' (Automated)
Profile Applicability:
Description:
Enabling this setting allows you to specify which extensions the users can NOT install.
Extensions already installed will be removed if blocklisted.
Disabled (0): then the user can install any extension in Google Chrome.
The recommended state for this setting is: Enabled with a value of *
NOTE: Chrome does offer a more granular permission-based configuration called
Extension management settings if blocklisting all extensions is too aggressive, which
allows an organization to drill down to the exact permissions that they want to lock
down. The extensions management settings require more coordination and effort to
understand what the security requirements are to block site and device permissions
globally as well as more IT management to deploy. The benefit would be allowing
access to more extensions to their end-users. See link in reference section
NOTE: If Chrome Cleanup is Disabled, users may want to configure the extension
blocklist instead of using the Extension Management option. Chrome Cleanup can help
protect against malicious extensions when paired with the Extension Management
setting.
Rationale:
This can be used to block extensions that could potentially allow remote control of the
system through the browser. If there are extensions needed for securing the browser or
for enterprise use, these can be enabled by configuring either the setting Configure
extension installation allowlist or the setting Extension management settings.
Impact:
Any installed extension will be removed unless it is specified on the extension allowlist.
If an organization is using any approved password managers, ensure that the extension
is added to the allowlist.
Page 100
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to *:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\ExtensionInstallBlocklist:
1
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled and a value of * for Extension IDs the user should be prevented from
installing:
Computer Configuration\Polices\Administrative Templates\Google\Google
Chrome\Extensions\Configure extension installation blocklist
Default Value:
1. https://chromeenterprise.google/policies/#ExtensionInstallBlocklist
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 101
2.3.4 (L2) Ensure 'Default third-party storage partitioning setting'
Is Enabled and Blocked (Automated)
Profile Applicability:
Description:
This setting will block any site from accessing the storage session from any other site.
This will block third party trackers that are embedded on multiple sites from tracking a
user across the sites they visit. Blocking third party access to the user agent will not
allow sites to infer data about the user from the data from another site.
It can be configured to either:
Rationale:
Setting this requires that user agent state needs to be keyed by more than a single
origin or site. It can also defend against timing attacks on web privacy.
Impact:
Enforcing this may cause users to experience issues with sites they regularly visit that
already grant access to third-parties.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set individually to your organization's allowed URLs:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\DefaultThirdPartyStoragePa
rtitioningSetting:2
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled: Block third-party storage partitioning from being enabled.:
Computer Configuration\Policies\Administrative Templates\Google\Google
Chrome\Content settings\Default third-party storage partitioning setting
Default Value:
Not Configured
Page 102
References:
1. https://chromeenterprise.google/policies/#DefaultThirdPartyStoragePartitioningS
etting
2. https://privacycg.github.io/storage-partitioning/
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 103
2.3.5 (L1) Ensure 'Block third-party storage partitioning for these
origins' Is Configured (Manual)
Profile Applicability:
Description:
This setting will block specific sites your organization selects from accessing the storage
session from any other site. This will allow an organization to block third party trackers
that are embedded on multiple sites from tracking a user across the sites they visit. It
will also allow blocking third party access to the user agent and to infer data about the
user from the data from another site.
Setting the Level 2 recommendation DefaultThirdPartyStoragePartitioningSetting
will block all sites, not just this set list in
ThirdPartyStoragePartitioningBlockedForOrigins
Rationale:
If your organization does not want to block all third-party sites from accessing the user
agent, you can configure a curated list of sites to block.
Impact:
This might cause the user experience to vary from allowed sites to blocked sites.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set individually to your organization's allowed URLs:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\ThirdPartyStoragePartition
ingBlockedForOrigins\<number> = <url>
Example:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\ThirdPartyStoragePartition
ingBlockedForOrigins\1 = https://www.example.com
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\ThirdPartyStoragePartition
ingBlockedForOrigins\2 = [*.]example.edu
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\ThirdPartyStoragePartition
ingBlockedForOrigins\3 = https://www.example.net
Page 104
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled and set Show to the approved URLs:
Computer Configuration\Policies\Administrative Templates\Google\Google
Chrome\Content settings\Block third-party storage partitioning for these
origins
References:
1. https://chromeenterprise.google/policies/#ThirdPartyStoragePartitioningBlockedF
orOrigins
2. https://groups.google.com/a/chromium.org/g/blink-dev/c/24hK6DKJnqY?pli=1
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 105
2.3.6 (L2) Ensure 'Control Manifest v2 extension availability' Is
Set to Forced Only (Automated)
Profile Applicability:
Description:
This policy setting controls extension management settings for Google Chrome,
specifically v2 extensions. This policy setting is being sunsetted as Google develops the
Manifest v3, but that rollout is currently postponed.
The policy can be configured to:
Rationale:
Setting this to Forced Only will not allow users to install any additional v2 extensions,
and all existing, non-forced, v2 extensions will be disabled.
Impact:
Users that use extensions regularly will have a set of them blocked, which will change
their user experience.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 3:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:ExtensionManifestV2Availab
ility
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled: Manifest v2 is enabled for forced extensions only:
Computer Configuration\Policies\Administrative Templates\Google\Google
Chrome\Extensions\Control Manifest v2 extension availability
References:
1. https://chromeenterprise.google/policies/#ExtensionManifestV2Availability
Page 106
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 107
2.3.7 (L1) Ensure 'Control availability of extensions unpublished
on the Chrome Web Store' Is Disabled (Automated)
Profile Applicability:
Description:
This policy disables any extensions in Google Chrome that were downloaded from the
Chrome Web Store and are now unpublished. The policy can be configured to either:
Impact:
This may disable extensions commonly used by users in your organization.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 1:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:ExtensionUnpublishedAvaila
bility
Page 108
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled: Disable unpublished extensions:
Computer Configuration\Policies\Administrative Templates\Google
Chrome\Extensions\Control availability of extensions unpublished on the
Chrome Web Store.
Default Value:
1. https://chromeenterprise.google/policies/#ExtensionUnpublishedAvailability
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 109
2.4 HTTP authentication
Page 110
2.4.1 (L2) Ensure 'Supported authentication schemes' is set to
'Enabled: ntlm, negotiate' (Automated)
Profile Applicability:
Description:
Specifies which HTTP authentication schemes are supported by Google Chrome.
Disabled (0): Allows all supported authentication schemes.
The recommended state for this setting is: Enabled with the value of ntlm, negotiate
Rationale:
Possible values are 'basic', 'digest', 'ntlm' and 'negotiate'. Basic and Digest
authentication do not provide sufficient security and can lead to submission of user
passwords in plaintext or minimal protection (Integrated Authentication is supported for
negotiate and ntlm challenges only).
Impact:
If some legacy application(s) or website(s) required insecure authentication
mechanisms they will not work correctly.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to ntlm, negotiate:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:AuthSchemes
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled: ntlm, negotiate:
Computer Configuration\Polices\Administrative Templates\Google\Google
Chrome\HTTP Authentication\Supported authentication schemes
Default Value:
Unset (Same as Disabled, but user can change)
References:
1. https://chromeenterprise.google/policies/#AuthSchemes
Page 111
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 112
2.5 Native Messaging
Page 113
2.5.1 (L2) Ensure 'Configure native messaging blocklist' is set to
'Enabled: *' (Automated)
Profile Applicability:
Description:
Allows you to specify which native messaging hosts that should not be loaded.
Disabled (0): Google Chrome will load all installed native messaging hosts.
The recommended state for this setting is: Enabled with a value of *
NOTE: This needs to be handled carefully. If an extension is enabled, yet can't
communicate with its backend code, it could behave in strange ways which results in
helpdesk tickets + support load.
Rationale:
For consistency with Plugin and Extension policies, native messaging should be
blocklisted by default, requiring explicit administrative approval of applications for
allowlisting. An example of an application that uses native messaging is the 1Password
password manager.
Impact:
A blocklist value of '*' means all native messaging hosts are blocklisted unless they are
explicitly listed in the allowlist.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to *:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\NativeMessagingBlocklist:1
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled and the value of * set to Names of the forbidden native messaging hosts.
Computer Configuration\Polices\Administrative Templates\Google Chrome\Native
Messaging\Configure native messaging blocklist
Default Value:
Unset (Same as Disabled, and users can change)
Page 114
References:
1. https://chromeenterprise.google/policies/#NativeMessagingBlocklist
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 115
2.6 Password manager
Page 116
2.6.1 (L1) Ensure 'Enable saving passwords to the password
manager' is Explicitly Configured (Manual)
Profile Applicability:
Description:
Google Chrome has a built-in password manager to store passwords for users. Chrome
will use local authentication to allow users to gain access to these passwords.
The recommended state for this setting is: Explicitly set to Enabled (1) or Disabled (0)
based on the organization's needs.
NOTE: If you choose to Enable this setting, please review Disable synchronization of
data with Google and ensure this setting is configured to meet organizational
requirements.
Rationale:
The Google Chrome password manager is Enabled by default and each organization
should review and determine if they want to allow users to store passwords in the
Browser. If another solution is used instead of the built in Chrome option then an
organization should configure the setting to Disabled.
Impact:
Organizationally dependent.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 0 or 1 (Organization dependent):
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:PasswordManagerEnabled
Remediation:
To establish the recommended configuration via Group Policy, configure the following
setting to meet organizational requirements:
Computer Configuration\Polices\Administrative Templates\Google\Google
Chrome\Password manager\Enable saving passwords to the password manager
Default Value:
Unset (Same as Enabled, but user can change)
Page 117
References:
1. https://chromeenterprise.google/policies/#PasswordManagerEnabled
2. https://www.ncsc.gov.uk/blog-post/what-does-ncsc-think-password-managers
3. https://pages.nist.gov/800-63-3/sp800-63b.html
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 118
2.7 Printing
Page 119
2.7.1 (L1) Ensure 'Enable Google Cloud Print Proxy' is set to
'Disabled' (Automated)
Profile Applicability:
Description:
This setting enables Google Chrome to act as a proxy between Google Cloud Print and
legacy printers connected to the machine.
The recommended state for this setting is: Disabled (0)
Rationale:
Disabling this option will prevent users from printing documents from unmanaged
devices to an organization's printer.
Impact:
If this setting is disabled, users cannot enable the proxy, and the machine will not be
allowed to share its local printers with Google Cloud Print.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 0:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:CloudPrintProxyEnabled
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Disabled:
Computer Configuration\Polices\Administrative Templates\Google\Google
Chrome\Printing\Enable Google Cloud Print Proxy
Default Value:
Unset (Same as Enabled, but user can change)
References:
1. https://chromeenterprise.google/policies/#CloudPrintProxyEnabled
Page 120
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 121
2.8 Remote access (Chrome Remote Desktop)
Page 122
2.8.1 Ensure 'Allow remote access connections to this machine' is
set to 'Disabled' (Manual)
Profile Applicability:
Description:
This is a setting for Chrome Remote desktop. If this setting is Disabled, the remote
access host service cannot be started or configured to accept incoming connections.
Rationale:
Only approved remote access systems should be used.
NOTE: If Chrome Remote Desktop is approved and required for use, then this setting
can be ignored.
Impact:
This setting will disable Chrome Remote Desktop. In general, Chrome Remote Desktop
is not used by most businesses, so disabling it should have no impact.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 0:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:RemoteAccessHostAllowRemot
eAccessConnections
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Disabled:
Computer Configuration\Policies\Administrative Templates\Google\Google
Chrome\Remote Access\Allow remote access connections to this machine
Default Value:
Unset (Same as Enabled, but user can change)
Page 123
References:
1. https://chromeenterprise.google/policies/#RemoteAccessHostAllowRemoteAcces
sConnections
2. https://remotedesktop.google.com/?pli=1
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 124
2.8.2 (L1) Ensure 'Allow remote users to interact with elevated
windows in remote assistance sessions' is set to 'Disabled'
(Automated)
Profile Applicability:
Description:
Google Chrome can be set to run the remote assistance host in a process with
uiAccess permissions. This allows remote users to interact with elevated windows on
the local user's desktop.
If this setting is disabled, the remote assistance host will run in the user's context.
Furthermore, remote users cannot interact with elevated windows on the desktop.
The recommended state for this setting is: Disabled (0)
Rationale:
Remote users shall not be able to escalate privileges.
Impact:
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Disabled:
Computer Configuration\Polices\Administrative Templates\Google\Google
Chrome\Remote access\Allow remote users to interact with elevated windows in
remote assistance sessions
Default Value:
Page 125
References:
1. https://chromeenterprise.google/policies/#RemoteAccessHostAllowUiAccessFor
RemoteAssistance
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 126
2.8.3 (L1) Ensure 'Configure the required domain names for
remote access clients' is set to 'Enabled' with a domain defined
(Manual)
Profile Applicability:
Description:
Chrome allows the configuration of a list of domains that are allowed to access the
user's system. When enabled, remote systems can only connect if they are one of the
specified domains listed.
Setting this to an empty list (Disabled) allows remote systems from any domain to
connect to this user's system.
The recommended state for this setting is: Enabled (1) and at least one domain set
NOTE: The list of domains is organization specific.
Rationale:
Remote assistance connections shall be restricted.
Impact:
If this setting is enabled, only systems from the specified domains can connect to the
user's system.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This registry path will not exist if it is set to Disabled:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\RemoteAccessHostClientDoma
inList
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled and enter an organizational specific domain(s) (e.g. nodomain.local):
Computer Configuration\Polices\Administrative Templates\Google\Google
Chrome\Remote access\Configure the required domain names for remote access
clients
Default Value:
Unset (Same as Disabled, but user can change)
Page 127
References:
1. https://chromeenterprise.google/policies/#RemoteAccessHostClientDomainList
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 128
2.8.4 (L1) Ensure 'Enable curtaining of remote access hosts' is
set to 'Disabled' (Automated)
Profile Applicability:
Description:
This setting allows someone physically present at the host machine to see what a user
is doing while a remote connection is in progress.
If this setting is disabled, a host's physical input and output devices are enabled while a
remote connection is in progress.
The recommended state for this setting is: Disabled (0)
Rationale:
If a remote session is in progress, the user physically present at the host machine shall
be able to see what a remote user is doing.
Impact:
None - This is the default behavior.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 0:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:RemoteAccessHostRequireCur
tain
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Disabled:
Computer Configuration\Polices\Administrative Templates\Google\Google
Chrome\Remote access\Enable curtaining of remote access hosts
Default Value:
Unset (Same as Disabled, but user can change)
References:
1. https://chromeenterprise.google/policies/#RemoteAccessHostRequireCurtain
Page 129
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 130
2.8.5 (L1) Ensure 'Enable firewall traversal from remote access
host' is set to 'Disabled' (Automated)
Profile Applicability:
Description:
Chrome enables the usage of STUN servers which allows remote clients to discover
and connect to a machine even if they are separated by a firewall. By disabling this
feature, in conjunction with filtering outgoing UDP connections, the machine will only
allow connections from machines within the local network.
The recommended state for this setting is: Disabled (0)
Rationale:
If this setting is enabled, remote clients can discover and connect to these machines
even if they are separated by a firewall.
Impact:
If this setting is disabled and outgoing UDP connections are filtered by the firewall, this
machine will only allow connections from client machines within the local network.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 0:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:RemoteAccessHostFirewallTr
aversal
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Disabled:
Computer Configuration\Polices\Administrative Templates\Google\Google
Chrome\Remote access\Enable firewall traversal from remote access host
Default Value:
Unset (Same as Enabled, but user can change)
References:
1. https://chromeenterprise.google/policies/#RemoteAccessHostFirewallTraversal
Page 131
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 132
2.8.6 (L1) Ensure 'Enable or disable PIN-less authentication for
remote access hosts' is set to 'Disabled' (Automated)
Profile Applicability:
Description:
Chrome allows a user to opt-out of using user-specified PIN authentication and instead
pair clients and hosts during connection time.
The recommended state for this setting is: Disabled (0)
Rationale:
If this setting is enabled, users can opt to pair clients and hosts at connection time,
eliminating the need to enter a PIN every time.
Impact:
If this setting is disabled, users will be required to enter PIN every time.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 0:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:RemoteAccessHostAllowClien
tPairing
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Disabled:
Computer Configuration\Polices\Administrative Templates\Google\Google
Chrome\Remote access\Enable or disable PIN-less authentication for remote
access hosts
Default Value:
1. https://chromeenterprise.google/policies/#RemoteAccessHostAllowClientPairing
Page 133
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 134
2.8.7 (L1) Ensure 'Enable the use of relay servers by the remote
access host' is set to 'Disabled'. (Automated)
Profile Applicability:
Description:
Google Chrome allows the use of relay servers when clients are trying to connect to this
machine and a direct connection is not available.
• Disable (0): The use of relay servers by the remote access host is not allowed
• Enabled (1): The use of relay servers by the remote access host is allowed
Rationale:
Relay servers shall not be used to circumvent firewall restrictions.
Impact:
If this setting is disabled, remote clients can not use relay servers to connect to this
machine.
NOTE: Setting this to Disabled doesn't turn remote access off, but only allows
connections from the same network (not NAT traversal or relay).
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 0:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:RemoteAccessHostAllowRelay
edConnection
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Disabled:
Computer Configuration\Polices\Administrative Templates\Google\Google
Chrome\Remote access\Enable the use of relay servers by the remote access
host
Default Value:
Unset (Same as Enabled, but user can change)
Page 135
References:
1. https://chromeenterprise.google/policies/#RemoteAccessHostAllowRelayedConn
ection
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 136
2.9 First-Party Sets Settings
Page 137
2.9.1 (L1) Ensure 'Enable First-Party Sets' Is Disabled (Manual)
Profile Applicability:
Description:
This policy controls access to the First-Party Sets. First-party Sets are a way for sites to
declare relationships with each other and enable limited cross-site cookie access for
specific, user-facing purposes. It can configured to either:
Rationale:
Setting this policy will not allow sites to declare the relationships that allow them to
access the cross-site cookies.
Impact:
This may cause unexpected behavior as a user moves between affiliated sites.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 0:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:FirstPartySetsEnabled
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Default Value:
Enabled
References:
1. https://chromeenterprise.google/policies/#FirstPartySetsEnabled
Page 138
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 139
2.10 Microsoft Active Directory Management Settings
Page 140
2.10.1 (L1) Ensure 'Allow automatic sign-in to Microsoft cloud
identity providers' Is Enabled (Manual)
Profile Applicability:
Description:
This policy setting allows accounts backed by a Microsoft® cloud identity provider (i.e.,
Microsoft Azure Active Directory or the consumer Microsoft account identity provider)
can be signed into web properties using that identity automatically. It can be configured
to either:
If the value for CloudAPAuthEnabled is not changed from the default, it will behave as it
is disabled.
Rationale:
Enabling this policy setting allows users to use Microsoft Cloud Authentication for any
site that requires CA (Cloud Authentication) and does not require an extension.
Impact:
There should be no impact to the user.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 1:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:CloudAPAuthEnabled
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled: Enable Microsoft® cloud authentication:
Computer Configuration\Policies\Administrative Templates\Google\Google
Chrome\Microsoft® Active Directory® management settings\Allow automatic sign-
in to Microsoft® cloud identity providers
Default Value:
Unset (Disabled)
Page 141
References:
1. https://chromeenterprise.google/policies/#CloudAPAuthEnabled
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 142
2.11 (L1) Ensure 'Allow download restrictions' is set to 'Enabled:
Block malicious downloads' (Automated)
Profile Applicability:
Description:
Google Chrome can block certain types of downloads, and won't let users bypass the
security warnings, depending on the classification of Safe Browsing.
The recommended state for this setting is: Enabled with a value of Block malicious
downloads. Recommended. (4)
NOTE: These restrictions apply to downloads triggered from webpage content, as well
as the Download link... menu option. They don't apply to the download of the currently
displayed page or to saving as PDF from the printing options.
Rationale:
Users shall be prevented from downloading malicious file types, and shall not be able to
bypass security warnings.
Impact:
If this setting is enabled, all downloads are allowed, except for those that carry Safe
Browsing warnings. These are downloads that have been identified as risky or from a
risky source by the Google Safe Browsing Global intelligence engine.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 4:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:DownloadRestrictions
Page 143
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled: Block malicious downloads. Recommended.:
Computer Configuration\Polices\Administrative Templates\Google\Google
Chrome\Allow download restrictions
Default Value:
Unset (Same as Disabled, but user can change)
References:
1. https://chromeenterprise.google/policies/#DownloadRestrictions
2. https://developers.google.com/safe-browsing
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 144
2.12 (L2) Ensure 'Allow proceeding from the SSL warning page' is
set to 'Disabled' (Automated)
Profile Applicability:
Description:
This setting controls whether a user is able to proceed to a webpage when an invalid
SSL certificate warning has occurred.
The recommended state for this setting is: Disabled (0)
Rationale:
Sites protected by SSL should always be recognized as valid in the web browser.
Allowing a user to make the decision as to whether there appears to be an invalid
certificate could open an organization up to users visiting a site that is otherwise not
secure and/or malicious in nature.
Impact:
Users will not be able to click past the invalid certificate error to view the website.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 0:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:SSLErrorOverrideAllowed
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Disabled:
Computer Configuration\Policies\Administrative Templates\Google\Google
Chrome\Allow proceeding from the SSL warning page
Default Value:
Unset (Same as Enabled, but user can change)
References:
1. https://chromeenterprise.google/policies/#SSLErrorOverrideAllowed
Page 145
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 146
2.13 (L1) Ensure 'Disable proceeding from the Safe Browsing
warning page' is set to 'Enabled' (Automated)
Profile Applicability:
Description:
Google provides the Safe Browsing service. It shows a warning page when users
navigate to sites that are flagged as potentially malicious.
Disabled (0): Users can choose to proceed to the flagged site after the warning
appears.
The recommended state for this setting is: Enabled (1)
Rationale:
Malicious web pages are widely spread on the internet and pose the most significant
threat to the user today. Users shall be prevented from navigating to potentially
malicious web content.
Impact:
Enabling this setting prevents users from proceeding anyway from the warning page to
the malicious site. In some cases legitimate sites could be blocked and users would be
prevented from accessing.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 1:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:DisableSafeBrowsingProceed
Anyway
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled:
Computer Configuration\Polices\Administrative Templates\Google\Google
Chrome\Safe Browsing settings\Disable proceeding from the Safe Browsing
warning page
Default Value:
Unset (Same as Disabled, but user can change)
Page 147
References:
1. https://chromeenterprise.google/policies/#DisableSafeBrowsingProceedAnyway
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 148
2.14 (L1) Ensure 'Require Site Isolation for every site' is set to
'Enabled' (Automated)
Profile Applicability:
Description:
This setting controls if every website will load into its own process.
Disabled (0): Doesn't turn off site isolation, but it lets users opt out.
The recommended state for this setting is: Enabled (1)
Rationale:
Chrome will load each website in its own process. Even if a site bypasses the same-
origin policy, the extra security will help stop the site from stealing your data from
another website.
Impact:
If the policy is enabled, each site will run in its own process which will cause the system
to use more memory. You might want to look at the Enable Site Isolation for
specified origins policy setting to get the best of both worlds – isolation and limited
impact for users – by using Enable Site Isolation for specified origins with a list
of the sites you want to isolate.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 1:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:SitePerProcess
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled:
Computer Configuration\Polices\Administrative Templates\Google\Google
Chrome\Require Site Isolation for every site
Default Value:
Unset (Same as Disabled, but user can change)
Page 149
References:
1. https://chromeenterprise.google/policies/#SitePerProcess
2. https://www.chromium.org/Home/chromium-security/site-isolation
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 150
2.15 (L2) Ensure 'Force Google SafeSearch' is set to 'Enabled'
(Automated)
Profile Applicability:
Description:
This setting ensures that web search results with Google are performed with
SafeSearch set to always active. Disabled means SafeSearch in Google Search is not
enforced.
The recommended state for this setting is: Enabled (1)
Rationale:
Allowing search results to present sites that may have malicious content should be
prohibited to help ensure users do not accidentally visit sites that are more prone to
malicious content including spyware, adware, and viruses.
Impact:
Users search results will be filtered and content such as adult text, videos and images
will not be shown.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 1:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:ForceGoogleSafeSearch
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Enabled:
Default Value:
1. https://chromeenterprise.google/policies/#ForceGoogleSafeSearch
Page 151
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 152
2.16 (L1) Ensure 'Notify a user that a browser relaunch or device
restart is recommended or required' is set to 'Enabled: Show a
recurring prompt to the user indication that a relaunch is required'
(Automated)
Profile Applicability:
Description:
Google Chrome can notify users that it must be restarted to apply a pending update
once the notification period defined by the recommendation Set the time period for
update notifications is passed.
Disabled:Google Chrome indicates to the user that a relaunch is needed via subtle
changes to its menu.
The recommended state for this setting is: Enabled with a value of Show a recurring
prompt to the user indicating that a relaunch is required (2)
Rationale:
The end-user will receive a notification informing them that an update has been applied
and that the browser must be restarted in order for the update to be completed. Once
updates have been pushed by the organization it is pertinent that the update is applied
as soon as possible. Enabling this notification will ensure that users restart their browser
in a timely fashion.
Impact:
A recurring warning will be shown to the user indicating that a browser relaunch will be
forced once the notification period passes. The user's session is restored after the
relaunch of Google Chrome.
Page 153
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 2:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:RelaunchNotification
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled: Show a recurring prompt to the user indicating that a relaunch is
required:
Default Value:
1. https://chromeenterprise.google/policies/#RelaunchNotification
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 154
2.17 (L1) Ensure 'Proxy settings' is set to 'Enabled' and does not
contain "ProxyMode": "auto_detect" (Automated)
Profile Applicability:
Description:
Google Chrome offers the functionality to configure the proxy settings by automatic
discovery using WPAD (Web Proxy Auto-Discovery Protocol). Setting this configures
the proxy settings for Chrome and ARC-apps, which ignore all proxy-related options
specified from the command line.
Disabled (0): Lets users choose their proxy settings.
The recommended state for this setting is: Enabled and the value of ProxyMode is not set
to auto_detect
Rationale:
Attackers may abuse the WPAD auto-config functionality to supply computers with a
PAC file that specifies a rogue web proxy under their control.
Impact:
If the policy is enabled, the proxy configuration will no longer be discovered using
WPAD.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should NOT be set to auto_detect:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:ProxyMode
Remediation:
To establish the recommended configuration via Group Policy, make sure the following
UI path is set to 'Enabled' and the value of ProxyMode is not set to auto_detect:
Computer Configuration\Polices\Administrative Templates\Google\Google
Chrome\Proxy settings
Default Value:
Unset (Same as Disabled, and users can change)
Page 155
References:
1. https://chromeenterprise.google/policies/#ProxySettings
2. http://www.ptsecurity.com/download/wpad_weakness_en.pdf
3. https://www.blackhat.com/us-16/briefings.html#crippling-https-with-unholy-pac
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 156
2.18 (L2) Ensure 'Require online OCSP/CRL checks for local trust
anchors' is set to 'Enabled' (Automated)
Profile Applicability:
Description:
Google Chrome performs revocation checking for server certificates that successfully
validate and are signed by locally-installed CA certificates. If Google Chrome is unable
to obtain revocation status information, such certificates will be treated as revoked
('hard-fail').
Disabled: Google Chrome uses existing online revocation-checking settings.
The recommended state for this setting is: Enabled (1)
Rationale:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 1:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:RequireOnlineRevocationChe
cksForLocalAnchors
Remediation:
To establish the recommended configuration via Group Policy, set the
following UI path to Enabled:
Computer Configuration\Polices\Administrative Templates\Google\Google
Chrome\Require online OCSP/CRL checks for local trust anchors
Default Value:
Unset (Same as Disabled, and users can change)
Page 157
References:
1. https://chromeenterprise.google/policies/#RequireOnlineRevocationChecksForLo
calAnchors
CIS Controls:
Page 158
2.19 (L1) Ensure 'Set the time period for update notifications' is
set to 'Enabled: 86400000' (Automated)
Profile Applicability:
Description:
Google Chrome allows to set the time period, in milliseconds, over which users are
notified that it must be relaunched to apply a pending update.
If not set, or Disabled, the default period of 604800000 milliseconds (7 days) is used.
The recommended state for this setting is: Enabled with value 86400000 (1 day)
Rationale:
This setting is a notification for the end-user informing them that an update has been
applied and that the browser must be restarted in order for the update to be completed.
Once updates have been pushed by the organization it is pertinent that said update
takes effect as soon as possible. Enabling this notification will ensure users restart the
browser in a timely fashion.
Impact:
After this time period, the user will be repeatedly informed of the need for an update
until a Browser restart is completed.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 86400000.
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:RelaunchNotificationPeriod
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled: 5265C00 (86400000 in Hexadecimal):
Computer Configuration\Polices\Administrative Templates\Google\Google
Chrome\Set the time period for update notifications
Default Value:
Unset (Same as Disabled, but user can change)
Page 159
References:
1. https://chromeenterprise.google/policies/#RelaunchNotificationPeriod
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 160
2.20 (L1) Ensure 'Allow Web Authentication requests on sites with
broken TLS certificates' Is Disabled (Automated)
Profile Applicability:
Description:
This policy setting controls the WebAuthn API and its interaction with sites that have a
broken TLS certificate. It can be configured to either:
• Disabled (0): Do not allow WebAuthn API requests on sites with broken TLS
certificates.
• Enabled (1): Allow WebAuthn API requests on sites with broken TLS
certificates.
If the value for AllowWebAuthnWithBrokenTlsCerts is not changed from the default, it will
behave as it is disabled.xempt.
Rationale:
Setting this policy will block the ability to authenticate to any website that does not have
a valid TLS certificate since the identity of the site cannot be verified.
Impact:
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Default Value:
Unset (Disabled)
Page 161
References:
1. https://chromeenterprise.google/policies/#AllowWebAuthnWithBrokenTlsCerts
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 162
2.21 (L1) Ensure 'Allow reporting of domain reliability related data'
Is Disabled (Automated)
Profile Applicability:
Description:
This setting controls the defaults for clipboard permission access from sites. It can be
configured to either:
If the value for DomainReliabilityAllowed is not changed from the default, it will behave
as it is enabled.
Rationale:
Setting this policy to disabled can stop any accidental data leakage.
Impact:
There should be no impact on the user.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 0:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:DomainReliabilityAllowed
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Disabled:
Computer Configuration\Policies\Administrative Templates\Google Chrome\Allow
reporting of domain reliability related data
Default Value:
Unset (Enabled)
References:
1. https://chromeenterprise.google/policies/#DomainReliabilityAllowed
Page 163
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 164
2.22 (L1) Ensure 'Enable TLS Encrypted ClientHello' Is Enabled
(Automated)
Profile Applicability:
Description:
This setting controls the defaults for using Encrypted ClientHello (ECH). ECH is an
extension to TLS and encrypts the initial handshake with a website that can only be
decrypted by that website. Google Chrome may, or may not, use ECH based on 3
factors: sever support, HTTPS DNS record availability, or rollout status. It can be
configured to either:
If the value for EncryptedClientHelloEnabled is not changed from the default, it will
behave as it is enabled.
Rationale:
Previously all handshakes were in the open and could expose sensitive information like
the name of the website that you are connecting to. Setting this policy will allow Google
Chrome to use an encrypted hello, or handshake, with a website where it is supported,
thus not exposing sensitive information.
Impact:
There should be no impact on the user.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 1:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:EncryptedClientHelloEnable
d
Page 165
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled:
Computer Configuration\Policies\Administrative Templates\Google\Google
Chrome\Enable TLS Encrypted ClientHello
Default Value:
Unset (Enabled)
References:
1. https://chromeenterprise.google/policies/#EncryptedClientHelloEnabled
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 166
2.23 (L2) Ensure 'Determines whether the built-in certificate
verifier will enforce constraints encoded into trust anchors loaded
from the platform trust store' Is Enabled (Automated)
Profile Applicability:
Description:
This setting controls constraints encoded into trust anchors loaded from the platform
trust store. It can be configured to either:
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled:
Computer Configuration\Policies\Administrative Templates\Google\Google
Chrome\Determines whether the built-in certificate verifier will enforce
constraints encoded into trust anchors loaded from the platform trust store.
Default Value:
Unset (Enabled)
Page 167
References:
1. https://chromeenterprise.google/policies/#EnforceLocalAnchorConstraintsEnable
d
CIS Controls:
Page 168
2.24 (L1) Ensure 'Keep browsing data when creating enterprise
profile by default' Is Enabled (Automated)
Profile Applicability:
Description:
This setting controls keeping existing browser data when an enterprise profile is
created. It can be configured to either:
• Disabled (0): Do not check the option to keep existing browsing data by
default
• Enabled (1): Check the option to keep existing browsing data by default
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled:
Computer Configuration\Policies\Administrative Templates\Google\Google
Chrome\Keep browsing data when creating enterprise profile by default
Default Value:
Unset (Enabled)
Page 169
References:
1. https://chromeenterprise.google/policies/#EnterpriseProfileCreationKeepBrowsin
gData
CIS Controls:
Page 170
2.25 (L1) Ensure 'Allow file or directory picker APIs to be called
without prior user gesture' Is Disabled (Automated)
Profile Applicability:
Description:
This setting controls the ability for showOpenFilePicker(), showSaveFilePicker(), and
showDirectoryPicker() web APIs to be called without user interaction.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should not exist:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\FileOrDirectoryPickerWitho
utGestureAllowedForOrigins\<number> = <url>
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Default Value:
Unset (Disabled)
References:
1. https://chromeenterprise.google/policies/#FileOrDirectoryPickerWithoutGestureAl
lowedForOrigins
Page 171
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 172
2.26 (L1) Ensure 'Enable Google Search Side Panel' Is Disabled
(Automated)
Profile Applicability:
Description:
This setting controls the Google Search Side Panel. It can be configured to either:
• Disabled (0): Disable Google Search Side Panel on all web pages
• Enabled (1): Enable Google Search Side Panel on all web pages
Rationale:
Setting this policy will not allow the Google Search Side Panel on any webpages.
Impact:
This should have no user impact.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 0:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:GoogleSearchSidePanelEnabl
ed
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled:
Computer Configuration\Policies\Administrative Templates\Google\Google
Chrome\Enable Google Search Side Panel
References:
1. https://chromeenterprise.google/policies/#GoogleSearchSidePanelEnabled
Page 173
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 174
2.27 (L1) Ensure 'Http Allowlist' Is Properly Configured (Manual)
Profile Applicability:
Description:
This setting allows administrators to list specific sites that will not be upgraded to
HTTPS and will not show an error interstitial if HTTPS-First Mode is enabled.
Note: Wildcards (*, [*], etc.) are not allowed in the URL listings.
Rationale:
Setting this policy allows organizations to maintain access to servers that do not support
HTTPS without having to disable HTTPS-First mode or HTTPS Upgrades.
Impact:
This should not have an impact on the user.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set individually to your organization's allowed URLs:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\HttpAllowlist\<number> =
<url>
Example:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\HttpAllowlist\1 =
www.example.com
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\HttpAllowlist\2 =
[*.]example.edu
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\HttpAllowlist\3 =
www.example.net
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled and set Show to the approved URLs:
Computer Configuration\Policies\Administrative Templates\Google\Google
Chrome\HTTP Allowlist
References:
1. https://chromeenterprise.google/policies/#HttpAllowlist
Page 175
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 176
2.28 (L1) Ensure 'Enable automatic HTTPS upgrades' Is Enabled
(Automated)
Profile Applicability:
Description:
This setting controls the ability for Google Chrome to upgrade to HTTPS from HTTP
while navigating to certain sites. It can be configured to either:
If the value for HttpsUpgradesEnabled is not changed from the default, it will behave as
if it is enabled.
Rationale:
Enabling this setting will upgrade the connection to a site from HTTP to HTTPS where
available, verifying the identity of the site visited.
Impact:
This should have no impact on the user.
Note: If there are internal sites/servers that use HTTP only, set those in the policy
HttpAllowlist
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 1:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:HttpsUpgradesEnabled
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled:
Computer Configuration\Policies\Administrative Templates\Google\Google
Chrome\Enable automatic HTTPS upgrades
Default Value:
Unset (Enabled)
Page 177
References:
1. https://chromeenterprise.google/policies/#HttpsUpgradesEnabled
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 178
2.29 (L1) Ensure 'Insecure Hashes in TLS Handshakes Enabled'
Is Disabled (Automated)
Profile Applicability:
Description:
This setting controls the ability for Google Chrome to allow legacy or insecure hashes
during the TLS handshake. It can be configured to either:
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Disabled:
Computer Configuration\Policies\Administrative Templates\Google\Google
Chrome\Insecure Hashes in TLS Handshakes Enabled
Default Value:
Unset (Allow)
Page 179
References:
1. https://chromeenterprise.google/policies/#InsecureHashesInTLSHandshakesEna
bled
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 180
2.30 (L1) Ensure 'Enable Renderer App Container' Is Enabled
(Automated)
Profile Applicability:
Description:
This setting controls the ability for Google Chrome to allow the Render App Container
sandbox to be used while navigating to certain sites. It can be configured to either:
If the value for RendererAppContainerEnabled is not changed from the default, it will
behave as if it is enabled.
Rationale:
Disabling this policy would weaken the sandbox that Google Chrome uses for the
renderer process, and will have a detrimental effect on the security and stability of the
browser. This policy needs to be enabled to maintain security and stability.
Impact:
This would only impact users if there is third-party software that must run inside
renderer processes.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 1:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:RendererAppContainerEnable
d
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled:
Computer Configuration\Policies\Administrative Templates\Google\Google
Chrome\Enable Renderer App Container
Default Value:
Unset (Enabled)
Page 181
References:
1. https://chromeenterprise.google/policies/#RendererAppContainerEnabled
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 182
2.31 (L1) Ensure 'Enable strict MIME type checking for worker
scripts' Is Enabled (Automated)
Profile Applicability:
Description:
This setting controls the ability for Google Chrome to upgrade to HTTPS from HTTP
while navigating to certain sites. It can be configured to either:
• Disabled (0): Scripts for workers (Web Workers, Service Workers, etc.) use
lax MIME type checking. Worker scripts with legacy MIME types, like
text/ascii, will work.
• Enabled (1): Scripts for workers (Web Workers, Service Workers, etc.)
require a JavaScript MIME type, like text/javascript. Worker scripts
with legacy MIME types, like text/ascii, will be rejected.
Setting this policy will require worker scripts to use more secure and strict JavaScript
MIME types and ones with legacy MIME Types will be rejected.
Impact:
This should have no impact on users.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 1:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:StrictMimetypeCheckForWork
erScriptsEnabled
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled:
Computer Configuration\Policies\Administrative Templates\Google\Google
Chrome\Enable strict MIME type checking for worker scripts
Default Value:
Unset (Enabled)
Page 183
References:
1. https://chromeenterprise.google/policies/#StrictMimetypeCheckForWorkerScripts
Enabled
Page 184
2.32 Ensure 'Allow remote debugging' is set to 'Disabled'
(Automated)
Profile Applicability:
Description:
This policy setting controls whether users may use remote debugging. This feature
allows remote debugging of live content on a Windows 10 or later device from a
Windows or macOS computer.
The recommended state for this setting is: Disabled.
Rationale:
Disabling remote debugging enhances security and protects applications from
unauthorized access. Some attack tools can exploit this feature to extract information,
or to insert malicious code.
Impact:
Users will not be able access the remote debugging feature in Google Chrome.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 0.
HKEY_LOCAL_MACHINE\Software\Policies\Google\Chrome:RemoteDebuggingAllowed
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Disabled:
Computer Configuration\Policies\Administrative Templates\Google\Google
Chrome\Allow remote debugging
Note: This Group Policy path may not exist by default. It is provided by the Group Policy
template google.admx/adml that can be downloaded from: Download Chrome Browser
for Your Business - Chrome Enterprise.
Default Value:
Enabled. (Users may use remote debugging by specifying --remote-debug-port and --
remote-debugging-pipe command line switches.)
Page 185
Additional Information:
I copied/adjusted this rule from MS Edge, rule 1.41
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 186
3 Privacy
This section contains recommendations that help improve user privacy. Organizations
should review these settings and any potential impacts to ensure they make sense
within the environment since they restrict some browser functionality.
Page 187
3.1 Content settings
Page 188
3.1.1 (L2) Ensure 'Default cookies setting' is set to 'Enabled: Keep
cookies for the duration of the session' (Automated)
Profile Applicability:
Description:
When leaving the setting _RestoreOnStartup _unset results in the use of
_DefaultCookiesSetting _for all sites, if it's set. If _DefaultCookiesSetting _is not set, the
user's personal setting applies.
The recommended state for this setting is: Enabled with a value of Keep cookies for
the duration of the session (4)
NOTE: If the RestoreOnStartup setting is set to restore URLs from previous sessions
this setting will not be respected and cookies will be stored permanently for those sites.
An example of those URLs are SSO or intranet sites.
Rationale:
Permanently stored cookies may be used for malicious intent.
Impact:
If this setting is enabled, cookies will be cleared when the session closes.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 4:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:DefaultCookiesSetting
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled: Keep cookies for the duration of the session:
Computer Configuration\Administrative Templates\Google\Google Chrome\Content
Settings\Default cookies setting
Page 189
Default Value:
Unset (Same as Disabled, but user can change)
References:
1. https://chromeenterprise.google/policies/#DefaultCookiesSetting
2. https://chromeenterprise.google/policies/#RestoreOnStartup
3. https://chromeenterprise.google/policies/#CookiesSessionOnlyForUrls
CIS Controls:
Page 190
3.1.2 (L1) Ensure 'Default geolocation setting' is set to 'Enabled:
Do not allow any site to track the users' physical location'
(Automated)
Profile Applicability:
Description:
Google Chrome supports tracking a user's physical location using GPS, data about
nearby Wi-Fi access points or cellular signal sites/towers (even if you’re not using
them), and your computer’s IP.
The recommended state for this setting is: Enabled with a value Do not allow any site
to track the users' physical location (2)
Rationale:
From a privacy point of view it is not desirable to submit indicators regarding the
location of the device, since the processing of this information cannot be determined.
Furthermore, this may leak information about the network infrastructure around the
device.
Impact:
If this setting is disabled, chrome will no longer send data about nearby Wi-Fi access
points or cellular signal sites/towers (even if you’re not using them), and your
computer’s IP address to Google.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 2:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:DefaultGeolocationSetting
Page 191
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled: Do not allow any site to track the users' physical location:
Computer Configuration\Administrative Templates\Google\Google Chrome\Content
Settings\Default geolocation setting
Default Value:
Unset (Same as Disabled, but user can change)
References:
1. https://chromeenterprise.google/policies/#DefaultGeolocationSetting
2. https://www.w3.org/2010/api-privacy-ws/papers/privacy-ws-24.pdf
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 192
3.2 Google Cast
Page 193
3.2.1 (L1) Ensure 'Enable Google Cast' is set to 'Disabled'
(Automated)
Profile Applicability:
Description:
Google Cast can send the contents of tabs, sites, or the desktop from the browser to a
remote display and sound system.
The recommended state for this setting is: Disabled (0)
Rationale:
Google Cast may send the contents of tabs, sites, or the desktop from the browser to
non-trusted devices on the local network segment.
Impact:
If this is disabled, Google Cast is not activated and the toolbar icon is not shown.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 0:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:EnableMediaRouter
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Disabled:
Computer Configuration\Administrative Templates\Google\Google Chrome\Google
Cast\Enable Google Cast
Default Value:
Unset (Same as Enabled, but user can change)
References:
1. https://chromeenterprise.google/policies/#EnableMediaRouter
Page 194
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 195
3.3 (L1) Ensure 'Allow websites to query for available payment
methods' is set to 'Disabled' (Automated)
Profile Applicability:
Description:
This setting allows you to set whether a website can check to see if the user has
payment methods saved.
The recommended state for this setting is: Disabled (0)
Rationale:
Saving payment information in Google Chrome could lead to sensitive data being
leaked and used for non-legitimate purposes.
Impact:
Websites will be unable to query whether payment information within Google Chrome is
available.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 0:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:PaymentMethodQueryEnabled
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Disabled:
Computer Configuration\Policies\Administrative Templates\Google\Google
Chrome\Allow websites to query for available payment methods.
Default Value:
Unset (Same as Enabled, but user can change)
References:
1. https://chromeenterprise.google/policies/#PaymentMethodQueryEnabled
Page 196
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 197
3.4 (L1) Ensure 'Block third party cookies' is set to 'Enabled'
(Automated)
Profile Applicability:
Description:
Chrome allows cookies to be set by web page elements that are not from the domain in
the user's address bar. Enabling this feature prevents third party cookies from being set.
The recommended state for this setting is: Enabled (1)
Rationale:
Blocking third-party cookies can help protect a user's privacy by eliminating a number of
website tracking cookies.
Impact:
Enabling this setting prevents cookies from being set by web page elements that are not
from the domain that is in the browser's address bar.
NOTE: Third Party Cookies and Tracking Protection are required for many business
critical websites, including Microsoft 365 web apps (Office 365), SalesForce, and SAP
Analytics Cloud. If these, or similar services, are needed by the organization, then this
setting can be Disabled.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 1:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:BlockThirdPartyCookies
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled:
Computer Configuration\Administrative Templates\Google\Google Chrome\Block
third party cookies
Default Value:
Unset (Same as Disabled, but user can change)
Page 198
References:
1. https://chromeenterprise.google/policies/#BlockThirdPartyCookies
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 199
3.5 (L2) Ensure 'Browser sign in settings' is set to 'Enabled:
Disabled browser sign-in' (Automated)
Profile Applicability:
Description:
Google Chrome offers to sign in with your Google account and use account-related
services like Chrome sync. It is possible to sign in to Google Chrome with a Google
account to use services like synchronization, and can also be used for configuration and
management of the browser.
The recommended state for this setting is: Enabled with a value of Disable browser
sign-in (0)
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 0:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:BrowserSignin
Page 200
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled: Disable browser sign-in
Computer Configuration\Administrative Templates\Google\Google Chrome\Browser
sign in settings
Default Value:
Unset (Same as Enabled: Enable browser sign-in, but user can change)
References:
1. https://chromeenterprise.google/policies/#BrowserSignin
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 201
3.6 (L1) Ensure 'Control how Chrome Cleanup reports data to
Google' is set to 'Disabled' (Automated)
Profile Applicability:
Description:
Chrome provides a Cleanup feature to detect unwanted software. If this setting is
Enabled, the results of the cleanup may be shared with Google (based on the setting of
SafeBrowsingExtendedReportingEnabled) to assist with future unwanted software
detection. These results will contain file metadata, automatically installed extensions,
and registry keys.
If the setting is Disabled, the results of the cleanup will not be shared with Google
regardless of the value of SafeBrowsingExtendedReportingEnabled.
The recommended state for this setting is: Disabled (0)
NOTE: This setting is not available on Windows instances that are not joined to a
Microsoft® Active Directory® domain.
Rationale:
Anonymous crash/usage data can be used to identify people, companies, and
information, which can be considered data ex-filtration from company systems.
Impact:
Chrome Cleanup detected unwanted software and will no longer report metadata about
the scan to Google.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 0:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:ChromeCleanupReportingEnab
led
Page 202
Remediation:
To establish the recommended configuration via Group Policy, set the
following UI path to Disabled:
Computer Configuration\Administrative Templates\Google\Google Chrome\Control
how Chrome Cleanup reports data to Google
Default Value:
Unset (Same as Enabled, but user can change)
References:
1. https://chromeenterprise.google/policies/#MetricsReportingEnabled
2. https://www.google.com/chrome/privacy/whitepaper.html
3. https://chromeenterprise.google/policies/#SafeBrowsingExtendedReportingEnabl
ed
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 203
3.7 (L1) Ensure 'Disable synchronization of data with Google' is
set to 'Enabled' (Automated)
Profile Applicability:
Description:
Google Chrome can synchronize browser data using Google-hosted synchronization
services. Examples of synced data include, but are not limited to, history and favorites.
The recommended state for this setting is: Enabled (1)
NOTE: if your organization allows synchronization of data with Google, then disabling
this setting will synchronize saved passwords with Google.
Rationale:
Browser data shall not be synchronized into the Google Cloud.
Impact:
If this setting is enabled, browser data will no longer sync with Google across
devices/platforms, allowing users to pick up where they left off.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 1:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:SyncDisabled
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled:
Computer Configuration\Administrative Templates\Google\Google Chrome\Disable
synchronization of data with Google
Default Value:
Unset (Same as Disabled, but user can change)
References:
1. https://chromeenterprise.google/policies/#SyncDisabled
Page 204
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 205
3.8 (L1) Ensure 'Enable alternate error pages' is set to 'Disabled'
(Automated)
Profile Applicability:
Description:
Google Chrome offers to show suggestions for the page you were trying to reach when
it is unable to connect to a web address such as 'Page Not Found'.
The recommended state for this setting is: Disabled (0)
Rationale:
Using navigation suggestions may leak information about the web site intended to be
visited.
Impact:
If this setting is disabled, Chrome will no longer use a web service to help resolve
navigation errors.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 0:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:AlternateErrorPagesEnabled
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Disabled:
Computer Configuration\Administrative Templates\Google\Google Chrome\Enable
alternate error pages
Default Value:
Unset (Same as Enabled, but user can change)
References:
1. https://chromeenterprise.google/policies/#AlternateErrorPagesEnabled
Page 206
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 207
3.9 (L1) Ensure 'Enable deleting browser and download history' is
set to 'Disabled' (Automated)
Profile Applicability:
Description:
Google Chrome can delete the browser and download history using the clear browsing
data menu.
The recommended state for this setting is: Disabled (0)
NOTE: Even when this setting is disabled, the browsing and download history aren't
guaranteed to be retained. Users can edit or delete the history database files directly,
and the browser itself may remove (based on expiration period) or archive any or all
history items at any time
Rationale:
If users can delete websites they have visited or files they have downloaded it will be
easier for them to hide evidence that they have visited unauthorized or malicious sites.
Impact:
If this setting is disabled, browsing and download history cannot be deleted by using the
clear browsing data menu.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 0:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:AllowDeletingBrowserHistor
y
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Disabled:
Computer Configuration\Administrative Templates\Google\Google Chrome\Enable
deleting browser and download history
Default Value:
Unset (Same as Enabled, but user can change)
Page 208
References:
1. https://chromeenterprise.google/policies/#AllowDeletingBrowserHistory
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 209
3.10 (L1) Ensure 'Enable predict network actions` is set to
'Enabled: Do not predict actions on any network connection'
(Automated)
Profile Applicability:
Description:
Google Chrome comes with the network prediction feature which provides DNS
prefetching, TCP and SSL preconnection, and prerendering of web pages.
The recommended state for this setting is: Enabled with a value of Do not predict
network actions on any network connection (2)
Rationale:
Opening connections to resources that may not be used could allow unneeded
connections increasing attack surface and in some cases could lead to opening
connections to resources which the user did not intend to utilize.
Impact:
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled: Do not predict network actions on any network connection:
Computer Configuration\Administrative Templates\Google\Google Chrome\Enable
network prediction
Default Value:
Unset (Same as Enabled with a value of Predict network actions on any network
connection)
Page 210
References:
1. https://chromeenterprise.google/policies/#NetworkPredictionOptions
CIS Controls:
Page 211
3.11 (L1) Ensure 'Enable or disable spell checking web service' is
set to 'Disabled' (Automated)
Profile Applicability:
Description:
Google Chrome can use Google web service to help resolve spelling errors.
The recommended state for this setting is: Disabled (0)
Rationale:
Information typed in may be leaked to Google's spellcheck web service.
Impact:
After disabling this feature, Chrome no longer sends the entire contents of text fields to
Google as you type them. Spell checking can still be performed using a downloaded
dictionary. This setting only controls the usage of the online service.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 0:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:SpellCheckServiceEnabled
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Disabled:
Computer Configuration\Administrative Templates\Google\Google Chrome\Enable
or disable spell checking web service
Default Value:
Unset (Same as Enabled, but user can change)
References:
1. https://chromeenterprise.google/policies/#SpellCheckServiceEnabled
Page 212
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 213
3.12 (L1) Ensure 'Enable reporting of usage and crash-related
data' is set to 'Disabled' (Automated)
Profile Applicability:
Description:
This setting controls anonymous reporting of usage and crash-related data about
Google Chrome to Google.
The recommended state for this setting is: Disabled (0)
NOTE: This setting is not available on Windows instances that are not joined to a
Microsoft® Active Directory® domain.
Rationale:
Anonymous crash/usage data can be used to identify people, companies and
information, which can be considered data ex-filtration from company systems.
Impact:
If this setting is disabled, this information is not sent to Google.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 0:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:MetricsReportingEnabled
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Disabled:
Computer Configuration\Administrative Templates\Google\Google Chrome\Enable
reporting of usage and crash-related data
Default Value:
Unset (Same as Enabled, but user can change)
References:
1. https://chromeenterprise.google/policies/#MetricsReportingEnabled
Page 214
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 215
3.13 (L1) Ensure 'Enable Safe Browsing for trusted sources' is set
to 'Disabled' (Automated)
Profile Applicability:
Description:
Google Chrome can be adjusted to allow downloads without Safe Browsing checks
when the requested file is from a trusted source. Trusted sources can be defined using
recommendation 'Configure the list of domains on which Safe Browsing will not trigger
warnings'.
The recommended state for this setting is: Disabled (0)
NOTE: On Microsoft® Windows®, this functionality is only available on instances that
are joined to a Microsoft® Active Directory® domain, running on Windows 10 Pro, or
enrolled in Chrome Browser Cloud Management.
Rationale:
Information requested from trusted sources shall not be sent to Google's safe browsing
servers.
Impact:
If this setting is disabled, files downloaded from intranet resources will not be checked
by Google Services.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 0:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:SafeBrowsingForTrustedSour
cesEnabled
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Disabled:
Computer Configuration\Administrative Templates\Google\Google Chrome\Enable
Safe Browsing for trusted sources
Default Value:
Page 216
References:
1. https://chromeenterprise.google/policies/#SafeBrowsingForTrustedSourcesEnabl
ed
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 217
3.14 (L2) Ensure 'Enable search suggestions' is set to 'Disabled'
(Automated)
Profile Applicability:
Description:
Google Chrome offers suggestions in Google Chrome's omnibox while a user is typing.
The recommended state for this setting is: Disabled (0)
Rationale:
Using search suggestions may leak information as soon as it is typed/pasted into the
omnibox, e.g. passwords, internal webservices, folder structures, etc.
Impact:
The user has to send the search request actively by using the search button or hitting
"Enter".
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 0:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:SearchSuggestEnabled
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Disabled:
Computer Configuration\Administrative Templates\Google\Google Chrome\Enable
search suggestions
Default Value:
Unset (Same as Enabled, but user can change)
References:
1. https://chromeenterprise.google/policies/#SearchSuggestEnabled
Page 218
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 219
3.15 (L2) Ensure 'Enable Translate' is set to 'Disabled'
(Automated)
Profile Applicability:
Description:
This setting enables Google translation services on Google Chrome.
The recommended state for this setting is: Disabled (0)
Rationale:
Content of internal web pages may be leaked to Google's translation service.
Impact:
After disabling this feature, the contents of a web page are no longer sent to Google for
translation.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 0:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:TranslateEnabled
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Disabled:
Computer Configuration\Administrative Templates\Google\Google Chrome\Enable
Translate
Default Value:
Unset (Same as Enabled, but user can change)
References:
1. https://chromeenterprise.google/policies/#TranslateEnabled
Page 220
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 221
3.16 (L1) Ensure 'Enable URL-keyed anonymized data collection'
is set to 'Disabled' (Automated)
Profile Applicability:
Description:
Google Chrome offers the feature URL-keyed anonymized data collection. This sends
URLs of pages the user visits to Google to optimize its services.
The recommended state for this setting is: Disabled (0)
Rationale:
Anonymized data collection shall be disabled, since it is unclear which information
exactly is sent to Google.
Impact:
Anonymized data will not be sent to Google to help optimize its services
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 0:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:UrlKeyedAnonymizedDataColl
ectionEnabled
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Disabled:
Computer Configuration\Administrative Templates\Google\Google Chrome\Enable
URL-keyed anonymized data collection
Default Value:
Unset (Same as Enabled, but user can change)
References:
1. https://chromeenterprise.google/policies/#UrlKeyedAnonymizedDataCollectionEn
abled
Page 222
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 223
4 Data Loss Prevention
This section contains recommendations to help prevent and protect against unwanted
loss of data. Organizations should review these settings and any potential impacts to
ensure they make sense within the environment, since they restrict some browser
functionality.
Page 224
4.1 Allow or deny screen capture
Page 225
4.1.1 (L2) Ensure 'Allow or deny screen capture' is set to
'Disabled' (Automated)
Profile Applicability:
Description:
This setting controls whether Google Chrome can use screen-share APIs including
web-based online meetings, video, or screen sharing.
The recommended state for this setting is: Disabled (0)
NOTE: This setting is not considered (and a site will be allowed to use screen-share
APIs) if the site matches an origin pattern in any of the following other settings:
ScreenCaptureAllowedByOrigins, WindowCaptureAllowedByOrigins,
TabCaptureAllowedByOrigins, SameOriginTabCaptureAllowedByOrigins.
Rationale:
Allowing screen-share APIs within Google Chrome could potentially allow for sensitive
data to be shared via screen captures.
Impact:
Users will be unable to utilize APIs which support web-based meetings (video
conferencing screen sharing), video, and screen capture. This could potentially cause
disruption to users who may have utilized these abilities in the past.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 0:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:ScreenCaptureAllowed
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Disabled:
Computer Configuration\Policies\Administrative Templates\Google\Google
Chrome\Allow or deny screen capture\Allow or deny screen capture
Default Value:
Unset (Same as Enabled, but user can change)
Page 226
References:
1. https://chromeenterprise.google/policies/#ScreenCaptureAllowed
CIS Controls:
Page 227
4.2 Content settings
Page 228
4.2.1 (L2) Ensure 'Control use of the Serial API' is set to 'Enabled:
Do not allow any site to request access to serial ports via the
Serial API' (Automated)
Profile Applicability:
Description:
This setting controls website access and use of the system serial port.
• Do not allow any site to request access to serial ports via the Serial
API (2)
• Allow sites to ask the user to grant access to a serial port (3)
The recommended state for this setting is: Do not allow any site to request access
to serial ports via the Serial API (2)
NOTE: If more granular control is needed (per website) then this setting can be used in
combination with the SerialAllowAllPortsForUrls, SerialAskForUrls and
SerialBlockedForUrls settings. For example, SerialAllowAllPortsForUrls can be used to
allow serial port access to specific sites. Please see the references below for more
information.
Rationale:
Preventing access to system serial ports may prevent malicious sites from using these
ports and accessing the devices attached.
Impact:
This setting would also prevent legitimate sites from accessing it as well.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 2:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:DefaultSerialGuardSetting
Page 229
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled: Do not allow any site to request access to serial ports via the
Serial API:
Default Value:
Unset (Same as Enabled with Allow sites to ask the user to grant access to a serial port,
but user can change)
References:
1. https://chromeenterprise.google/policies/#DefaultSerialGuardSetting
2. https://chromeenterprise.google/policies/#SerialAskForUrls
3. https://chromeenterprise.google/policies/#SerialBlockedForUrls
4. https://chromeenterprise.google/policies/#SerialAllowAllPortsForUrls
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 230
4.2.2 (L2) Ensure 'Default Sensors Setting' is set to 'Enabled: Do
not allow any site to access sensors' (Automated)
Profile Applicability:
Description:
This setting controls website access and use of system sensors such as motion and
light.
The recommended state for this setting is: Do not allow any site to access sensors
(2)
The recommended state for this setting is: Enabled with a value of Do not allow any
site to access sensors
NOTE: If more granular control is needed (per website) then this setting can be used in
combination with the SensorsAllowedForUrls and SensorsBlockedForUrls settings. For
example, SensorsAllowedForUrls can be used to allow sensor access to specific sites.
Please see the references below for more information.
Rationale:
Preventing access to system sensors may prevent malicious sites from using these
sensors for user profiling (OpSec).
Impact:
This setting would also prevent legitimate sites from accessing it as well.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 2:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:DefaultSensorsSetting
Page 231
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled: Do not allow any site to access sensors:
Computer Configuration\Administrative Templates\Google\Google Chrome\Content
settings\Default sensors setting
Default Value:
Unset (Same as Enabled with a value of Allow sites to access sensors, but user can
change)
References:
1. https://chromeenterprise.google/policies/#DefaultSensorsSetting
2. https://chromeenterprise.google/policies/#SensorsAllowedForUrls
3. https://chromeenterprise.google/policies/#SensorsBlockedForUrls
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 232
4.2.3 (L1) Ensure 'Allow clipboard for these sites' Is Configured
(Manual)
Profile Applicability:
Description:
This setting allows administrators to list specific sites that have access to the clipboard
site permissions.
Note: This does not include using keyboard shortcuts. Those are not gated by the
clipboard site permission.
Rationale:
Setting this policy allows specified URLs to have access to the clipboard site
permissions. This will allow the specified sites to have access to data on the clipboard
that other sites do not. DefaultClipboardSetting is recommended to be set to
disabled, so this list would be the only sites that would have access to the clipboard
data.
Impact:
Enforcing this recommendation can cause the clipboard functionality to not work
identically for every site.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set individually to your organization's allowed URLs:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\ClipboardAllowedForUrls\<n
umber> = <url>
Example:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\ClipboardAllowedForUrls\1
= https://www.example.com
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\ClipboardAllowedForUrls\2
= [*.]example.edu
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\ClipboardAllowedForUrls\3
= https://www.example.net
Page 233
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled and set Show to the approved URLs:
Computer Configuration\Policies\Administrative Templates\Google\Google
Chrome\Content settings\Allow clipboard on these sites
Default Value:
DefaultClipboardSetting applies to all sites
References:
1. https://chromeenterprise.google/policies/#ClipboardAllowedForUrls
2. https://chromeenterprise.google/policies/url-patterns/
CIS Controls:
Page 234
4.2.4 (L1) Ensure 'Block clipboard on these sites' Is Configured
(Manual)
Profile Applicability:
Description:
This setting allows administrators to list specific sites that do not have access to the
clipboard site permissions.
Note: This does not include using keyboard shortcuts. Those are not gated by the
clipboard site permission.
Rationale:
Specifying URLs that do not have access to the clipboard site permissions limits data
for sites that have access to data on the clipboard, and allows for more sites to have
access.
Setting this policy denies specified URLs to have access to the clipboard site
permissions. This will limit the specified sites to access the data on the clipboard that
other sites do. DefaultClipboardSetting is recommended to be set to disabled, so this
list would be a backup to that policy in case it was enabled, left as the default, or
removed.
Impact:
Enforcing this recommendation can cause the clipboard functionality to not work
identically for every site.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set individually to your organization's blocked URLs:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\ClipboardBlockedForUrls\<n
umber> = <url>
Example:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\ClipboardBlockedForUrls\1
= https://www.example.com
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\ClipboardBlockedForUrls\2
= [*.]example.edu
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\ClipboardBlockedForUrls3 =
https://www.example.net
Page 235
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled and set Show to the blocked URLs:
Computer Configuration\Policies\Administrative Templates\Google\Google
Chrome\Content settings\Block clipboard on these sites
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 236
4.2.5 (L1) Ensure 'Default clipboard setting' Is 'Enabled' to 'Deny
Permissions' (Automated)
Profile Applicability:
Description:
This setting controls the defaults for clipboard permission access from sites. It can be
configured to either:
• Disabled (2): Does not allow access to the clipboard site permission by any site
• Enabled (3): Sites ask the user to allow access to the clipboard site permission
If the value for DefaultClipboardSetting is not changed from the default, it will behave
as if it is enabled. ClipboardAllowedForUrls or ClipboardBlockedForUrls will override
this setting for any site that matches the configured URL patterns.
With the setting disabled, organizations will need to set ClipboardAllowedForUrls for
any URLs they want to make exempt.
Rationale:
The clipboard stores data, text, and images that are shared between all applications. An
organization would disable clipboard access to restrict sites from reading the contents of
the clipboard when visiting.
Impact:
Not allowing sites to have access to the clipboard permission can cause issues with
formatting or access to needed images on the clipboard.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 2:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:DefaultClipboardSetting
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled: Do not allow any site to use the clipboard site permission:
Computer Configuration\Policies\Administrative Templates\Google\Google
Chrome\Content settings\Default clipboard setting
Page 237
Default Value:
Allow clipboard permission access
References:
1. https://chromeenterprise.google/policies/#DefaultClipboardSetting
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 238
4.2.6 (L2) Ensure 'Default Window Management permissions
setting' Is 'Enabled' to 'Deny Permission' (Automated)
Profile Applicability:
Description:
This setting can automatically deny access to the window management permissions by
sites. It can be configured to either:
• Disabled (2): Does not allow access to the Window Management permission by
any site
• Enabled (3): A site must ask the user any time it wants to access the Window
Management permission.
If the value for DefaultWindowManagementSetting is not changed from the default, it will
behave as if it is enabled. WindowManagementAllowedForUrls or
WindowManagementBlockedForUrls will override this setting for any site that matches the
configured URL patterns.
Rationale:
Denying access to Window Management can block rogue sites from opening additional
browser windows. By blocking the additional windows, an organization could stop
instances of nefarious sites being opened in locations of which the user is unaware.
Impact:
Disabling this would take away the functionality of the user to decide what sites get
access to the Window Management permission and could impact organizational
required URLs.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 2:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:DefaultWindowManagementSet
ting
Page 239
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled and Denies the Window Management permission on all sites by default:
Computer Configuration\Policies\Administrative Templates\Google\Google
Chrome\Content settings\Default Window Management permission setting
Default Value:
Allow Window Management permission access
References:
1. https://chromeenterprise.google/policies/#DefaultWindowManagementSetting
CIS Controls:
Page 240
4.2.7 (L2) Ensure 'Allow Window Management permission on
these sites' Is Configured (Manual)
Profile Applicability:
Description:
This setting can automatically allow access to the window management permissions for
specific sites.
If the value for WindowManagementAllowedForUrls is not changed from the default, it will
follow the configuration of DefaultWindowManagementSetting.
Rationale:
Allowing only specific sites to have access to Window Management will only allow
permitted sites to see information about the device's screens, open additional browser
windows specifying location, and size of the window.
Impact:
Enforcing this recommendation can cause visited sites to not display as intended.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set individually to your organization's allowed URLs:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\WindowManagementAllowedFor
Urls\<number> = <url>
Example:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\WindowManagementAllowedFor
Urls\1 = https://www.example.com
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\WindowManagementAllowedFor
Urls\2 = [*.]example.edu
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\WindowManagementAllowedFor
Urls\3 = https://www.example.net
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled and set Show to the approved URLs:
Computer Configuration\Policies\Administrative Templates\Google\Google
Chrome\Content settings\Allow Window Management permission on these sites
Page 241
References:
1. https://chromeenterprise.google/policies/#WindowManagementAllowedForUrls
CIS Controls:
Page 242
4.2.8 (L2) Ensure 'Block Window Management permission on
these sites' Is Configured (Manual)
Profile Applicability:
Description:
This setting can automatically deny access to the window management permissions for
specific sites. It can be configured to either:
If the value for WindowManagementBlockedForUrls is not changed from the default, it will
follow the configuration of DefaultWindowManagementSetting.
Rationale:
Specifying URLs that do not have access to the window management permissions limits
data for sites that have access to data on the clipboard, and allows for more sites to
have access.
Impact:
Enforcing this recommendation can cause visited sites to not display as intended.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set individually to your organization's allowed URLs:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\WindowManagementBlockedFor
Urls\<number> = <url>
Example:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\WindowManagementBlockedFor
Urls\1 = https://www.example.com
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\WindowManagementBlockedFor
Urls\2 = [*.]example.edu
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\WindowManagementBlockedFor
Urls\3 = https://www.example.net
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled and set Show to the blocked URLs:
Computer Configuration\Policies\Administrative Templates\Google\Google
Chrome\Content settings\Block Window Management permission on these sites
Page 243
References:
1. https://chromeenterprise.google/policies/#WindowManagementBlockedForUrls
CIS Controls:
Page 244
4.3 (L2) Ensure 'Allow invocation of file selection dialogs' is set to
'Disabled' (Automated)
Profile Applicability:
Description:
This setting allows access to local files by allowing file selection dialogs in Google
Chrome.
The recommended state for this setting is: Disabled (0)
Rationale:
Allowing users to import favorites, upload files, and save links could pose potential
security risks by allowing data to be uploaded to external sites or by downloading
malicious files. By not allowing the file selection dialog, the end-user will not be
prompted for uploads/downloads, preventing data exfiltration and possible system
infection by malware.
Impact:
If you disable this setting, users will no longer be prompted when performing actions
which would trigger a file selection dialog. Instead, the file selection dialog box assumes
the user clicked "Cancel". Being as this is not the default behavior, impact to the user
will be noticeable, and the user will not be able to upload and download files.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 0:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:AllowFileSelectionDialogs
Remediation:
To establish the recommended configuration via GP, set the following UI path to
Disabled:
Default Value:
Unset (Same as Enabled, but user can change)
Page 245
References:
1. https://chromeenterprise.google/policies/#AllowFileSelectionDialogs
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 246
4.4 (L2) Ensure 'Allow or deny audio capture' is set to 'Disabled'
(Automated)
Profile Applicability:
Description:
This setting allows administrators to set whether the end-user is prompted for access to
audio capture devices.
• Disabled (0): Turns off prompts and audio capture will only work for URLs
configured in the AudioCaptureAllowedUrls list.
• Enabled (1): With the exception of URLs set in the AudioCaptureAllowedUrls list,
users get prompted for audio capture access.
NOTE: The setting affects all audio input (not just the built-in microphone).
The recommended state for this setting is: Disabled
Rationale:
The end-user having the ability to allow or deny audio capture for websites in Google
Chrome could open an organization up to a malicious site that may capture proprietary
information through the browser. By limiting or disallowing audio capture, it removes the
end-user's discretion, leaving it up to the organization which sites are allowed to use this
ability.
Impact:
If you disable this setting, users will not be prompted for audio devices when using
websites which may need this access, such as a web-based conferencing system. If
there are sites which access will be allowed, configuration of the
AudioCaptureAllowedUrls setting will be necessary.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 0:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:AudioCaptureAllowed
Page 247
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Disabled:
Computer Configuration\Administrative Templates\Google\Google Chrome\Allow or
deny audio capture
Default Value:
Unset (Same as Enabled, but user can change)
References:
1. https://chromeenterprise.google/policies/#AudioCaptureAllowed
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 248
4.5 (L2) Ensure 'Allow or deny video capture' is set to 'Disabled'
(Automated)
Profile Applicability:
Description:
This setting allows administrators to set whether the end-user is prompted for access to
video capture devices.
• Disabled (0): Turns off prompts and video capture will only work for URLs
configured in the VideoCaptureAllowedUrls list.
• Enabled (1): With the exception of URLs set in the VideoCaptureAllowedUrls list,
users get prompted for video capture access.
NOTE: The setting affects all video input (not just the built-in camera).
The recommended state for this setting is: Disabled (0)
Rationale:
The end-user having the ability to allow or deny video capture for websites in Google
Chrome could open an organization up to a malicious site that may capture proprietary
information through the browser. By limiting or disallowing video capture, it removes the
end-user's discretion, leaving it up to the organization which sites are allowed to use this
ability.
Impact:
If you disable this setting, users will not be prompted for video devices when using
websites which may need this access, such as a web-based conferencing system. If
there are sites which access will be allowed, configuration of the
VideoCaptureAllowedUrls setting will be necessary.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 0:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:VideoCaptureAllowed
Page 249
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Disabled:
Computer Configuration\Administrative Templates\Google\Google Chrome\Allow or
deny video capture
Default Value:
Unset (Same as Enabled, but user can change)
References:
1. https://chromeenterprise.google/policies/#VideoCaptureAllowed
2. https://chromeenterprise.google/policies/#VideoCaptureAllowedUrls
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 250
4.6 (L1) Ensure 'Allow user feedback' is set to 'Disabled'
(Automated)
Profile Applicability:
Description:
This setting controls whether users are able to utilize the Chrome feedback feature to
send feedback, suggestions, and surveys to Google, as well as issue reports.
The recommended state for this setting is: Disabled (0)
Rationale:
Data should not be shared with third-party vendors in an enterprise managed
environment.
Impact:
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Disabled:
Computer Configuration\Policies\Administrative Templates\Google\Google
Chrome\Allow user feedback
Default Value:
Unset (Same as Enabled, but user can change)
References:
1. https://chromeenterprise.google/policies/#UserFeedbackAllowed
Page 251
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 252
4.7 (L2) Ensure 'Controls the mode of DNS-over-HTTPS' is set to
'Enabled: DNS-over-HTTPS without insecure fallback'
(Automated)
Profile Applicability:
Description:
This controls the mode of the DNS-over-HTTPS resolver. Please note that this setting
will only set the default mode for each query. The mode may be overridden for special
types of queries, such as requests to resolve a DNS-over-HTTPS server hostname.
The recommended state for this setting is: Enabled with a value of Enable DNS-over-
HTTPS without insecure fallback (secure)
Rationale:
DNS over HTTPS (DOH) has a couple primary benefits:
1. Encrypting DNS name resolution traffic helps to hide your online activities, since
DoH hides the name resolution requests from the ISP and from anyone listening
on intermediary networks.
2. DoH also helps to prevent DNS spoofing and man-in-the-middle (MitM) attacks.
Impact:
Not all DNS providers support DOH, so choice is limited. Also, Enterprises sometimes
monitor DNS requests to block access to malicious or inappropriate sites. DNS
monitoring can also sometimes be used to detect malware attempting to "phone home."
Because DoH encrypts name resolution requests, it can create a security monitoring
blind spot.
Page 253
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to secure:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:DnsOverHttpsMode
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled: Enable DNS-over-HTTPS without insecure fallback:
Computer Configuration\Policies\Administrative Templates\Google\Google
Chrome\Controls the mode of DNS-over-HTTPS
Default Value:
Unset (Same as Enable DNS-over-HTTPS with insecure fallback (automatic). If any
policy is set, either through being domain-joined or active policy with cloud management
(or profile lists), then it sometimes reverts to Disable DNS-over-HTTPS and users can’t
change it.
References:
1. https://chromeenterprise.google/policies/#DnsOverHttpsMode
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 254
4.8 (L2) Ensure 'Enable AutoFill for addresses' is set to 'Disabled'
(Automated)
Profile Applicability:
Description:
Chrome allows users to auto-complete web forms with saved information such as
address or phone number. Disabling this feature will prompt a user to enter all
information manually.
The recommended state for this setting is: Disabled (0)
Rationale:
If an attacker gains access to a user's machine where the user has stored address
AutoFill data, information could be harvested.
Impact:
If this setting is disabled, AutoFill will be inaccessible to users.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 0:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:AutofillAddressEnabled
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Disabled:
Computer Configuration\Administrative Templates\Google\Google Chrome\Enable
AutoFill for addresses
Default Value:
Unset (Same as Enabled, but user can change)
References:
1. https://chromeenterprise.google/policies/#AutofillAddressEnabled
Page 255
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 256
4.9 (L1) Ensure 'Enable AutoFill for credit cards' is set to
'Disabled' (Automated)
Profile Applicability:
Description:
Chrome allows users to auto-complete web forms with saved credit card information.
Disabling this feature will prompt a user to enter all information manually.
The recommended state for this setting is: Disabled (0)
Rationale:
If an attacker gains access to a user's machine where the user has stored credit card
AutoFill data, information could be harvested.
Impact:
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Disabled:
Computer Configuration\Administrative Templates\Google\Google Chrome\Enable
AutoFill for credit cards
Default Value:
Unset (Same as Enabled, but user can change)
References:
1. https://chromeenterprise.google/policies/#AutofillCreditCardEnabled
Page 257
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 258
4.10 (L1) Ensure 'Import saved passwords from default browser
on first run' is set to 'Disabled' (Automated)
Profile Applicability:
Description:
This setting controls if saved passwords from the default browser can be imported (on
first run and later manually).
The recommended state for this setting is: Disabled (0)
Rationale:
In Chrome, passwords can be stored in plain-text and revealed by clicking the “show”
button next to the password field by going to chrome://settings/passwords/.
Impact:
If this setting is disabled, saved passwords from other browsers are not imported.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 0:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:ImportSavedPasswords
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Disabled:
Computer Configuration\Administrative Templates\Google\Google Chrome\Import
saved passwords from default browser on first run
Default Value:
Unset (Same as Enabled, but user can change)
References:
1. https://chromeenterprise.google/policies/#ImportSavedPasswords
Page 259
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 260
4.11 (L1) Ensure 'List of types that should be excluded from
synchronization' is set to 'Enabled: passwords' (Automated)
Profile Applicability:
Description:
This setting allows you to specify data types that will be limited/excluded from uploading
data to the Google Chrome synchronization service.
The recommended state for this setting is: Enabled with the following text value
passwords (Case Sensitive)
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled: passwords (Case Sensitive):
Computer Configuration\Policies\Administrative Templates\Google\Google
Chrome\List of types that should be excluded from synchronization
Default Value:
Unset (Same as Disabled, but user can change)
Page 261
References:
1. https://chromeenterprise.google/policies/#SyncTypesListDisabled
CIS Controls:
Page 262
4.12 (L2) Ensure 'Allow or deny screen capture' is set to
'Disabled' (Automated)
Profile Applicability:
Description:
If enabled or not configured (default), a Web page can use screen-share APIs (e.g.,
getDisplayMedia() or the Desktop Capture extension API) to prompt the user to select a
tab, window, or desktop to capture.
Rationale:
The end-user having the ability to allow or deny screen capture for websites in Google
Chrome could open an organization up to a malicious site that may capture proprietary
information through the browser. By limiting or disallowing screen capture, it removes
the end-user's discretion, leaving it up to the organization which sites are allowed to use
this ability.
Impact:
When this policy is disabled, any calls to screen-share APIs will fail with an error. This
policy is not considered (and a site will be allowed to use screen-share APIs) if the site
matches an origin pattern in any of the following policies:
ScreenCaptureAllowedByOrigins, WindowCaptureAllowedByOrigins,
TabCaptureAllowedByOrigins, SameOriginTabCaptureAllowedByOrigins.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 0:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:ScreenCaptureAllowed
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Disabled:
Computer Configuration\Policies\Administrative Templates\Google\Google
Chrome\Allow or deny screen capture\Allow or deny screen capture
Default Value:
Page 263
References:
1. https://chromeenterprise.google/policies/#ScreenCaptureAllowed
2. https://chromeenterprise.google/policies/#SameOriginTabCaptureAllowedByOrigi
ns
3. https://chromeenterprise.google/policies/#ScreenCaptureAllowedByOrigins
4. https://chromeenterprise.google/policies/#TabCaptureAllowedByOrigins
5. https://chromeenterprise.google/policies/#WindowCaptureAllowedByOrigins
CIS Controls:
Page 264
5 Forensics (Post Incident)
This section contains recommendations to help in post-incident forensics and analysis.
Organizations should review these settings and any potential impacts to ensure they
make sense within their environment.
Page 265
5.1 (L2) Ensure 'Enable guest mode in browser' is set to
'Disabled' (Automated)
Profile Applicability:
Description:
This setting controls whether a user may utilize guest profiles in Google Chrome.
The recommended state for this setting is: Disabled (0)
Rationale:
In a guest profile, the browser doesn't import browsing data from existing profiles, and it
deletes browsing data when all guest profiles are closed.
Deleting browser data will delete information that may be important for a computer
investigation, and investigators such as Computer Forensics Analysts may not be able
to retrieve pertinent information to the investigation.
Impact:
Users will not be able to initiate Guest mode for Google Chrome.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 0:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:BrowserGuestModeEnabled
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Disabled:
Computer Configuration\Policies\Administrative Templates\Google\Google
Chrome\Enable guest mode in browser
Default Value:
Unset (Same as Enabled, but user can change)
References:
1. https://chromeenterprise.google/policies/#BrowserGuestModeEnabled
Page 266
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 267
5.2 (L2) Ensure 'Incognito mode availability' is set to 'Enabled:
Incognito mode disabled' (Automated)
Profile Applicability:
Description:
Specifies whether the user may open pages in Incognito mode in Google Chrome. The
possible values are:
The recommended state for this setting is: Enabled: Incognito mode disabled (1)
Rationale:
Incognito mode in Chrome gives you the choice to browse the internet without your
activity being saved to your browser or device.
Allowing users to use the browser without any information being saved can hide
evidence of malicious behaviors. This information may be important for a computer
investigation, and investigators such as Computer Forensics Analysts may not be able
to retrieve pertinent information to the investigation.
Impact:
Users will not be able to initiate Incognito mode for Google Chrome.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to 1:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:IncognitoModeAvailability
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled: Incognito mode disabled:
Computer Configuration\Policies\Administrative Templates\Google\Google
Chrome\Incognito mode availability
Page 268
Default Value:
Unset (Same as Enabled, but user can change)
References:
1. https://chromeenterprise.google/policies/#IncognitoModeAvailability
CIS Controls:
Page 269
5.3 (L1) Ensure 'Set disk cache size, in bytes' is set to 'Enabled:
250609664' (Automated)
Profile Applicability:
Description:
This setting controls the size of the cache, in bytes, used to store files on the disk.
The recommended state for this setting is: Enabled: 250609664 or greater
NOTE The value specified in this setting isn't a hard boundary but rather a suggestion to
the caching system; any value below a few megabytes is too small and will be rounded
up to a reasonable minimum.
Rationale:
Having enough disk space for browser cache is important for a computer investigation
and for investigators such as Computer Forensics Analysts to be able to retrieve
pertinent information to the investigation.
Impact:
Browser cache will take up to 250MB in disk space.
Audit:
Navigate to the UI Path articulated in the Remediation section and confirm it is set as
prescribed. This group policy setting is backed by the following registry location which
should be set to ef00000 (250609664 in hexadecimal format):
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome:DiskCacheSize
Remediation:
To establish the recommended configuration via Group Policy, set the following UI path
to Enabled: 250609664:
Computer Configuration\Policies\Administrative Templates\Google\Google
Chrome\Set disk cache size in bytes
Default Value:
Unset (Same as Enabled with a system managed smaller default size, but the user can
change)
References:
1. https://chromeenterprise.google/policies/#DiskCacheSize
Page 270
CIS Controls:
Controls
Control IG 1 IG 2 IG 3
Version
Page 271
Appendix: Summary Table
CIS Benchmark Recommendation Set
Correctly
Yes No
1 Enforced Defaults
Page 272
CIS Benchmark Recommendation Set
Correctly
Yes No
Page 273
CIS Benchmark Recommendation Set
Correctly
Yes No
1.25 (L1) Ensure 'List of names that will bypass the HSTS
policy check' is set to 'Disabled' (Automated)
1.29 (L1) Ensure 'URLs for which local IPs are exposed in
WebRTC ICE candidates' is set to 'Disabled'
(Automated)
Page 274
CIS Benchmark Recommendation Set
Correctly
Yes No
2.2.2 (L2) Ensure 'Control use of the Web Bluetooth API' is set
to 'Enabled: Do not allow any site to request access to
Bluetooth devices via the Web Bluetooth API'
(Automated)
2.3 Extensions
Page 275
CIS Benchmark Recommendation Set
Correctly
Yes No
2.7 Printing
Page 276
CIS Benchmark Recommendation Set
Correctly
Yes No
2.14 (L1) Ensure 'Require Site Isolation for every site' is set to
'Enabled' (Automated)
2.19 (L1) Ensure 'Set the time period for update notifications'
is set to 'Enabled: 86400000' (Automated)
Page 277
CIS Benchmark Recommendation Set
Correctly
Yes No
2.31 (L1) Ensure 'Enable strict MIME type checking for worker
scripts' Is Enabled (Automated)
3 Privacy
Page 278
CIS Benchmark Recommendation Set
Correctly
Yes No
Page 279
CIS Benchmark Recommendation Set
Correctly
Yes No
Page 280
CIS Benchmark Recommendation Set
Correctly
Yes No
Page 281
CIS Benchmark Recommendation Set
Correctly
Yes No
Page 282
Appendix: CIS Controls v7 IG 1 Mapped
Recommendations
Recommendation Set
Correctly
Yes No
1.5 (L1) Ensure 'Allow the audio sandbox to run' is set to
'Enabled'
1.9 (L1) Ensure 'Determine the availability of variations' is set
to 'Enable all variations'
1.13 (L1) Ensure 'Disable saving browser history' is set to
'Disabled'
1.15 (L1) Ensure 'Enable component updates in Google
Chrome' is set to 'Enabled'
1.19 (L1) Ensure 'Enable third party software injection
blocking' is set to 'Enabled'
1.28 (L1) Ensure 'Suppress the unsupported OS warning' is
set to 'Disabled'
2.1.1 (L1) Ensure 'Update policy override' is set to 'Enabled'
with 'Always allow updates (recommended)' or 'Automatic
silent updates' specified
2.3.6 (L2) Ensure 'Control Manifest v2 extension availability' Is
Set to Forced Only
2.3.7 (L1) Ensure 'Control availability of extensions
unpublished on the Chrome Web Store' Is Disabled
2.11 (L1) Ensure 'Allow download restrictions' is set to
'Enabled: Block malicious downloads'
2.14 (L1) Ensure 'Require Site Isolation for every site' is set to
'Enabled'
2.16 (L1) Ensure 'Notify a user that a browser relaunch or
device restart is recommended or required' is set to
'Enabled: Show a recurring prompt to the user indication
that a relaunch is required'
2.19 (L1) Ensure 'Set the time period for update notifications'
is set to 'Enabled: 86400000'
2.25 (L1) Ensure 'Allow file or directory picker APIs to be
called without prior user gesture' Is Disabled
Page 283
Recommendation Set
Correctly
Yes No
3.16 (L1) Ensure 'Enable URL-keyed anonymized data
collection' is set to 'Disabled'
Page 284
Appendix: CIS Controls v7 IG 2 Mapped
Recommendations
Recommendation Set
Correctly
Yes No
1.2.1 (L1) Ensure 'Configure the list of domains on which Safe
Browsing will not trigger warnings' is set to 'Disabled'
1.2.2 (L1) Ensure 'Safe Browsing Protection Level' is set to
'Enabled: Safe Browsing is active in the standard mode.'
or higher
1.3 (L1) Ensure 'Allow Google Cast to connect to Cast
devices on all IP addresses' is set to 'Disabled'
1.4 (L1) Ensure 'Allow queries to a Google time service' is
set to 'Enabled'
1.5 (L1) Ensure 'Allow the audio sandbox to run' is set to
'Enabled'
1.7 (L1) Ensure 'Continue running background apps when
Google Chrome is closed' is set to 'Disabled'
1.8 (L2) Ensure 'Control SafeSites adult content filtering' is
set to 'Enabled: Filter top level sites (but not embedded
iframes) for adult content'
1.9 (L1) Ensure 'Determine the availability of variations' is set
to 'Enable all variations'
1.13 (L1) Ensure 'Disable saving browser history' is set to
'Disabled'
1.14 (L1) Ensure 'DNS interception checks enabled' is set to
'Enabled'
1.15 (L1) Ensure 'Enable component updates in Google
Chrome' is set to 'Enabled'
1.18 (L1) Ensure 'Enable security warnings for command-line
flags' is set to 'Enabled'
1.19 (L1) Ensure 'Enable third party software injection
blocking' is set to 'Enabled'
1.20 (L1) Ensure 'Enables managed extensions to use the
Enterprise Hardware Platform API' is set to 'Disabled'
1.21 (L1) Ensure 'Ephemeral profile' is set to 'Disabled'
Page 285
Recommendation Set
Correctly
Yes No
1.22 (L1) Ensure 'Import autofill form data from default
browser on first run' is set to 'Disabled'
1.23 (L1) Ensure 'Import of homepage from default browser
on first run' is set to 'Disabled'
1.24 (L1) Ensure 'Import search engines from default browser
on first run' is set to 'Disabled'
1.25 (L1) Ensure 'List of names that will bypass the HSTS
policy check' is set to 'Disabled'
1.27 (L1) Ensure 'Suppress lookalike domain warnings on
domains' is set to 'Disabled'
1.28 (L1) Ensure 'Suppress the unsupported OS warning' is
set to 'Disabled'
1.29 (L1) Ensure 'URLs for which local IPs are exposed in
WebRTC ICE candidates' is set to 'Disabled'
2.1.1 (L1) Ensure 'Update policy override' is set to 'Enabled'
with 'Always allow updates (recommended)' or 'Automatic
silent updates' specified
2.2.1 (L1) Ensure 'Control use of insecure content exceptions'
is set to 'Enabled: Do not allow any site to load mixed
content'
2.2.2 (L2) Ensure 'Control use of the Web Bluetooth API' is set
to 'Enabled: Do not allow any site to request access to
Bluetooth devices via the Web Bluetooth API'
2.2.3 (L2) Ensure 'Control use of the WebUSB API' is set to
'Enabled: Do not allow any site to request access to USB
devices via the WebUSB API'
2.2.5 (L1) Ensure 'Allow local file access to file:// URLs on
these sites in the PDF Viewer' Is Disabled
2.3.1 (L1) Ensure 'Blocks external extensions from being
installed' is set to 'Enabled'
2.3.2 (L1) Ensure 'Configure allowed app/extension types' is
set to 'Enabled: extension, hosted_app, platform_app,
theme'
2.3.3 (L1) Ensure 'Configure extension installation blocklist' is
set to 'Enabled: *'
2.3.4 (L2) Ensure 'Default third-party storage partitioning
setting' Is Enabled and Blocked
Page 286
Recommendation Set
Correctly
Yes No
2.3.5 (L1) Ensure 'Block third-party storage partitioning for
these origins' Is Configured
2.3.6 (L2) Ensure 'Control Manifest v2 extension availability' Is
Set to Forced Only
2.3.7 (L1) Ensure 'Control availability of extensions
unpublished on the Chrome Web Store' Is Disabled
2.4.1 (L2) Ensure 'Supported authentication schemes' is set to
'Enabled: ntlm, negotiate'
2.5.1 (L2) Ensure 'Configure native messaging blocklist' is set
to 'Enabled: *'
2.6.1 (L1) Ensure 'Enable saving passwords to the password
manager' is Explicitly Configured
2.7.1 (L1) Ensure 'Enable Google Cloud Print Proxy' is set to
'Disabled'
2.10.1 (L1) Ensure 'Allow automatic sign-in to Microsoft cloud
identity providers' Is Enabled
2.11 (L1) Ensure 'Allow download restrictions' is set to
'Enabled: Block malicious downloads'
2.12 (L2) Ensure 'Allow proceeding from the SSL warning
page' is set to 'Disabled'
2.13 (L1) Ensure 'Disable proceeding from the Safe Browsing
warning page' is set to 'Enabled'
2.14 (L1) Ensure 'Require Site Isolation for every site' is set to
'Enabled'
2.15 (L2) Ensure 'Force Google SafeSearch' is set to
'Enabled'
2.16 (L1) Ensure 'Notify a user that a browser relaunch or
device restart is recommended or required' is set to
'Enabled: Show a recurring prompt to the user indication
that a relaunch is required'
2.19 (L1) Ensure 'Set the time period for update notifications'
is set to 'Enabled: 86400000'
2.21 (L1) Ensure 'Allow reporting of domain reliability related
data' Is Disabled
2.25 (L1) Ensure 'Allow file or directory picker APIs to be
called without prior user gesture' Is Disabled
Page 287
Recommendation Set
Correctly
Yes No
2.26 (L1) Ensure 'Enable Google Search Side Panel' Is
Disabled
2.28 (L1) Ensure 'Enable automatic HTTPS upgrades' Is
Enabled
2.30 (L1) Ensure 'Enable Renderer App Container' Is Enabled
3.1.2 (L1) Ensure 'Default geolocation setting' is set to
'Enabled: Do not allow any site to track the users'
physical location'
3.2.1 (L1) Ensure 'Enable Google Cast' is set to 'Disabled'
3.3 (L1) Ensure 'Allow websites to query for available
payment methods' is set to 'Disabled'
3.4 (L1) Ensure 'Block third party cookies' is set to 'Enabled'
3.5 (L2) Ensure 'Browser sign in settings' is set to 'Enabled:
Disabled browser sign-in'
3.6 (L1) Ensure 'Control how Chrome Cleanup reports data
to Google' is set to 'Disabled'
3.7 (L1) Ensure 'Disable synchronization of data with Google'
is set to 'Enabled'
3.8 (L1) Ensure 'Enable alternate error pages' is set to
'Disabled'
3.9 (L1) Ensure 'Enable deleting browser and download
history' is set to 'Disabled'
3.11 (L1) Ensure 'Enable or disable spell checking web
service' is set to 'Disabled'
3.12 (L1) Ensure 'Enable reporting of usage and crash-related
data' is set to 'Disabled'
3.13 (L1) Ensure 'Enable Safe Browsing for trusted sources' is
set to 'Disabled'
3.14 (L2) Ensure 'Enable search suggestions' is set to
'Disabled'
3.15 (L2) Ensure 'Enable Translate' is set to 'Disabled'
3.16 (L1) Ensure 'Enable URL-keyed anonymized data
collection' is set to 'Disabled'
4.2.1 (L2) Ensure 'Control use of the Serial API' is set to
'Enabled: Do not allow any site to request access to
serial ports via the Serial API'
Page 288
Recommendation Set
Correctly
Yes No
4.2.2 (L2) Ensure 'Default Sensors Setting' is set to 'Enabled:
Do not allow any site to access sensors'
4.2.4 (L1) Ensure 'Block clipboard on these sites' Is Configured
4.2.5 (L1) Ensure 'Default clipboard setting' Is 'Enabled' to
'Deny Permissions'
4.4 (L2) Ensure 'Allow or deny audio capture' is set to
'Disabled'
4.5 (L2) Ensure 'Allow or deny video capture' is set to
'Disabled'
4.6 (L1) Ensure 'Allow user feedback' is set to 'Disabled'
4.8 (L2) Ensure 'Enable AutoFill for addresses' is set to
'Disabled'
4.9 (L1) Ensure 'Enable AutoFill for credit cards' is set to
'Disabled'
4.10 (L1) Ensure 'Import saved passwords from default
browser on first run' is set to 'Disabled'
5.1 (L2) Ensure 'Enable guest mode in browser' is set to
'Disabled'
5.3 (L1) Ensure 'Set disk cache size, in bytes' is set to
'Enabled: 250609664'
Page 289
Appendix: CIS Controls v7 IG 3 Mapped
Recommendations
Recommendation Set
Correctly
Yes No
1.2.1 (L1) Ensure 'Configure the list of domains on which Safe
Browsing will not trigger warnings' is set to 'Disabled'
1.2.2 (L1) Ensure 'Safe Browsing Protection Level' is set to
'Enabled: Safe Browsing is active in the standard mode.'
or higher
1.3 (L1) Ensure 'Allow Google Cast to connect to Cast
devices on all IP addresses' is set to 'Disabled'
1.4 (L1) Ensure 'Allow queries to a Google time service' is
set to 'Enabled'
1.5 (L1) Ensure 'Allow the audio sandbox to run' is set to
'Enabled'
1.7 (L1) Ensure 'Continue running background apps when
Google Chrome is closed' is set to 'Disabled'
1.8 (L2) Ensure 'Control SafeSites adult content filtering' is
set to 'Enabled: Filter top level sites (but not embedded
iframes) for adult content'
1.9 (L1) Ensure 'Determine the availability of variations' is set
to 'Enable all variations'
1.13 (L1) Ensure 'Disable saving browser history' is set to
'Disabled'
1.14 (L1) Ensure 'DNS interception checks enabled' is set to
'Enabled'
1.15 (L1) Ensure 'Enable component updates in Google
Chrome' is set to 'Enabled'
1.18 (L1) Ensure 'Enable security warnings for command-line
flags' is set to 'Enabled'
1.19 (L1) Ensure 'Enable third party software injection
blocking' is set to 'Enabled'
1.20 (L1) Ensure 'Enables managed extensions to use the
Enterprise Hardware Platform API' is set to 'Disabled'
1.21 (L1) Ensure 'Ephemeral profile' is set to 'Disabled'
Page 290
Recommendation Set
Correctly
Yes No
1.22 (L1) Ensure 'Import autofill form data from default
browser on first run' is set to 'Disabled'
1.23 (L1) Ensure 'Import of homepage from default browser
on first run' is set to 'Disabled'
1.24 (L1) Ensure 'Import search engines from default browser
on first run' is set to 'Disabled'
1.25 (L1) Ensure 'List of names that will bypass the HSTS
policy check' is set to 'Disabled'
1.27 (L1) Ensure 'Suppress lookalike domain warnings on
domains' is set to 'Disabled'
1.28 (L1) Ensure 'Suppress the unsupported OS warning' is
set to 'Disabled'
1.29 (L1) Ensure 'URLs for which local IPs are exposed in
WebRTC ICE candidates' is set to 'Disabled'
2.1.1 (L1) Ensure 'Update policy override' is set to 'Enabled'
with 'Always allow updates (recommended)' or 'Automatic
silent updates' specified
2.2.1 (L1) Ensure 'Control use of insecure content exceptions'
is set to 'Enabled: Do not allow any site to load mixed
content'
2.2.2 (L2) Ensure 'Control use of the Web Bluetooth API' is set
to 'Enabled: Do not allow any site to request access to
Bluetooth devices via the Web Bluetooth API'
2.2.3 (L2) Ensure 'Control use of the WebUSB API' is set to
'Enabled: Do not allow any site to request access to USB
devices via the WebUSB API'
2.2.5 (L1) Ensure 'Allow local file access to file:// URLs on
these sites in the PDF Viewer' Is Disabled
2.3.1 (L1) Ensure 'Blocks external extensions from being
installed' is set to 'Enabled'
2.3.2 (L1) Ensure 'Configure allowed app/extension types' is
set to 'Enabled: extension, hosted_app, platform_app,
theme'
2.3.3 (L1) Ensure 'Configure extension installation blocklist' is
set to 'Enabled: *'
2.3.4 (L2) Ensure 'Default third-party storage partitioning
setting' Is Enabled and Blocked
Page 291
Recommendation Set
Correctly
Yes No
2.3.5 (L1) Ensure 'Block third-party storage partitioning for
these origins' Is Configured
2.3.6 (L2) Ensure 'Control Manifest v2 extension availability' Is
Set to Forced Only
2.3.7 (L1) Ensure 'Control availability of extensions
unpublished on the Chrome Web Store' Is Disabled
2.4.1 (L2) Ensure 'Supported authentication schemes' is set to
'Enabled: ntlm, negotiate'
2.5.1 (L2) Ensure 'Configure native messaging blocklist' is set
to 'Enabled: *'
2.6.1 (L1) Ensure 'Enable saving passwords to the password
manager' is Explicitly Configured
2.7.1 (L1) Ensure 'Enable Google Cloud Print Proxy' is set to
'Disabled'
2.8.1 Ensure 'Allow remote access connections to this
machine' is set to 'Disabled'
2.8.2 (L1) Ensure 'Allow remote users to interact with elevated
windows in remote assistance sessions' is set to
'Disabled'
2.8.3 (L1) Ensure 'Configure the required domain names for
remote access clients' is set to 'Enabled' with a domain
defined
2.8.4 (L1) Ensure 'Enable curtaining of remote access hosts' is
set to 'Disabled'
2.8.5 (L1) Ensure 'Enable firewall traversal from remote access
host' is set to 'Disabled'
2.8.6 (L1) Ensure 'Enable or disable PIN-less authentication
for remote access hosts' is set to 'Disabled'
2.8.7 (L1) Ensure 'Enable the use of relay servers by the
remote access host' is set to 'Disabled'.
2.10.1 (L1) Ensure 'Allow automatic sign-in to Microsoft cloud
identity providers' Is Enabled
2.11 (L1) Ensure 'Allow download restrictions' is set to
'Enabled: Block malicious downloads'
2.12 (L2) Ensure 'Allow proceeding from the SSL warning
page' is set to 'Disabled'
Page 292
Recommendation Set
Correctly
Yes No
2.13 (L1) Ensure 'Disable proceeding from the Safe Browsing
warning page' is set to 'Enabled'
2.14 (L1) Ensure 'Require Site Isolation for every site' is set to
'Enabled'
2.15 (L2) Ensure 'Force Google SafeSearch' is set to
'Enabled'
2.16 (L1) Ensure 'Notify a user that a browser relaunch or
device restart is recommended or required' is set to
'Enabled: Show a recurring prompt to the user indication
that a relaunch is required'
2.17 (L1) Ensure 'Proxy settings' is set to 'Enabled' and does
not contain "ProxyMode": "auto_detect"
2.19 (L1) Ensure 'Set the time period for update notifications'
is set to 'Enabled: 86400000'
2.21 (L1) Ensure 'Allow reporting of domain reliability related
data' Is Disabled
2.25 (L1) Ensure 'Allow file or directory picker APIs to be
called without prior user gesture' Is Disabled
2.26 (L1) Ensure 'Enable Google Search Side Panel' Is
Disabled
2.27 (L1) Ensure 'Http Allowlist' Is Properly Configured
2.28 (L1) Ensure 'Enable automatic HTTPS upgrades' Is
Enabled
2.30 (L1) Ensure 'Enable Renderer App Container' Is Enabled
3.1.2 (L1) Ensure 'Default geolocation setting' is set to
'Enabled: Do not allow any site to track the users'
physical location'
3.2.1 (L1) Ensure 'Enable Google Cast' is set to 'Disabled'
3.3 (L1) Ensure 'Allow websites to query for available
payment methods' is set to 'Disabled'
3.4 (L1) Ensure 'Block third party cookies' is set to 'Enabled'
3.5 (L2) Ensure 'Browser sign in settings' is set to 'Enabled:
Disabled browser sign-in'
3.6 (L1) Ensure 'Control how Chrome Cleanup reports data
to Google' is set to 'Disabled'
Page 293
Recommendation Set
Correctly
Yes No
3.7 (L1) Ensure 'Disable synchronization of data with Google'
is set to 'Enabled'
3.8 (L1) Ensure 'Enable alternate error pages' is set to
'Disabled'
3.9 (L1) Ensure 'Enable deleting browser and download
history' is set to 'Disabled'
3.11 (L1) Ensure 'Enable or disable spell checking web
service' is set to 'Disabled'
3.12 (L1) Ensure 'Enable reporting of usage and crash-related
data' is set to 'Disabled'
3.13 (L1) Ensure 'Enable Safe Browsing for trusted sources' is
set to 'Disabled'
3.14 (L2) Ensure 'Enable search suggestions' is set to
'Disabled'
3.15 (L2) Ensure 'Enable Translate' is set to 'Disabled'
3.16 (L1) Ensure 'Enable URL-keyed anonymized data
collection' is set to 'Disabled'
4.2.1 (L2) Ensure 'Control use of the Serial API' is set to
'Enabled: Do not allow any site to request access to
serial ports via the Serial API'
4.2.2 (L2) Ensure 'Default Sensors Setting' is set to 'Enabled:
Do not allow any site to access sensors'
4.2.4 (L1) Ensure 'Block clipboard on these sites' Is Configured
4.2.5 (L1) Ensure 'Default clipboard setting' Is 'Enabled' to
'Deny Permissions'
4.3 (L2) Ensure 'Allow invocation of file selection dialogs' is
set to 'Disabled'
4.4 (L2) Ensure 'Allow or deny audio capture' is set to
'Disabled'
4.5 (L2) Ensure 'Allow or deny video capture' is set to
'Disabled'
4.6 (L1) Ensure 'Allow user feedback' is set to 'Disabled'
4.8 (L2) Ensure 'Enable AutoFill for addresses' is set to
'Disabled'
4.9 (L1) Ensure 'Enable AutoFill for credit cards' is set to
'Disabled'
Page 294
Recommendation Set
Correctly
Yes No
4.10 (L1) Ensure 'Import saved passwords from default
browser on first run' is set to 'Disabled'
5.1 (L2) Ensure 'Enable guest mode in browser' is set to
'Disabled'
5.3 (L1) Ensure 'Set disk cache size, in bytes' is set to
'Enabled: 250609664'
Page 295
Appendix: CIS Controls v7 Unmapped
Recommendations
Recommendation Set
Correctly
Yes No
2.1.2 (L1) Ensure 'Auto-update check period override' is set to
any value except '0'
2.20 (L1) Ensure 'Allow Web Authentication requests on sites
with broken TLS certificates' Is Disabled
2.22 (L1) Ensure 'Enable TLS Encrypted ClientHello' Is
Enabled
2.29 (L1) Ensure 'Insecure Hashes in TLS Handshakes
Enabled' Is Disabled
2.31 (L1) Ensure 'Enable strict MIME type checking for worker
scripts' Is Enabled
2.32 Ensure 'Allow remote debugging' is set to 'Disabled'
4.7 (L2) Ensure 'Controls the mode of DNS-over-HTTPS' is
set to 'Enabled: DNS-over-HTTPS without insecure
fallback'
Page 296
Appendix: CIS Controls v8 IG 1 Mapped
Recommendations
Recommendation Set
Correctly
Yes No
1.5 (L1) Ensure 'Allow the audio sandbox to run' is set to
'Enabled'
1.9 (L1) Ensure 'Determine the availability of variations' is set
to 'Enable all variations'
1.15 (L1) Ensure 'Enable component updates in Google
Chrome' is set to 'Enabled'
1.18 (L1) Ensure 'Enable security warnings for command-line
flags' is set to 'Enabled'
1.19 (L1) Ensure 'Enable third party software injection
blocking' is set to 'Enabled'
1.21 (L1) Ensure 'Ephemeral profile' is set to 'Disabled'
1.22 (L1) Ensure 'Import autofill form data from default
browser on first run' is set to 'Disabled'
1.23 (L1) Ensure 'Import of homepage from default browser
on first run' is set to 'Disabled'
1.24 (L1) Ensure 'Import search engines from default browser
on first run' is set to 'Disabled'
1.28 (L1) Ensure 'Suppress the unsupported OS warning' is
set to 'Disabled'
1.29 (L1) Ensure 'URLs for which local IPs are exposed in
WebRTC ICE candidates' is set to 'Disabled'
2.1.1 (L1) Ensure 'Update policy override' is set to 'Enabled'
with 'Always allow updates (recommended)' or 'Automatic
silent updates' specified
2.2.5 (L1) Ensure 'Allow local file access to file:// URLs on
these sites in the PDF Viewer' Is Disabled
2.3.4 (L2) Ensure 'Default third-party storage partitioning
setting' Is Enabled and Blocked
2.3.5 (L1) Ensure 'Block third-party storage partitioning for
these origins' Is Configured
Page 297
Recommendation Set
Correctly
Yes No
2.3.6 (L2) Ensure 'Control Manifest v2 extension availability' Is
Set to Forced Only
2.3.7 (L1) Ensure 'Control availability of extensions
unpublished on the Chrome Web Store' Is Disabled
2.6.1 (L1) Ensure 'Enable saving passwords to the password
manager' is Explicitly Configured
2.9.1 (L1) Ensure 'Enable First-Party Sets' Is Disabled
2.10.1 (L1) Ensure 'Allow automatic sign-in to Microsoft cloud
identity providers' Is Enabled
2.11 (L1) Ensure 'Allow download restrictions' is set to
'Enabled: Block malicious downloads'
2.14 (L1) Ensure 'Require Site Isolation for every site' is set to
'Enabled'
2.16 (L1) Ensure 'Notify a user that a browser relaunch or
device restart is recommended or required' is set to
'Enabled: Show a recurring prompt to the user indication
that a relaunch is required'
2.19 (L1) Ensure 'Set the time period for update notifications'
is set to 'Enabled: 86400000'
2.20 (L1) Ensure 'Allow Web Authentication requests on sites
with broken TLS certificates' Is Disabled
2.21 (L1) Ensure 'Allow reporting of domain reliability related
data' Is Disabled
2.22 (L1) Ensure 'Enable TLS Encrypted ClientHello' Is
Enabled
2.25 (L1) Ensure 'Allow file or directory picker APIs to be
called without prior user gesture' Is Disabled
2.26 (L1) Ensure 'Enable Google Search Side Panel' Is
Disabled
2.28 (L1) Ensure 'Enable automatic HTTPS upgrades' Is
Enabled
2.29 (L1) Ensure 'Insecure Hashes in TLS Handshakes
Enabled' Is Disabled
2.30 (L1) Ensure 'Enable Renderer App Container' Is Enabled
2.32 Ensure 'Allow remote debugging' is set to 'Disabled'
Page 298
Recommendation Set
Correctly
Yes No
3.3 (L1) Ensure 'Allow websites to query for available
payment methods' is set to 'Disabled'
3.4 (L1) Ensure 'Block third party cookies' is set to 'Enabled'
3.5 (L2) Ensure 'Browser sign in settings' is set to 'Enabled:
Disabled browser sign-in'
3.6 (L1) Ensure 'Control how Chrome Cleanup reports data
to Google' is set to 'Disabled'
3.7 (L1) Ensure 'Disable synchronization of data with Google'
is set to 'Enabled'
3.8 (L1) Ensure 'Enable alternate error pages' is set to
'Disabled'
3.9 (L1) Ensure 'Enable deleting browser and download
history' is set to 'Disabled'
3.11 (L1) Ensure 'Enable or disable spell checking web
service' is set to 'Disabled'
3.12 (L1) Ensure 'Enable reporting of usage and crash-related
data' is set to 'Disabled'
3.13 (L1) Ensure 'Enable Safe Browsing for trusted sources' is
set to 'Disabled'
3.14 (L2) Ensure 'Enable search suggestions' is set to
'Disabled'
3.15 (L2) Ensure 'Enable Translate' is set to 'Disabled'
4.2.4 (L1) Ensure 'Block clipboard on these sites' Is Configured
4.2.5 (L1) Ensure 'Default clipboard setting' Is 'Enabled' to
'Deny Permissions'
4.4 (L2) Ensure 'Allow or deny audio capture' is set to
'Disabled'
4.5 (L2) Ensure 'Allow or deny video capture' is set to
'Disabled'
4.6 (L1) Ensure 'Allow user feedback' is set to 'Disabled'
4.7 (L2) Ensure 'Controls the mode of DNS-over-HTTPS' is
set to 'Enabled: DNS-over-HTTPS without insecure
fallback'
4.8 (L2) Ensure 'Enable AutoFill for addresses' is set to
'Disabled'
Page 299
Recommendation Set
Correctly
Yes No
4.9 (L1) Ensure 'Enable AutoFill for credit cards' is set to
'Disabled'
4.10 (L1) Ensure 'Import saved passwords from default
browser on first run' is set to 'Disabled'
5.1 (L2) Ensure 'Enable guest mode in browser' is set to
'Disabled'
5.3 (L1) Ensure 'Set disk cache size, in bytes' is set to
'Enabled: 250609664'
Page 300
Appendix: CIS Controls v8 IG 2 Mapped
Recommendations
Recommendation Set
Correctly
Yes No
1.2.1 (L1) Ensure 'Configure the list of domains on which Safe
Browsing will not trigger warnings' is set to 'Disabled'
1.2.2 (L1) Ensure 'Safe Browsing Protection Level' is set to
'Enabled: Safe Browsing is active in the standard mode.'
or higher
1.3 (L1) Ensure 'Allow Google Cast to connect to Cast
devices on all IP addresses' is set to 'Disabled'
1.4 (L1) Ensure 'Allow queries to a Google time service' is
set to 'Enabled'
1.5 (L1) Ensure 'Allow the audio sandbox to run' is set to
'Enabled'
1.7 (L1) Ensure 'Continue running background apps when
Google Chrome is closed' is set to 'Disabled'
1.8 (L2) Ensure 'Control SafeSites adult content filtering' is
set to 'Enabled: Filter top level sites (but not embedded
iframes) for adult content'
1.9 (L1) Ensure 'Determine the availability of variations' is set
to 'Enable all variations'
1.14 (L1) Ensure 'DNS interception checks enabled' is set to
'Enabled'
1.15 (L1) Ensure 'Enable component updates in Google
Chrome' is set to 'Enabled'
1.18 (L1) Ensure 'Enable security warnings for command-line
flags' is set to 'Enabled'
1.19 (L1) Ensure 'Enable third party software injection
blocking' is set to 'Enabled'
1.20 (L1) Ensure 'Enables managed extensions to use the
Enterprise Hardware Platform API' is set to 'Disabled'
1.21 (L1) Ensure 'Ephemeral profile' is set to 'Disabled'
1.22 (L1) Ensure 'Import autofill form data from default
browser on first run' is set to 'Disabled'
Page 301
Recommendation Set
Correctly
Yes No
1.23 (L1) Ensure 'Import of homepage from default browser
on first run' is set to 'Disabled'
1.24 (L1) Ensure 'Import search engines from default browser
on first run' is set to 'Disabled'
1.25 (L1) Ensure 'List of names that will bypass the HSTS
policy check' is set to 'Disabled'
1.27 (L1) Ensure 'Suppress lookalike domain warnings on
domains' is set to 'Disabled'
1.28 (L1) Ensure 'Suppress the unsupported OS warning' is
set to 'Disabled'
1.29 (L1) Ensure 'URLs for which local IPs are exposed in
WebRTC ICE candidates' is set to 'Disabled'
2.1.1 (L1) Ensure 'Update policy override' is set to 'Enabled'
with 'Always allow updates (recommended)' or 'Automatic
silent updates' specified
2.2.1 (L1) Ensure 'Control use of insecure content exceptions'
is set to 'Enabled: Do not allow any site to load mixed
content'
2.2.2 (L2) Ensure 'Control use of the Web Bluetooth API' is set
to 'Enabled: Do not allow any site to request access to
Bluetooth devices via the Web Bluetooth API'
2.2.3 (L2) Ensure 'Control use of the WebUSB API' is set to
'Enabled: Do not allow any site to request access to USB
devices via the WebUSB API'
2.2.5 (L1) Ensure 'Allow local file access to file:// URLs on
these sites in the PDF Viewer' Is Disabled
2.3.1 (L1) Ensure 'Blocks external extensions from being
installed' is set to 'Enabled'
2.3.2 (L1) Ensure 'Configure allowed app/extension types' is
set to 'Enabled: extension, hosted_app, platform_app,
theme'
2.3.3 (L1) Ensure 'Configure extension installation blocklist' is
set to 'Enabled: *'
2.3.4 (L2) Ensure 'Default third-party storage partitioning
setting' Is Enabled and Blocked
2.3.5 (L1) Ensure 'Block third-party storage partitioning for
these origins' Is Configured
Page 302
Recommendation Set
Correctly
Yes No
2.3.6 (L2) Ensure 'Control Manifest v2 extension availability' Is
Set to Forced Only
2.3.7 (L1) Ensure 'Control availability of extensions
unpublished on the Chrome Web Store' Is Disabled
2.4.1 (L2) Ensure 'Supported authentication schemes' is set to
'Enabled: ntlm, negotiate'
2.5.1 (L2) Ensure 'Configure native messaging blocklist' is set
to 'Enabled: *'
2.6.1 (L1) Ensure 'Enable saving passwords to the password
manager' is Explicitly Configured
2.7.1 (L1) Ensure 'Enable Google Cloud Print Proxy' is set to
'Disabled'
2.8.1 Ensure 'Allow remote access connections to this
machine' is set to 'Disabled'
2.8.2 (L1) Ensure 'Allow remote users to interact with elevated
windows in remote assistance sessions' is set to
'Disabled'
2.8.3 (L1) Ensure 'Configure the required domain names for
remote access clients' is set to 'Enabled' with a domain
defined
2.8.4 (L1) Ensure 'Enable curtaining of remote access hosts' is
set to 'Disabled'
2.8.5 (L1) Ensure 'Enable firewall traversal from remote access
host' is set to 'Disabled'
2.8.6 (L1) Ensure 'Enable or disable PIN-less authentication
for remote access hosts' is set to 'Disabled'
2.8.7 (L1) Ensure 'Enable the use of relay servers by the
remote access host' is set to 'Disabled'.
2.9.1 (L1) Ensure 'Enable First-Party Sets' Is Disabled
2.10.1 (L1) Ensure 'Allow automatic sign-in to Microsoft cloud
identity providers' Is Enabled
2.11 (L1) Ensure 'Allow download restrictions' is set to
'Enabled: Block malicious downloads'
2.12 (L2) Ensure 'Allow proceeding from the SSL warning
page' is set to 'Disabled'
Page 303
Recommendation Set
Correctly
Yes No
2.13 (L1) Ensure 'Disable proceeding from the Safe Browsing
warning page' is set to 'Enabled'
2.14 (L1) Ensure 'Require Site Isolation for every site' is set to
'Enabled'
2.15 (L2) Ensure 'Force Google SafeSearch' is set to
'Enabled'
2.16 (L1) Ensure 'Notify a user that a browser relaunch or
device restart is recommended or required' is set to
'Enabled: Show a recurring prompt to the user indication
that a relaunch is required'
2.19 (L1) Ensure 'Set the time period for update notifications'
is set to 'Enabled: 86400000'
2.20 (L1) Ensure 'Allow Web Authentication requests on sites
with broken TLS certificates' Is Disabled
2.21 (L1) Ensure 'Allow reporting of domain reliability related
data' Is Disabled
2.22 (L1) Ensure 'Enable TLS Encrypted ClientHello' Is
Enabled
2.25 (L1) Ensure 'Allow file or directory picker APIs to be
called without prior user gesture' Is Disabled
2.26 (L1) Ensure 'Enable Google Search Side Panel' Is
Disabled
2.28 (L1) Ensure 'Enable automatic HTTPS upgrades' Is
Enabled
2.29 (L1) Ensure 'Insecure Hashes in TLS Handshakes
Enabled' Is Disabled
2.30 (L1) Ensure 'Enable Renderer App Container' Is Enabled
2.32 Ensure 'Allow remote debugging' is set to 'Disabled'
3.2.1 (L1) Ensure 'Enable Google Cast' is set to 'Disabled'
3.3 (L1) Ensure 'Allow websites to query for available
payment methods' is set to 'Disabled'
3.4 (L1) Ensure 'Block third party cookies' is set to 'Enabled'
3.5 (L2) Ensure 'Browser sign in settings' is set to 'Enabled:
Disabled browser sign-in'
3.6 (L1) Ensure 'Control how Chrome Cleanup reports data
to Google' is set to 'Disabled'
Page 304
Recommendation Set
Correctly
Yes No
3.7 (L1) Ensure 'Disable synchronization of data with Google'
is set to 'Enabled'
3.8 (L1) Ensure 'Enable alternate error pages' is set to
'Disabled'
3.9 (L1) Ensure 'Enable deleting browser and download
history' is set to 'Disabled'
3.11 (L1) Ensure 'Enable or disable spell checking web
service' is set to 'Disabled'
3.12 (L1) Ensure 'Enable reporting of usage and crash-related
data' is set to 'Disabled'
3.13 (L1) Ensure 'Enable Safe Browsing for trusted sources' is
set to 'Disabled'
3.14 (L2) Ensure 'Enable search suggestions' is set to
'Disabled'
3.15 (L2) Ensure 'Enable Translate' is set to 'Disabled'
4.2.1 (L2) Ensure 'Control use of the Serial API' is set to
'Enabled: Do not allow any site to request access to
serial ports via the Serial API'
4.2.2 (L2) Ensure 'Default Sensors Setting' is set to 'Enabled:
Do not allow any site to access sensors'
4.2.4 (L1) Ensure 'Block clipboard on these sites' Is Configured
4.2.5 (L1) Ensure 'Default clipboard setting' Is 'Enabled' to
'Deny Permissions'
4.4 (L2) Ensure 'Allow or deny audio capture' is set to
'Disabled'
4.5 (L2) Ensure 'Allow or deny video capture' is set to
'Disabled'
4.6 (L1) Ensure 'Allow user feedback' is set to 'Disabled'
4.7 (L2) Ensure 'Controls the mode of DNS-over-HTTPS' is
set to 'Enabled: DNS-over-HTTPS without insecure
fallback'
4.8 (L2) Ensure 'Enable AutoFill for addresses' is set to
'Disabled'
4.9 (L1) Ensure 'Enable AutoFill for credit cards' is set to
'Disabled'
Page 305
Recommendation Set
Correctly
Yes No
4.10 (L1) Ensure 'Import saved passwords from default
browser on first run' is set to 'Disabled'
5.1 (L2) Ensure 'Enable guest mode in browser' is set to
'Disabled'
5.3 (L1) Ensure 'Set disk cache size, in bytes' is set to
'Enabled: 250609664'
Page 306
Appendix: CIS Controls v8 IG 3 Mapped
Recommendations
Recommendation Set
Correctly
Yes No
1.2.1 (L1) Ensure 'Configure the list of domains on which Safe
Browsing will not trigger warnings' is set to 'Disabled'
1.2.2 (L1) Ensure 'Safe Browsing Protection Level' is set to
'Enabled: Safe Browsing is active in the standard mode.'
or higher
1.3 (L1) Ensure 'Allow Google Cast to connect to Cast
devices on all IP addresses' is set to 'Disabled'
1.4 (L1) Ensure 'Allow queries to a Google time service' is
set to 'Enabled'
1.5 (L1) Ensure 'Allow the audio sandbox to run' is set to
'Enabled'
1.7 (L1) Ensure 'Continue running background apps when
Google Chrome is closed' is set to 'Disabled'
1.8 (L2) Ensure 'Control SafeSites adult content filtering' is
set to 'Enabled: Filter top level sites (but not embedded
iframes) for adult content'
1.9 (L1) Ensure 'Determine the availability of variations' is set
to 'Enable all variations'
1.14 (L1) Ensure 'DNS interception checks enabled' is set to
'Enabled'
1.15 (L1) Ensure 'Enable component updates in Google
Chrome' is set to 'Enabled'
1.18 (L1) Ensure 'Enable security warnings for command-line
flags' is set to 'Enabled'
1.19 (L1) Ensure 'Enable third party software injection
blocking' is set to 'Enabled'
1.20 (L1) Ensure 'Enables managed extensions to use the
Enterprise Hardware Platform API' is set to 'Disabled'
1.21 (L1) Ensure 'Ephemeral profile' is set to 'Disabled'
1.22 (L1) Ensure 'Import autofill form data from default
browser on first run' is set to 'Disabled'
Page 307
Recommendation Set
Correctly
Yes No
1.23 (L1) Ensure 'Import of homepage from default browser
on first run' is set to 'Disabled'
1.24 (L1) Ensure 'Import search engines from default browser
on first run' is set to 'Disabled'
1.25 (L1) Ensure 'List of names that will bypass the HSTS
policy check' is set to 'Disabled'
1.27 (L1) Ensure 'Suppress lookalike domain warnings on
domains' is set to 'Disabled'
1.28 (L1) Ensure 'Suppress the unsupported OS warning' is
set to 'Disabled'
1.29 (L1) Ensure 'URLs for which local IPs are exposed in
WebRTC ICE candidates' is set to 'Disabled'
2.1.1 (L1) Ensure 'Update policy override' is set to 'Enabled'
with 'Always allow updates (recommended)' or 'Automatic
silent updates' specified
2.2.1 (L1) Ensure 'Control use of insecure content exceptions'
is set to 'Enabled: Do not allow any site to load mixed
content'
2.2.2 (L2) Ensure 'Control use of the Web Bluetooth API' is set
to 'Enabled: Do not allow any site to request access to
Bluetooth devices via the Web Bluetooth API'
2.2.3 (L2) Ensure 'Control use of the WebUSB API' is set to
'Enabled: Do not allow any site to request access to USB
devices via the WebUSB API'
2.2.5 (L1) Ensure 'Allow local file access to file:// URLs on
these sites in the PDF Viewer' Is Disabled
2.3.1 (L1) Ensure 'Blocks external extensions from being
installed' is set to 'Enabled'
2.3.2 (L1) Ensure 'Configure allowed app/extension types' is
set to 'Enabled: extension, hosted_app, platform_app,
theme'
2.3.3 (L1) Ensure 'Configure extension installation blocklist' is
set to 'Enabled: *'
2.3.4 (L2) Ensure 'Default third-party storage partitioning
setting' Is Enabled and Blocked
2.3.5 (L1) Ensure 'Block third-party storage partitioning for
these origins' Is Configured
Page 308
Recommendation Set
Correctly
Yes No
2.3.6 (L2) Ensure 'Control Manifest v2 extension availability' Is
Set to Forced Only
2.3.7 (L1) Ensure 'Control availability of extensions
unpublished on the Chrome Web Store' Is Disabled
2.4.1 (L2) Ensure 'Supported authentication schemes' is set to
'Enabled: ntlm, negotiate'
2.5.1 (L2) Ensure 'Configure native messaging blocklist' is set
to 'Enabled: *'
2.6.1 (L1) Ensure 'Enable saving passwords to the password
manager' is Explicitly Configured
2.7.1 (L1) Ensure 'Enable Google Cloud Print Proxy' is set to
'Disabled'
2.8.1 Ensure 'Allow remote access connections to this
machine' is set to 'Disabled'
2.8.2 (L1) Ensure 'Allow remote users to interact with elevated
windows in remote assistance sessions' is set to
'Disabled'
2.8.3 (L1) Ensure 'Configure the required domain names for
remote access clients' is set to 'Enabled' with a domain
defined
2.8.4 (L1) Ensure 'Enable curtaining of remote access hosts' is
set to 'Disabled'
2.8.5 (L1) Ensure 'Enable firewall traversal from remote access
host' is set to 'Disabled'
2.8.6 (L1) Ensure 'Enable or disable PIN-less authentication
for remote access hosts' is set to 'Disabled'
2.8.7 (L1) Ensure 'Enable the use of relay servers by the
remote access host' is set to 'Disabled'.
2.9.1 (L1) Ensure 'Enable First-Party Sets' Is Disabled
2.10.1 (L1) Ensure 'Allow automatic sign-in to Microsoft cloud
identity providers' Is Enabled
2.11 (L1) Ensure 'Allow download restrictions' is set to
'Enabled: Block malicious downloads'
2.12 (L2) Ensure 'Allow proceeding from the SSL warning
page' is set to 'Disabled'
Page 309
Recommendation Set
Correctly
Yes No
2.13 (L1) Ensure 'Disable proceeding from the Safe Browsing
warning page' is set to 'Enabled'
2.14 (L1) Ensure 'Require Site Isolation for every site' is set to
'Enabled'
2.15 (L2) Ensure 'Force Google SafeSearch' is set to
'Enabled'
2.16 (L1) Ensure 'Notify a user that a browser relaunch or
device restart is recommended or required' is set to
'Enabled: Show a recurring prompt to the user indication
that a relaunch is required'
2.17 (L1) Ensure 'Proxy settings' is set to 'Enabled' and does
not contain "ProxyMode": "auto_detect"
2.19 (L1) Ensure 'Set the time period for update notifications'
is set to 'Enabled: 86400000'
2.20 (L1) Ensure 'Allow Web Authentication requests on sites
with broken TLS certificates' Is Disabled
2.21 (L1) Ensure 'Allow reporting of domain reliability related
data' Is Disabled
2.22 (L1) Ensure 'Enable TLS Encrypted ClientHello' Is
Enabled
2.25 (L1) Ensure 'Allow file or directory picker APIs to be
called without prior user gesture' Is Disabled
2.26 (L1) Ensure 'Enable Google Search Side Panel' Is
Disabled
2.27 (L1) Ensure 'Http Allowlist' Is Properly Configured
2.28 (L1) Ensure 'Enable automatic HTTPS upgrades' Is
Enabled
2.29 (L1) Ensure 'Insecure Hashes in TLS Handshakes
Enabled' Is Disabled
2.30 (L1) Ensure 'Enable Renderer App Container' Is Enabled
2.32 Ensure 'Allow remote debugging' is set to 'Disabled'
3.2.1 (L1) Ensure 'Enable Google Cast' is set to 'Disabled'
3.3 (L1) Ensure 'Allow websites to query for available
payment methods' is set to 'Disabled'
3.4 (L1) Ensure 'Block third party cookies' is set to 'Enabled'
Page 310
Recommendation Set
Correctly
Yes No
3.5 (L2) Ensure 'Browser sign in settings' is set to 'Enabled:
Disabled browser sign-in'
3.6 (L1) Ensure 'Control how Chrome Cleanup reports data
to Google' is set to 'Disabled'
3.7 (L1) Ensure 'Disable synchronization of data with Google'
is set to 'Enabled'
3.8 (L1) Ensure 'Enable alternate error pages' is set to
'Disabled'
3.9 (L1) Ensure 'Enable deleting browser and download
history' is set to 'Disabled'
3.11 (L1) Ensure 'Enable or disable spell checking web
service' is set to 'Disabled'
3.12 (L1) Ensure 'Enable reporting of usage and crash-related
data' is set to 'Disabled'
3.13 (L1) Ensure 'Enable Safe Browsing for trusted sources' is
set to 'Disabled'
3.14 (L2) Ensure 'Enable search suggestions' is set to
'Disabled'
3.15 (L2) Ensure 'Enable Translate' is set to 'Disabled'
4.2.1 (L2) Ensure 'Control use of the Serial API' is set to
'Enabled: Do not allow any site to request access to
serial ports via the Serial API'
4.2.2 (L2) Ensure 'Default Sensors Setting' is set to 'Enabled:
Do not allow any site to access sensors'
4.2.4 (L1) Ensure 'Block clipboard on these sites' Is Configured
4.2.5 (L1) Ensure 'Default clipboard setting' Is 'Enabled' to
'Deny Permissions'
4.3 (L2) Ensure 'Allow invocation of file selection dialogs' is
set to 'Disabled'
4.4 (L2) Ensure 'Allow or deny audio capture' is set to
'Disabled'
4.5 (L2) Ensure 'Allow or deny video capture' is set to
'Disabled'
4.6 (L1) Ensure 'Allow user feedback' is set to 'Disabled'
Page 311
Recommendation Set
Correctly
Yes No
4.7 (L2) Ensure 'Controls the mode of DNS-over-HTTPS' is
set to 'Enabled: DNS-over-HTTPS without insecure
fallback'
4.8 (L2) Ensure 'Enable AutoFill for addresses' is set to
'Disabled'
4.9 (L1) Ensure 'Enable AutoFill for credit cards' is set to
'Disabled'
4.10 (L1) Ensure 'Import saved passwords from default
browser on first run' is set to 'Disabled'
5.1 (L2) Ensure 'Enable guest mode in browser' is set to
'Disabled'
5.3 (L1) Ensure 'Set disk cache size, in bytes' is set to
'Enabled: 250609664'
Page 312
Appendix: CIS Controls v8 Unmapped
Recommendations
Recommendation Set
Correctly
Yes No
2.1.2 (L1) Ensure 'Auto-update check period override' is set to
any value except '0'
2.31 (L1) Ensure 'Enable strict MIME type checking for worker
scripts' Is Enabled
Page 313
Appendix: Change History
Date Version Changes for this version
Jun 26, 2018 1.3.0 _Listing Order, Status_ on **[section] 1.10.1 New
section being proposed by bhowson** were updated.
Jun 26, 2018 1.3.0 _Listing Order, Status_ on **[section] 1.10.2 1.10.1 (L1)
Ensure 'Configure native messaging blacklist' is set to
'Enabled' ("*" for all messaging applications)** were
updated.
Jan 28, 2019 1.4.0 _Status_ on **[section] 2 Google Update** was updated.
Page 314
Date Version Changes for this version
Page 315
Date Version Changes for this version
Page 316
Date Version Changes for this version
Page 317
Date Version Changes for this version
Page 318
Date Version Changes for this version
Page 319
Date Version Changes for this version
Page 320
Date Version Changes for this version
Aug 16, 2021 2.1.0 DELETE - 1.5 (L1) Ensure 'Enable HTTP/0.9 support on
non-default ports' is set to 'Disabled' (Ticket 11881)
Aug 16, 2021 2.1.0 DELETE - 1.6 (L1) Ensure 'Enable deprecated web
platform features for a limited time' is set to 'Disabled'
(Ticket 11882)
Aug 16, 2021 2.1.0 DELETE - 1.7 (L1) Ensure 'Extend Flash content setting
to all content' is set to 'Disabled' (Ticket 13370)
Aug 16, 2021 2.1.0 DELETE - 1.9 (L1) Ensure 'Allow WebDriver to Override
Incompatible Policies' is set to 'Disabled' (Ticket 13371)
Aug 16, 2021 2.1.0 DELETE - 2.1 (L1) Ensure 'Default Flash Setting' is set
to 'Enabled' (Click to Play) (Ticket 13372)
Page 321
Date Version Changes for this version
Aug 16, 2021 2.1.0 DELETE - 2.11 (L1) Ensure 'Allow running plugins that
are outdated' is set to 'Disabled' (Ticket 13375)
Sep 22, 2021 2.1.0 DELETE - Section 1.1 (Remote Access) (Ticket 13812)
Oct 7, 2021 2.1.0 NEW - (L1) Ensure 'Allow cross-origin HTTP Basic Auth
prompts' is set to 'Disabled' (Ticket 13909)
Oct 7, 2021 2.1.0 NEW - (L1) Ensure 'Set disk cache size, in bytes' is set
to 'Enabled: 250609664' (Ticket 13907)
Oct 7, 2021 2.1.0 NEW - (L2) Ensure 'Enforce Google SafeSearch' is set
to 'Disabled' (Ticket 13905)
Oct 7, 2021 2.1.0 NEW - (L1) Ensure 'Enable renderer code integrity' is
set to 'Enabled' (Ticket 13902)
Oct 7, 2021 2.1.0 NEW - (L1) Ensure 'Enable use of ephemeral profiles' is
set to 'Disabled' (Ticket 13904)
Oct 7, 2021 2.1.0 NEW - (L1) Ensure 'Enable security warnings for
command-line flags' is set to 'Enabled' (Ticket 13903)
Page 322
Date Version Changes for this version
Oct 7, 2021 2.1.0 NEW - (L2) Ensure 'Enable guest mode' is set to
'Disabled' (Ticket 13901)
Oct 7, 2021 2.1.0 NEW - (L1) Ensure 'Enable globally scoped HTTP auth
cache' is set to 'Disabled' (Ticket 13900)
Oct 7, 2021 2.1.0 NEW - (L1) Ensure 'DNS interception checks enabled' is
set to 'Enabled' (Ticket 13899)
Oct 7, 2021 2.1.0 NEW - (L1) Ensure 'Configure the list of types that are
excluded from synchronization' is set to 'Enabled'
(Ticket 13898)
Oct 7, 2021 2.1.0 NEW - (L1) Ensure 'Configure the list of names that will
bypass the HSTS policy check' is set to 'Disabled'
(Ticket 13897)
Oct 7, 2021 2.1.0 NEW - (L1) Ensure 'Allow websites to query for
available payment methods' is set to 'Disabled' (Ticket
13896)
Oct 7, 2021 2.1.0 NEW - (L2) Ensure 'Allow users to proceed from the
HTTPS warning page' is set to 'Disabled' (Ticket 13895)
Oct 7, 2021 2.1.0 NEW - (L1) Ensure 'Allow user feedback' is set to
'Disabled' (Ticket 13894)
Oct 7, 2021 2.1.0 NEW - (L2) Ensure 'Allow file selection dialog' is set to
'Disabled' (Ticket 13885)
Oct 7, 2021 2.1.0 NEW - (L1) Ensure 'Allow the audio sandbox to run' is
set to 'Enabled' (Ticket 13893)
Oct 7, 2021 2.1.0 NEW - (L1) Ensure 'Allow queries to a Browser Network
Time service' is set to 'Enabled' (Ticket 13892)
Oct 7, 2021 2.1.0 NEW - (L2) Ensure 'Allow or deny screen capture' is set
to 'Disabled' (Ticket 13891)
Oct 7, 2021 2.1.0 NEW - (L1) Ensure 'Allow managed extensions to use
the Enterprise Hardware Platform API' is set to
'Disabled' (Ticket 13890)
Oct 7, 2021 2.1.0 NEW - (L1) Ensure 'Allow importing of home page
settings' is set to 'Disabled' (Ticket 13888)
Page 323
Date Version Changes for this version
Oct 7, 2021 2.1.0 NEW - (L1) Ensure 'Allow importing of autofill form data'
is set to 'Disabled' (Ticket 13887)
Oct 7, 2021 2.1.0 NEW - (L1) Ensure 'Allow Google Cast to connect to
Cast devices on all IP addresses' is set to 'Disabled'
(Ticket 13886)
Oct 7, 2021 2.1.0 NEW - (L1) Ensure 'Allow importing of search engine
settings' is set to 'Disabled' (Ticket 13889)
Oct 7, 2021 2.1.0 NEW - (L2) Ensure 'Allow or deny video capture' is set
to 'Disabled' (Ticket 13936)
Oct 7, 2021 2.1.0 NEW - (L2) Ensure 'Allow or block audio capture' is set
to 'Disabled' (Ticket 13937)
Oct 7, 2021 2.1.0 NEW - (L2) Ensure 'Control use of the Serial API' is set
to 'Enable: Do not allow any site to request access to
serial ports via the Serial API' (Ticket 13939)
Oct 7, 2021 2.1.0 NEW - (L1) Ensure 'Configure the list of domains on
which Safe Browsing will not trigger warnings' is set to
'Disabled' (Ticket 13942)
Oct 7, 2021 2.1.0 NEW - (L1) Ensure 'Safe Browsing Protection Level' is
set to 'Enabled: Standard Protection' or higher (Ticket
13943)
Oct 7, 2021 2.1.0 NEW - (L2) Ensure 'Controls the mode of DNS-over-
HTTPS" is set to 'Enabled: secure' (Ticket 13944)
Oct 7, 2021 2.1.0 NEW - (L1) Ensure 'Allow remote access connections to
this machine' is set to 'Disabled' (Ticket 13945)
Page 324
Date Version Changes for this version
Oct 7, 2021 2.1.0 NEW - (L2) Ensure 'Incognito mode availability ' is set to
'Disabled' (Ticket 13949)
Oct 7, 2021 2.1.0 NEW - (L1) Ensure 'Blocks external extensions from
being installed' is set to 'Enabled' (Ticket 13951)
Oct 7, 2021 2.1.0 NEW - (L1) Ensure 'Control use of insecure content
exceptions' is set to 'Enabled: Do not allow any site to
load mixed content' (Ticket 13953)
Dec 9, 2021 2.1.0 DELETE - (L2) Ensure 'Use built-in DNS client' is set to
'Disabled' (Ticket 13442)
Jan 8, 2024 3.0.0 Audit Procedure does not include the registries (Ticket
20443)
Page 325
Date Version Changes for this version
Jan 29, 2024 3.0.0 Create recommendations for 'HttpAllowlist' policy (Ticket
20761)
Page 326
Date Version Changes for this version
Jan 29, 2024 3.0.0 Create new sub-section for Microsoft Active Directory
Management Settings (Ticket 20752)
Jan 29, 2024 3.0.0 Create new sub-section for First-Party Sets Settings
(Ticket 20750)
Jan 29, 2024 3.0.0 1.5 - Ensure 'Allow the audio sandbox to run' is set to
'Enabled' - Update CIS Controls v7 & v8 (Ticket 20744)
Page 327
Date Version Changes for this version
Jan 29, 2024 3.0.0 1.1 - Ensure 'Cross-origin HTTP Authentication prompts'
is set to 'Disabled' - Update remediation path (Ticket
20743)
Page 328