Google Chrome Current Windows Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates −1 ✎ 3
Comparison against the immediately-prior release (V1R17). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Removed rules 1
- V-44757 Medium 3D Graphics APIs must be disabled.
Content changes 3
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- DTBC-0001
- Vuln IDs
-
- V-44711
- Rule IDs
-
- SV-57545r4_rule
Checks: C-49503r4_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If RemoteAccessHostFirewallTraversal is not displayed under the Policy Name column or it is not set to false under the Policy Value column, then this is a finding. Windows registry: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the RemoteAccessHostFirewallTraversal value name does not exist or its value data is not set to 0, then this is a finding.
Fix: F-49801r5_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative\Templates\Google\Google Chrome\Configure remote access options Policy Name: Enable firewall traversal from remote access host Policy State: Disabled Policy Value: N/A
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- DTBC-0003
- Vuln IDs
-
- V-44713
- Rule IDs
-
- SV-57547r2_rule
Checks: C-49507r4_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If DefaultNotificationsSetting is not displayed under the Policy Name column or it is not set to 2, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the DefaultNotificationsSetting value name does not exist or its value data is not set to 2, then this is a finding.
Fix: F-49807r3_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Content Settings\ Policy Name: Default notification setting Policy State: Enabled Policy Value: Do not allow any site to show desktop notifications
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBC-0004
- Vuln IDs
-
- V-44719
- Rule IDs
-
- SV-57553r2_rule
Checks: C-49509r3_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If DefaultPopupsSetting is not displayed under the Policy Name column or it is not set to 2, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the value name DefaultPopupsSetting does not exist or its value data is not set to 2, then this is a finding.
Fix: F-49809r3_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Content Settings\ Policy Name: Default popups setting Policy State: Enabled Policy Value: Do not allow any site to show popups
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001166
- Version
- DTBC-0002
- Vuln IDs
-
- V-44723
- Rule IDs
-
- SV-57557r2_rule
Checks: C-49511r3_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If DefaultGeolocationSetting is not displayed under the Policy Name column or it is not set to 2, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the DefaultGeolocationSetting value name does not exist or its value data is not set to 2, then this is a finding.
Fix: F-49813r3_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Content Settings\ Policy Name: Default geolocation setting Policy State: Enabled Policy Value: Do not allow any site to track the users' physical location
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001687
- Version
- DTBC-0005
- Vuln IDs
-
- V-44727
- Rule IDs
-
- SV-57561r2_rule
Checks: C-49513r3_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If ExtensionInstallBlacklist is not displayed under the Policy Name column or it is not set to * under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ExtensionInstallBlacklist 3. If the a registry value name of 1 does not exist under that key or its value is not set to *, then this is a finding.
Fix: F-49817r3_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Extensions\ Policy Name: Configure extension installation blacklist Policy State: Enabled Policy Value: *
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTBC-0006
- Vuln IDs
-
- V-44729
- Rule IDs
-
- SV-57563r2_rule
Checks: C-49515r3_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If ExtensionInstallWhitelist is not displayed under the Policy Name column or it is not set to oiigbmnaadbkfbmpbfijlflahbdbdgdf or a list of administrator approved extension IDs, then this is a finding. Windows method: 1. Start regedit 2. Navigate to the key HKLM\Software\Policies\Google\Chrome\ExtensionInstallWhitelist 3. If the ExtensionInstallWhitelist key is not set to 1 or oiigbmnaadbkfbmpbfijlflahbdbdgdf or a list of administrator-approved extension IDs, then this is a finding.
Fix: F-49821r4_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Extensions\ Policy Name: Configure extension installation whitelist Policy State: Enabled Policy Value: oiigbmnaadbkfbmpbfijlflahbdbdgdf (or 1) Note: oiigbmnaadbkfbmpbfijlflahbdbdgdf is the extension ID for scriptno(a commonly used Chrome extension)
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBC-0007
- Vuln IDs
-
- V-44733
- Rule IDs
-
- SV-57567r2_rule
Checks: C-49517r4_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If DefaultSearchProviderName is displayed under the Policy Name column or it is not set to an organization approved encrypted search provider that corresponds to the encrypted search provider set in DTBC-0008(ex. Google Encrypted, Bing Encrypted) under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the DefaultSearchProviderName value name does not exist or it is not set to an organization approved encrypted search provider that corresponds to the encrypted search provider set in DTBC-0008(ex. Google Encrypted, Bing Encrypted), then this is a finding.
Fix: F-49825r5_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Default search provider\ Policy Name: Default search provider name Policy State: Enabled Policy Value: set to an organization approved encrypted search provider that corresponds to the encrypted search provider set in DTBC-0008(ex. Google Encrypted, Bing Encrypted)
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBC-0008
- Vuln IDs
-
- V-44735
- Rule IDs
-
- SV-57569r3_rule
Checks: C-49519r8_chk
If the system is on the SIPRNet, this requirement is NA. Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If DefaultSearchProviderSearchURL is not displayed under the Policy Name column or it is not set to an organization-approved encrypted search string (ex. https://www.google.com/#q={searchTerms} or https://www.bing.com/search?q={searchTerms} ) under the Policy Value column, this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the DefaultSearchProviderSearchURL value name does not exist or its value data is not set to an organization-approved encrypted search string (ex. https://www.google.com/#q={searchTerms} or https://www.bing.com/search?q={searchTerms} ) this is a finding.
Fix: F-49827r6_fix
If the system is on the SIPRNet, this requirement is NA. Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Default search provider\ Policy Name: Default search provider search URL Policy State: Enabled Policy Value: Must be set to an organization-approved encrypted search string (ex. https://www.google.com/#q={searchTerms} or https://www.bing.com/search?q={searchTerms} )
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBC-0009
- Vuln IDs
-
- V-44737
- Rule IDs
-
- SV-57571r3_rule
Checks: C-49521r4_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If DefaultSearchProviderEnabled is not displayed under the Policy Name column or it is not set to true under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the DefaultSearchProviderEnabled value name does not exist or its value data is not set to 1, then this is a finding. Note: This policy will only display in the chrome://policy tab on domain joined systems. On standalone systems, the policy will not display.
Fix: F-49829r3_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Default search provider\ Policy Name: Enable the default search provider Policy State: Enabled Policy Value: N/A
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBC-0011
- Vuln IDs
-
- V-44741
- Rule IDs
-
- SV-57575r4_rule
Checks: C-49525r2_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If PasswordManagerEnabled is not displayed under the Policy Name column or it is not set to false under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the PasswordManagerEnabled value name does not exist or its value data is not set to 0, then this is a finding.
Fix: F-49833r5_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Password Manager\ Policy Name: Enable Saving Passwords to the Password Manager Policy State: Disabled Policy Value: N/A
- RMF Control
- SI-3
- Severity
- H
- CCI
- CCI-001240
- Version
- DTBC-0013
- Vuln IDs
-
- V-44745
- Rule IDs
-
- SV-57579r2_rule
Checks: C-49529r2_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If AllowOutdatedPlugins is not displayed under the Policy Name column or it is not set to false under the Policy Name column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome 3. If the AllowOutdatedPlugins value name does not exist or its value data is not set to 0, then this is a finding.
Fix: F-49837r3_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Allow running plugins that are outdated Policy State: Disabled Policy Value: N/A
- RMF Control
- AU-10
- Severity
- L
- CCI
- CCI-000166
- Version
- DTBC-0015
- Vuln IDs
-
- V-44751
- Rule IDs
-
- SV-57585r2_rule
Checks: C-49533r3_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If BlockThirdPartyCookies is not displayed under the Policy Name column or it is not set to true under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the BlockThirdPartyCookies value name does not exist or its value data is not set to 1, then this is a finding.
Fix: F-49841r3_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Block third party cookies Policy State: Enabled Policy Value: N/A
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTBC-0017
- Vuln IDs
-
- V-44753
- Rule IDs
-
- SV-57587r2_rule
Checks: C-49535r2_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If BackgroundModeEnabled is not displayed under the Policy Name column and it is not set to false under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the BackgroundModeEnabled value name does not exist or its value data is not set to 0, then this is a finding.
Fix: F-49845r3_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Continue running background apps when Google Chrome is closed Policy State: Disabled Policy Value: N/A
- RMF Control
- AC-20
- Severity
- M
- CCI
- CCI-002333
- Version
- DTBC-0020
- Vuln IDs
-
- V-44759
- Rule IDs
-
- SV-57593r2_rule
Checks: C-49541r2_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If SyncDisabled is not displayed under the Policy Name column or it is not set to true under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the SyncDisabled value name does not exist or its value data is not set to 1, then this is a finding.
Fix: F-49851r3_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Disable synchronization of data with Google Policy State: Enabled Policy Value: N/A
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBC-0021
- Vuln IDs
-
- V-44761
- Rule IDs
-
- SV-57595r3_rule
Checks: C-49543r4_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If URLBlacklist is not displayed under the Policy Name column or it is not set to javascript://* under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\URLBlacklist 3. If the URLBlacklist key does not exist, or the does not contain entries 1 set to javascript://*, then this is a finding.
Fix: F-49853r5_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Block access to a list of URLs Policy State: Enabled Policy Value 1: javascript://*
- RMF Control
- AC-20
- Severity
- M
- CCI
- CCI-002333
- Version
- DTBC-0023
- Vuln IDs
-
- V-44765
- Rule IDs
-
- SV-57599r2_rule
Checks: C-49547r2_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If CloudPrintProxyEnabled is not displayed under the Policy Name column or it is not set to false under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the CloudPrintProxyEnabled value name does not exist or its value data is not set to 0, then this is a finding.
Fix: F-49857r4_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Enable Google Cloud Print proxy Policy State: Disabled Policy Value: N/A
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTBC-0025
- Vuln IDs
-
- V-44769
- Rule IDs
-
- SV-57603r8_rule
Checks: C-49549r8_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If "NetworkPredictionOptions" is not displayed under the “Policy Name” column or it is not set to "2" under the “Policy Value” column, this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the "NetworkPredictionOptions" value name does not exist or its value data is not set to "2," this is a finding.
Fix: F-49859r11_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Enable network prediction Policy State: Enabled Policy Value: Do not predict network actions on any network connection
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBC-0026
- Vuln IDs
-
- V-44771
- Rule IDs
-
- SV-57605r3_rule
Checks: C-49551r3_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If MetricsReportingEnabled is not displayed under the Policy Name column or it is not set to false under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the MetricsReportingEnabled value name does not exist or its value data is not set to 0, then this is a finding. Note: This policy will only display in the chrome://policy tab on domain joined systems. On standalone systems, the policy will not display.
Fix: F-49861r2_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Enable reporting of usage and crash-related data Policy State: Disabled Policy Value: N/A
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBC-0027
- Vuln IDs
-
- V-44773
- Rule IDs
-
- SV-57607r2_rule
Checks: C-49553r2_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If SearchSuggestEnabled is not displayed under the Policy Name column or it is not set to false under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the SearchSuggestEnabled value name does not exist or its value data is not set to 0, then this is a finding.
Fix: F-49863r2_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Enable search suggestions Policy State: Disabled Policy Value: N/A
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBC-0029
- Vuln IDs
-
- V-44775
- Rule IDs
-
- SV-57609r4_rule
Checks: C-49555r2_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If ImportSavedPasswords is not displayed under the Policy Name column or it is not set to false under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the ImportSavedPasswords value name does not exist or its value data is not set to 0, then this is a finding.
Fix: F-49865r4_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Import saved passwords from default browser on first run Policy State: Disabled Policy Value: N/A
- RMF Control
- AU-10
- Severity
- M
- CCI
- CCI-000166
- Version
- DTBC-0030
- Vuln IDs
-
- V-44777
- Rule IDs
-
- SV-57611r2_rule
Checks: C-49557r2_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If IncognitoModeAvailability is not displayed under the Policy Name column or it is not set to 1 under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the IncognitoModeAvailability value name does not exist or its value data is not set to 1, then this is a finding.
Fix: F-49867r2_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Incognito mode availability Policy State: Enabled Policy Value: Incognito mode disabled
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- DTBC-0037
- Vuln IDs
-
- V-44789
- Rule IDs
-
- SV-57623r2_rule
Checks: C-49567r2_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If EnableOnlineRevocationChecks is not displayed under the Policy Name column or it is not set to true under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the EnableOnlineRevocationChecks value name does not exist or its value data is not set to 1, then this is a finding.
Fix: F-49879r2_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Whether online OCSP/CRL checks are performed Policy State: Enabled Policy Value: N/A
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001166
- Version
- DTBC-0038
- Vuln IDs
-
- V-44791
- Rule IDs
-
- SV-57625r3_rule
Checks: C-49569r2_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If SafeBrowsingEnabled is not displayed under the Policy Name column or it is not set to true under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the SafeBrowsingEnabled value name does not exist or its value data is not set to 1, then this is a finding.
Fix: F-49881r3_fix
Windows group policy: 1. Open the “group policy editor” tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Safe Browsing Settings Policy Name: Enable Safe Browsing Policy State: Enabled Policy Value: N/A
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-001199
- Version
- DTBC-0039
- Vuln IDs
-
- V-44793
- Rule IDs
-
- SV-57627r2_rule
Checks: C-49571r2_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If the policy 'SavingBrowserHistoryDisabled' is not shown or is not set to false, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the SavingBrowserHistoryDisabled value name does not exist or its value data is not set to 0, then this is a finding.
Fix: F-49883r2_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Disable saving browser history Policy State: Disabled Policy Value: N/A
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001687
- Version
- DTBC-0040
- Vuln IDs
-
- V-44795
- Rule IDs
-
- SV-57629r5_rule
Checks: C-49573r3_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If the policy "DefaultPluginsSetting" is not shown or is not set to "3", this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\DefaultPluginsSetting 3. If this key "DefaultPluginsSetting" does not exist or is not set to "3", this is a finding.
Fix: F-49885r5_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Content Settings\ Policy Name: Default Flash setting Policy State: Enabled Policy Value: Click to play
- RMF Control
- AU-10
- Severity
- M
- CCI
- CCI-000166
- Version
- DTBC-0045
- Vuln IDs
-
- V-44799
- Rule IDs
-
- SV-57633r5_rule
Checks: C-49577r7_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If the policy ”CookiesSessionOnlyForUrls” exists, and has any defined values, this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\CookiesSessionOnlyForUrls 3. If this key exists and has any defined values, this is a finding.
Fix: F-49889r4_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Content Settings Policy Name: Allow session only cookies on these sites Policy State: Disabled Policy Value: N/A
- RMF Control
- SI-2
- Severity
- M
- CCI
- CCI-002605
- Version
- DTBC-0050
- Vuln IDs
-
- V-44805
- Rule IDs
-
- SV-57639r6_rule
Checks: C-49583r4_chk
Universal method: 1. In the omnibox (address bar) type chrome://settings/help 2. Cross-reference the build information displayed with the Google Chrome site to identify, at minimum, the oldest supported build available. As of July 2019, this is 74.x.x. 3. If the installed version of Chrome is not supported by Google, this is a finding.
Fix: F-49895r6_fix
Install a supported version of Google Chrome.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBC-0051
- Vuln IDs
-
- V-52795
- Rule IDs
-
- SV-67011r5_rule
Checks: C-54515r2_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If PluginsAllowedForUrls is not displayed under the Policy Name column or it is not set to a list of administrator approved URLs under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the PluginsAllowedForUrls key does not exist and it does not contain a list of administrator approved URLs then this is a finding. Suggested: the set or subset of [*.]mil and [*.]gov
Fix: F-57613r3_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Content Settings Policy Name: Allow the Flash plugin on these sites Policy State: Enabled Policy Value 1: [*.]mil Policy Value 2: [*.]gov
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001687
- Version
- DTBC-0052
- Vuln IDs
-
- V-75165
- Rule IDs
-
- SV-89845r2_rule
Checks: C-74955r5_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If the policy "AllowDeletingBrowserHistory" is not shown or is not set to false, this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the "AllowDeletingBrowserHistory" value name does not exist or its value data is not set to "0", this is a finding.
Fix: F-81777r7_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Enable deleting browser and download history Policy State: Disabled Policy Value: N/A
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001687
- Version
- DTBC-0053
- Vuln IDs
-
- V-79929
- Rule IDs
-
- SV-94633r2_rule
Checks: C-79589r3_chk
Universal method: 1. In the omnibox (address bar) type chrome:// policy 2. If "PromptForDownloadLocation" is not displayed under the "Policy Name" column or it is not set to "true" under the "Policy Value" column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the "PromptForDownloadLocation" value name does not exist or its value data is not set to "1", this is a finding.
Fix: F-86727r1_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Ask where to save each file before downloading Policy State: Enabled Policy Value: N/A
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001687
- Version
- DTBC-0055
- Vuln IDs
-
- V-79931
- Rule IDs
-
- SV-94635r2_rule
Checks: C-79593r3_chk
If the system is on the SIPRNet, this requirement is NA. Universal method: 1. In the omnibox (address bar) type chrome:// policy 2. If "DownloadRestrictions" is not displayed under the "Policy Name" column or it is not set to "1" or "2" under the "Policy Value" column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the "DownloadRestrictions" value name does not exist or its value data is not set to "1" or "2", then this is a finding.
Fix: F-86731r3_fix
If the system is on the SIPRNet, this requirement is NA. Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Allow download restrictions Policy State: 1 or 2 Policy Value: N/A
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBC-0064
- Vuln IDs
-
- V-81581
- Rule IDs
-
- SV-96295r2_rule
Checks: C-81331r3_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If "AutoplayAllowed" is not displayed under the "Policy Name" column or it is not set to "False", this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the "AutoplayAllowed" value name does not exist or its value data is not set to "0", this is a finding.
Fix: F-88407r3_fix
Windows group policy: 1. Open the “group policy editor” tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Allow media autoplay Policy State: Disabled Policy Value: N/A
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- DTBC-0056
- Vuln IDs
-
- V-81583
- Rule IDs
-
- SV-96297r3_rule
Checks: C-81333r3_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If "SSLVersionMin" is not displayed under the "Policy Name" column or it is not set to "tls1.1", this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the "SSLVersionMin" value name does not exist or its value data is not set to "tls1.1", this is a finding.
Fix: F-88409r4_fix
Windows group policy: 1. Open the “group policy editor” tool with gpedit.msc. 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Minimum SSL version enabled Policy State: Enabled Policy Value: TLS 1.1
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001166
- Version
- DTBC-0057
- Vuln IDs
-
- V-81585
- Rule IDs
-
- SV-96299r2_rule
Checks: C-81335r2_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If "SafeBrowsingExtendedReportingEnabled" is not displayed under the "Policy Name" column or it is not set to "False", this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the "SafeBrowsingExtendedReportingEnabled" value name does not exist or its value data is not set to "0", this is a finding.
Fix: F-88411r2_fix
Windows group policy: 1. Open the “group policy editor” tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Safe Browsing settings\ Policy Name: Enable Safe Browsing Extended Reporting Policy State: Disabled Policy Value: N/A
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBC-0058
- Vuln IDs
-
- V-81587
- Rule IDs
-
- SV-96301r1_rule
Checks: C-81337r1_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If "DefaultWebUsbGuardSetting" is not displayed under the "Policy Name" column or it is not set to "2", this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the "DefaultWebUsbGuardSetting" value name does not exist or its value data is not set to "2", this is a finding.
Fix: F-88413r1_fix
Windows group policy: 1. Open the “group policy editor” tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Content Settings Policy Name: Control use of the WebUSB API Policy State: Enabled Policy Value: 2
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTBC-0065
- Vuln IDs
-
- V-81589
- Rule IDs
-
- SV-96303r2_rule
Checks: C-81341r2_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If “AutoplayWhitelist” is not displayed under the “Policy Name” column or it is not set to a list of administrator-approved URLs under the “Policy Value” column, this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the “AutoplayWhitelist” key does not exist and it does not contain a list of administrator-approved URLs, this is a finding. Suggested: the set or subset of [*.]mil and [*.]gov
Fix: F-88417r3_fix
Windows group policy: 1. Open the “group policy editor” tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome Policy Name: Allow media autoplay on a whitelist of URL patterns Policy State: Enabled Policy Value 1: [*.]mil Policy Value 2: [*.]gov
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- DTBC-0060
- Vuln IDs
-
- V-81591
- Rule IDs
-
- SV-96305r3_rule
Checks: C-81345r1_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If "ChromeCleanupEnabled" is not displayed under the "Policy Name" column or it is not set to "False", this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the "ChromeCleanupEnabled" value name does not exist or its value data is not set to "0", this is a finding.
Fix: F-88421r2_fix
Windows group policy: 1. Open the “group policy editor” tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome Policy Name: Enables Chrome Cleanup on Windows Policy State: Disabled Policy Value: N/A
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- DTBC-0061
- Vuln IDs
-
- V-81593
- Rule IDs
-
- SV-96307r3_rule
Checks: C-81347r1_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If "ChromeCleanupReportingEnabled" is not displayed under the "Policy Name" column or it is not set to "False", this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the "ChromeCleanupReportingEnabled" value name does not exist or its value data is not set to "0", this is a finding.
Fix: F-88423r2_fix
Windows group policy: 1. Open the “group policy editor” tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome Policy Name: Control how Chrome Cleanup reports data to Google Policy State: Disabled Policy Value: N/A
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBC-0063
- Vuln IDs
-
- V-81597
- Rule IDs
-
- SV-96311r2_rule
Checks: C-81351r1_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If "EnableMediaRouter" is not displayed under the "Policy Name" column or it is not set to "False", this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the "EnableMediaRouter" value name does not exist or its value data is not set to "0", this is a finding.
Fix: F-88427r2_fix
Windows group policy: 1. Open the “group policy editor” tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Google Cast Policy Name: Enable Google Cast Policy State: Disabled Policy Value: N/A
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001166
- Version
- DTBC-0066
- Vuln IDs
-
- V-91203
- Rule IDs
-
- SV-101303r1_rule
Checks: C-90357r1_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If "UrlKeyedAnonymizedDataCollectionEnabled" is not displayed under the “Policy Name” column or it is not set to "0" under the “Policy Value” column, this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the “UrlKeyedAnonymizedDataCollectionEnabled" value name does not exist or its value data is not set to "0," this is a finding.
Fix: F-97401r3_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Enable URL-keyed anonymized data collection Policy State: Disabled Policy Value: NA
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001166
- Version
- DTBC-0067
- Vuln IDs
-
- V-91205
- Rule IDs
-
- SV-101305r1_rule
Checks: C-90359r1_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If "WebRtcEventLogCollectionAllowed" is not displayed under the “Policy Name” column or it is not set to "0" under the “Policy Value” column, this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the "WebRtcEventLogCollectionAllowed" value name does not exist or its value data is not set to "0," this is a finding.
Fix: F-97403r1_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Allow collection of WebRTC event logs from Google services Policy State: Disabled Policy Value: NA
- RMF Control
- SI-11
- Severity
- L
- CCI
- CCI-001312
- Version
- DTBC-0068
- Vuln IDs
-
- V-97525
- Rule IDs
-
- SV-106629r1_rule
Checks: C-96361r1_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If the policy "DeveloperToolsAvailability" is not shown or is not set to "2", this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the key "DeveloperToolsAvailability" does not exist or is not set to "2", this is a finding.
Fix: F-103203r2_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome Policy Name: Control where Developer Tools can be used Policy State: Enabled Policy Value: Disallow usage of the Developer Tools