Google Chrome Current Windows Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +1 −3 ✎ 4
Comparison against the immediately-prior release (V2R2). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 1
- V-241787 Medium Web Bluetooth API must be disabled.
Removed rules 3
- V-221568 High The running of outdated plugins must be disabled.
- V-221583 Medium Session only based cookies must be disabled.
- V-221585 Medium URLs must be whitelisted for plugin use
Content changes 4
- V-221562 Medium descriptioncheckfix Extensions installation must be blocklisted by default.
- V-221563 Medium descriptioncheckfix Extensions that are approved for use must be allowlisted.
- V-221565 Medium check The default search provider URL must be set to perform encrypted searches.
- V-221580 Medium descriptioncheckfix Safe Browsing must be enabled,
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- DTBC-0001
- Vuln IDs
-
- V-221558
- V-44711
- Rule IDs
-
- SV-221558r615937_rule
- SV-57545
Checks: C-23273r415801_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If RemoteAccessHostFirewallTraversal is not displayed under the Policy Name column or it is not set to false under the Policy Value column, then this is a finding. Windows registry: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the RemoteAccessHostFirewallTraversal value name does not exist or its value data is not set to 0, then this is a finding.
Fix: F-23262r415802_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative\Templates\Google\Google Chrome\Configure remote access options Policy Name: Enable firewall traversal from remote access host Policy State: Disabled Policy Value: N/A
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001166
- Version
- DTBC-0002
- Vuln IDs
-
- V-221559
- V-44723
- Rule IDs
-
- SV-221559r615937_rule
- SV-57557
Checks: C-23274r478199_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If DefaultGeolocationSetting is not displayed under the Policy Name column or it is not set to 2, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the DefaultGeolocationSetting value name does not exist or its value data is not set to 2, then this is a finding.
Fix: F-23263r478200_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Content Settings\ Policy Name: Default geolocation setting Policy State: Enabled Policy Value: Do not allow any site to track the users' physical location
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBC-0004
- Vuln IDs
-
- V-221561
- V-44719
- Rule IDs
-
- SV-221561r615937_rule
- SV-57553
Checks: C-23276r570454_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If DefaultPopupsSetting is not displayed under the Policy Name column or it is not set to 2, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the value name DefaultPopupsSetting does not exist or its value data is not set to 2, then this is a finding. Note: If AO Approved exceptions to this rule have been enabled, this is not a finding.
Fix: F-23265r478203_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Content Settings\ Policy Name: Default popups setting Policy State: Enabled Policy Value: Do not allow any site to show popups
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- DTBC-0005
- Vuln IDs
-
- V-221562
- V-44727
- Rule IDs
-
- SV-221562r684815_rule
- SV-57561
Checks: C-23277r684813_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If ExtensionInstallBlocklist is not displayed under the Policy Name column or it is not set to * under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ExtensionInstallBlocklist 3. If the a registry value name of 1 does not exist under that key or its value is not set to *, then this is a finding.
Fix: F-23266r684814_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Extensions\ Policy Name: Configure extension installation blocklist Policy State: Enabled Policy Value: *
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTBC-0006
- Vuln IDs
-
- V-221563
- V-44729
- Rule IDs
-
- SV-221563r684818_rule
- SV-57563
Checks: C-23278r684816_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If ExtensionInstallAllowlist is not displayed under the Policy Name column or it is not set to oiigbmnaadbkfbmpbfijlflahbdbdgdf or a list of administrator approved extension IDs, then this is a finding. Windows method: 1. Start regedit 2. Navigate to the key HKLM\Software\Policies\Google\Chrome\ExtensionInstallAllowlist 3. If the ExtensionInstallAllowlist key is not set to 1 and oiigbmnaadbkfbmpbfijlflahbdbdgdf or a list of administrator-approved extension IDs, then this is a finding.
Fix: F-23267r684817_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Extensions\ Policy Name: Configure extension installation allowlist Policy State: Enabled Policy Value: oiigbmnaadbkfbmpbfijlflahbdbdgdf Note: oiigbmnaadbkfbmpbfijlflahbdbdgdfis the extension ID for scriptno (a commonly used Chrome extension), other extension IDs may vary.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBC-0007
- Vuln IDs
-
- V-221564
- V-44733
- Rule IDs
-
- SV-221564r615937_rule
- SV-57567
Checks: C-23279r415819_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If DefaultSearchProviderName is displayed under the Policy Name column or it is not set to an organization approved encrypted search provider that corresponds to the encrypted search provider set in DTBC-0008(ex. Google Encrypted, Bing Encrypted) under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the DefaultSearchProviderName value name does not exist or it is not set to an organization approved encrypted search provider that corresponds to the encrypted search provider set in DTBC-0008(ex. Google Encrypted, Bing Encrypted), then this is a finding.
Fix: F-23268r415820_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Default search provider\ Policy Name: Default search provider name Policy State: Enabled Policy Value: set to an organization approved encrypted search provider that corresponds to the encrypted search provider set in DTBC-0008(ex. Google Encrypted, Bing Encrypted)
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBC-0008
- Vuln IDs
-
- V-221565
- V-44735
- Rule IDs
-
- SV-221565r684821_rule
- SV-57569
Checks: C-23280r684819_chk
If the system is on the SIPRNet, this requirement is NA. Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If DefaultSearchProviderSearchURL is not displayed under the Policy Name column or it is not set to an organization-approved encrypted search string (ex. https://www.google.com/?q={searchTerms} or https://www.bing.com/search?q={searchTerms} ) under the Policy Value column, this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the DefaultSearchProviderSearchURL value name does not exist or its value data is not set to an organization-approved encrypted search string (ex. https://www.google.com/search?q={searchTerms} or https://www.bing.com/search?q={searchTerms} ) this is a finding.
Fix: F-23269r684820_fix
If the system is on the SIPRNet, this requirement is NA. Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Default search provider\ Policy Name: Default search provider search URL Policy State: Enabled Policy Value: Must be set to an organization-approved encrypted search string (ex. https://www.google.com/search?q={searchTerms} or https://www.bing.com/search?q={searchTerms} )
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBC-0009
- Vuln IDs
-
- V-221566
- V-44737
- Rule IDs
-
- SV-221566r615937_rule
- SV-57571
Checks: C-23281r415825_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If DefaultSearchProviderEnabled is not displayed under the Policy Name column or it is not set to true under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the DefaultSearchProviderEnabled value name does not exist or its value data is not set to 1, then this is a finding. Note: This policy will only display in the chrome://policy tab on domain joined systems. On standalone systems, the policy will not display.
Fix: F-23270r415826_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Default search provider\ Policy Name: Enable the default search provider Policy State: Enabled Policy Value: N/A
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBC-0011
- Vuln IDs
-
- V-221567
- V-44741
- Rule IDs
-
- SV-221567r615937_rule
- SV-57575
Checks: C-23282r415828_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If PasswordManagerEnabled is not displayed under the Policy Name column or it is not set to false under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the PasswordManagerEnabled value name does not exist or its value data is not set to 0, then this is a finding.
Fix: F-23271r415829_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Password Manager\ Policy Name: Enable Saving Passwords to the Password Manager Policy State: Disabled Policy Value: N/A
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- DTBC-0017
- Vuln IDs
-
- V-221570
- V-44753
- Rule IDs
-
- SV-221570r615937_rule
- SV-57587
Checks: C-23285r415837_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If BackgroundModeEnabled is not displayed under the Policy Name column and it is not set to false under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the BackgroundModeEnabled value name does not exist or its value data is not set to 0, then this is a finding.
Fix: F-23274r415838_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Continue running background apps when Google Chrome is closed Policy State: Disabled Policy Value: N/A
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001374
- Version
- DTBC-0020
- Vuln IDs
-
- V-221571
- V-44759
- Rule IDs
-
- SV-221571r615937_rule
- SV-57593
Checks: C-23286r415840_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If SyncDisabled is not displayed under the Policy Name column or it is not set to true under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the SyncDisabled value name does not exist or its value data is not set to 1, then this is a finding.
Fix: F-23275r415841_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Disable synchronization of data with Google Policy State: Enabled Policy Value: N/A
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBC-0021
- Vuln IDs
-
- V-221572
- V-44761
- Rule IDs
-
- SV-221572r615937_rule
- SV-57595
Checks: C-23287r478205_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If URLBlacklist is not displayed under the Policy Name column or it is not set to javascript://* under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\URLBlacklist 3. If the URLBlacklist key does not exist, or the does not contain entries 1 set to javascript://*, then this is a finding.
Fix: F-23276r478206_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Block access to a list of URLs Policy State: Enabled Policy Value 1: javascript://*
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001374
- Version
- DTBC-0023
- Vuln IDs
-
- V-221573
- V-44765
- Rule IDs
-
- SV-221573r615937_rule
- SV-57599
Checks: C-23288r478208_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If CloudPrintProxyEnabled is not displayed under the Policy Name column or it is not set to false under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the CloudPrintProxyEnabled value name does not exist or its value data is not set to 0, then this is a finding.
Fix: F-23277r478209_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Enable Google Cloud Print proxy Policy State: Disabled Policy Value: N/A
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DTBC-0025
- Vuln IDs
-
- V-221574
- V-44769
- Rule IDs
-
- SV-221574r615937_rule
- SV-57603
Checks: C-23289r415849_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If "NetworkPredictionOptions" is not displayed under the “Policy Name” column or it is not set to "2" under the “Policy Value” column, this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the "NetworkPredictionOptions" value name does not exist or its value data is not set to "2," this is a finding.
Fix: F-23278r415850_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Enable network prediction Policy State: Enabled Policy Value: Do not predict network actions on any network connection
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBC-0026
- Vuln IDs
-
- V-221575
- V-44771
- Rule IDs
-
- SV-221575r615937_rule
- SV-57605
Checks: C-23290r415852_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If MetricsReportingEnabled is not displayed under the Policy Name column or it is not set to false under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the MetricsReportingEnabled value name does not exist or its value data is not set to 0, then this is a finding. Note: This policy will only display in the chrome://policy tab on domain joined systems. On standalone systems, the policy will not display.
Fix: F-23279r415853_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Enable reporting of usage and crash-related data Policy State: Disabled Policy Value: N/A
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBC-0027
- Vuln IDs
-
- V-221576
- V-44773
- Rule IDs
-
- SV-221576r615937_rule
- SV-57607
Checks: C-23291r415855_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If SearchSuggestEnabled is not displayed under the Policy Name column or it is not set to false under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the SearchSuggestEnabled value name does not exist or its value data is not set to 0, then this is a finding.
Fix: F-23280r415856_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Enable search suggestions Policy State: Disabled Policy Value: N/A
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBC-0029
- Vuln IDs
-
- V-221577
- V-44775
- Rule IDs
-
- SV-221577r615937_rule
- SV-57609
Checks: C-23292r415858_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If ImportSavedPasswords is not displayed under the Policy Name column or it is not set to false under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the ImportSavedPasswords value name does not exist or its value data is not set to 0, then this is a finding.
Fix: F-23281r415859_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Import saved passwords from default browser on first run Policy State: Disabled Policy Value: N/A
- RMF Control
- AU-10
- Severity
- M
- CCI
- CCI-000166
- Version
- DTBC-0030
- Vuln IDs
-
- V-221578
- V-44777
- Rule IDs
-
- SV-221578r615937_rule
- SV-57611
Checks: C-23293r415861_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If IncognitoModeAvailability is not displayed under the Policy Name column or it is not set to 1 under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the IncognitoModeAvailability value name does not exist or its value data is not set to 1, then this is a finding.
Fix: F-23282r415862_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Incognito mode availability Policy State: Enabled Policy Value: Incognito mode disabled
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- DTBC-0037
- Vuln IDs
-
- V-221579
- V-44789
- Rule IDs
-
- SV-221579r615937_rule
- SV-57623
Checks: C-23294r415864_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If EnableOnlineRevocationChecks is not displayed under the Policy Name column or it is not set to true under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the EnableOnlineRevocationChecks value name does not exist or its value data is not set to 1, then this is a finding.
Fix: F-23283r415865_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Whether online OCSP/CRL checks are performed Policy State: Enabled Policy Value: N/A
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001166
- Version
- DTBC-0038
- Vuln IDs
-
- V-221580
- V-44791
- Rule IDs
-
- SV-221580r684826_rule
- SV-57625
Checks: C-23295r684824_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If SafeBrowsingProtectionLevel is not displayed under the Policy Name column or it is not set to 1 or 2 under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the SafeBrowsingProtectionLevel value name does not exist or its value data is not set to 1 or 2, then this is a finding.
Fix: F-23284r684825_fix
Windows group policy: 1. Open the “group policy editor” tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Safe Browsing Settings Policy Name: Safe Browsing Protection Level Policy State: Enabled Policy Value: StandardProtection or EnhancedProtection
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-001199
- Version
- DTBC-0039
- Vuln IDs
-
- V-221581
- V-44793
- Rule IDs
-
- SV-221581r615937_rule
- SV-57627
Checks: C-23296r415870_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If the policy 'SavingBrowserHistoryDisabled' is not shown or is not set to false, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the SavingBrowserHistoryDisabled value name does not exist or its value data is not set to 0, then this is a finding.
Fix: F-23285r415871_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Disable saving browser history Policy State: Disabled Policy Value: N/A
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- DTBC-0040
- Vuln IDs
-
- V-221582
- V-44795
- Rule IDs
-
- SV-221582r615937_rule
- SV-57629
Checks: C-23297r415873_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If the policy "DefaultPluginsSetting" is not shown or is not set to "3", this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\DefaultPluginsSetting 3. If this key "DefaultPluginsSetting" does not exist or is not set to "3", this is a finding.
Fix: F-23286r415874_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Content Settings\ Policy Name: Default Flash setting Policy State: Enabled Policy Value: Click to play
- RMF Control
- SI-2
- Severity
- M
- CCI
- CCI-002605
- Version
- DTBC-0050
- Vuln IDs
-
- V-221584
- V-44805
- Rule IDs
-
- SV-221584r615937_rule
- SV-57639
Checks: C-23299r415879_chk
Universal method: 1. In the omnibox (address bar) type chrome://settings/help 2. Cross-reference the build information displayed with the Google Chrome site to identify, at minimum, the oldest supported build available. As of July 2019, this is 74.x.x. 3. If the installed version of Chrome is not supported by Google, this is a finding.
Fix: F-23288r415880_fix
Install a supported version of Google Chrome.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- DTBC-0052
- Vuln IDs
-
- V-221586
- V-75165
- Rule IDs
-
- SV-221586r615937_rule
- SV-89845
Checks: C-23301r415885_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If the policy "AllowDeletingBrowserHistory" is not shown or is not set to false, this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the "AllowDeletingBrowserHistory" value name does not exist or its value data is not set to "0", this is a finding.
Fix: F-23290r415886_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Enable deleting browser and download history Policy State: Disabled Policy Value: N/A
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- DTBC-0053
- Vuln IDs
-
- V-221587
- V-79929
- Rule IDs
-
- SV-221587r615937_rule
- SV-94633
Checks: C-23302r415888_chk
Universal method: 1. In the omnibox (address bar) type chrome:// policy 2. If "PromptForDownloadLocation" is not displayed under the "Policy Name" column or it is not set to "true" under the "Policy Value" column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the "PromptForDownloadLocation" value name does not exist or its value data is not set to "1", this is a finding.
Fix: F-23291r415889_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Ask where to save each file before downloading Policy State: Enabled Policy Value: N/A
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- DTBC-0055
- Vuln IDs
-
- V-221588
- V-79931
- Rule IDs
-
- SV-221588r615937_rule
- SV-94635
Checks: C-23303r415891_chk
If the system is on the SIPRNet, this requirement is NA. Universal method: 1. In the omnibox (address bar) type chrome:// policy 2. If "DownloadRestrictions" is not displayed under the "Policy Name" column or it is not set to "1" or "2" under the "Policy Value" column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the "DownloadRestrictions" value name does not exist or its value data is not set to "1" or "2", then this is a finding.
Fix: F-23292r415892_fix
If the system is on the SIPRNet, this requirement is NA. Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Allow download restrictions Policy State: 1 or 2 Policy Value: N/A
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001166
- Version
- DTBC-0057
- Vuln IDs
-
- V-221590
- V-81585
- Rule IDs
-
- SV-221590r615937_rule
- SV-96299
Checks: C-23305r415897_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If "SafeBrowsingExtendedReportingEnabled" is not displayed under the "Policy Name" column or it is not set to "False", this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the "SafeBrowsingExtendedReportingEnabled" value name does not exist or its value data is not set to "0", this is a finding.
Fix: F-23294r415898_fix
Windows group policy: 1. Open the “group policy editor” tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Safe Browsing settings\ Policy Name: Enable Safe Browsing Extended Reporting Policy State: Disabled Policy Value: N/A
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBC-0058
- Vuln IDs
-
- V-221591
- V-81587
- Rule IDs
-
- SV-221591r615937_rule
- SV-96301
Checks: C-23306r415900_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If "DefaultWebUsbGuardSetting" is not displayed under the "Policy Name" column or it is not set to "2", this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the "DefaultWebUsbGuardSetting" value name does not exist or its value data is not set to "2", this is a finding.
Fix: F-23295r415901_fix
Windows group policy: 1. Open the “group policy editor” tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Content Settings Policy Name: Control use of the WebUSB API Policy State: Enabled Policy Value: 2
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- DTBC-0060
- Vuln IDs
-
- V-221592
- V-81591
- Rule IDs
-
- SV-221592r615937_rule
- SV-96305
Checks: C-23307r415903_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If "ChromeCleanupEnabled" is not displayed under the "Policy Name" column or it is not set to "False", this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the "ChromeCleanupEnabled" value name does not exist or its value data is not set to "0", this is a finding.
Fix: F-23296r415904_fix
Windows group policy: 1. Open the “group policy editor” tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome Policy Name: Enables Chrome Cleanup on Windows Policy State: Disabled Policy Value: N/A
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- DTBC-0061
- Vuln IDs
-
- V-221593
- V-81593
- Rule IDs
-
- SV-221593r615937_rule
- SV-96307
Checks: C-23308r415906_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If "ChromeCleanupReportingEnabled" is not displayed under the "Policy Name" column or it is not set to "False", this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the "ChromeCleanupReportingEnabled" value name does not exist or its value data is not set to "0", this is a finding.
Fix: F-23297r415907_fix
Windows group policy: 1. Open the “group policy editor” tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome Policy Name: Control how Chrome Cleanup reports data to Google Policy State: Disabled Policy Value: N/A
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBC-0063
- Vuln IDs
-
- V-221594
- V-81597
- Rule IDs
-
- SV-221594r615937_rule
- SV-96311
Checks: C-23309r415909_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If "EnableMediaRouter" is not displayed under the "Policy Name" column or it is not set to "False", this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the "EnableMediaRouter" value name does not exist or its value data is not set to "0", this is a finding.
Fix: F-23298r415910_fix
Windows group policy: 1. Open the “group policy editor” tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Google Cast Policy Name: Enable Google Cast Policy State: Disabled Policy Value: N/A
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBC-0064
- Vuln IDs
-
- V-221595
- V-81581
- Rule IDs
-
- SV-221595r615937_rule
- SV-96295
Checks: C-23310r415912_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If "AutoplayAllowed" is not displayed under the "Policy Name" column or it is not set to "False", this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the "AutoplayAllowed" value name does not exist or its value data is not set to "0", this is a finding.
Fix: F-23299r415913_fix
Windows group policy: 1. Open the “group policy editor” tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Allow media autoplay Policy State: Disabled Policy Value: N/A
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- DTBC-0065
- Vuln IDs
-
- V-221596
- V-81589
- Rule IDs
-
- SV-221596r615937_rule
- SV-96303
Checks: C-23311r415915_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If “AutoplayWhitelist” is not displayed under the “Policy Name” column or it is not set to a list of administrator-approved URLs under the “Policy Value” column, this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the “AutoplayWhitelist” key does not exist and it does not contain a list of administrator-approved URLs, this is a finding. Suggested: the set or subset of [*.]mil and [*.]gov
Fix: F-23300r415916_fix
Windows group policy: 1. Open the “group policy editor” tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome Policy Name: Allow media autoplay on a whitelist of URL patterns Policy State: Enabled Policy Value 1: [*.]mil Policy Value 2: [*.]gov
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001166
- Version
- DTBC-0066
- Vuln IDs
-
- V-221597
- V-91203
- Rule IDs
-
- SV-221597r615937_rule
- SV-101303
Checks: C-23312r415918_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If "UrlKeyedAnonymizedDataCollectionEnabled" is not displayed under the “Policy Name” column or it is not set to "0" under the “Policy Value” column, this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the “UrlKeyedAnonymizedDataCollectionEnabled" value name does not exist or its value data is not set to "0," this is a finding.
Fix: F-23301r415919_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Enable URL-keyed anonymized data collection Policy State: Disabled Policy Value: NA
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001166
- Version
- DTBC-0067
- Vuln IDs
-
- V-221598
- V-91205
- Rule IDs
-
- SV-221598r615937_rule
- SV-101305
Checks: C-23313r415921_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If "WebRtcEventLogCollectionAllowed" is not displayed under the “Policy Name” column or it is not set to "0" under the “Policy Value” column, this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the "WebRtcEventLogCollectionAllowed" value name does not exist or its value data is not set to "0," this is a finding.
Fix: F-23302r415922_fix
Windows group policy: 1. Open the group policy editor tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Allow collection of WebRTC event logs from Google services Policy State: Disabled Policy Value: NA
- RMF Control
- SI-11
- Severity
- L
- CCI
- CCI-001312
- Version
- DTBC-0068
- Vuln IDs
-
- V-221599
- V-97525
- Rule IDs
-
- SV-221599r615937_rule
- SV-106629
Checks: C-23314r478214_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If the policy "DeveloperToolsAvailability" is not shown or is not set to "2", this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the key "DeveloperToolsAvailability" does not exist or is not set to "2", this is a finding.
Fix: F-23303r478215_fix
Windows group policy: 1. Open the "group policy editor" tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome Policy Name: Control where Developer Tools can be used Policy State: Enabled Policy Value: Disallow usage of the Developer Tools
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001166
- Version
- DTBC-0069
- Vuln IDs
-
- V-226401
- V-102867
- Rule IDs
-
- SV-226401r615937_rule
- SV-111829
Checks: C-28109r478217_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If BrowserGuestModeEnabled is not displayed under the Policy Name column or it is not set to 0 under the Policy Value column, this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the BrowserGuestModeEnabled value name does not exist or its value data is not set to 0, this is a finding.
Fix: F-28097r478218_fix
Windows group policy: 1. Open the "group policy editor" tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Enable guest mode in browser Policy State: Disabled
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001166
- Version
- DTBC-0070
- Vuln IDs
-
- V-226402
- V-102869
- Rule IDs
-
- SV-226402r615937_rule
- SV-111831
Checks: C-28110r478220_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If AutofillCreditCardEnabled is not displayed under the Policy Name column or it is not set to 0 under the Policy Value column, this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the AutofillCreditCardEnabled value name does not exist or its value data is not set to 0, this is a finding.
Fix: F-28098r478221_fix
Windows group policy: 1. Open the "group policy editor" tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Enable AutoFill for credit cards Policy State: Disabled
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001166
- Version
- DTBC-0071
- Vuln IDs
-
- V-226403
- V-102871
- Rule IDs
-
- SV-226403r615937_rule
- SV-111833
Checks: C-28111r478223_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If AutofillAddressEnabled is not displayed under the Policy Name column or it is not set to 0 under the Policy Value column, this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the AutofillAddressEnabled value name does not exist or its value data is not set to 0, this is a finding.
Fix: F-28099r478224_fix
Windows group policy: 1. Open the "group policy editor" tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Enable AutoFill for addresses Policy State: Disabled
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001166
- Version
- DTBC-0072
- Vuln IDs
-
- V-226404
- V-102873
- Rule IDs
-
- SV-226404r615937_rule
- SV-111835
Checks: C-28112r478226_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If ImportAutofillFormData is not displayed under the Policy Name column or it is not set to 0 under the Policy Value column, this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the ImportAutofillFormData value name does not exist or its value data is not set to 0, this is a finding.
Fix: F-28100r478227_fix
Windows group policy: 1. Open the "group policy editor" tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Import autofill form data from default browser on first run Policy State: Disabled
- RMF Control
- SC-13
- Severity
- H
- CCI
- CCI-002450
- Version
- DTBC-0056
- Vuln IDs
-
- V-234701
- V-81583
- Rule IDs
-
- SV-234701r615937_rule
Checks: C-37887r622475_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If "SSLVersionMin" is not displayed under the "Policy Name" column or it is not set to "tls1.2", this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the "SSLVersionMin" value name does not exist or its value data is not set to "tls1.2", this is a finding.
Fix: F-37849r622476_fix
Windows group policy: 1. Open the “group policy editor” tool with gpedit.msc. 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\ Policy Name: Minimum SSL version enabled Policy State: Enabled Policy Value: TLS 1.2
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- DTBC-0073
- Vuln IDs
-
- V-241787
- V-26961
- Rule IDs
-
- SV-241787r720329_rule
- SV-34246
Checks: C-45063r684828_chk
Universal method: 1. In the omnibox (address bar) type chrome://policy 2. If DefaultWebBluetoothGuardSetting is not displayed under the Policy Name column or it is not set to 2 under the Policy Value column, then this is a finding. Windows method: 1. Start regedit 2. Navigate to HKLM\Software\Policies\Google\Chrome\ 3. If the DefaultWebBluetoothGuardSetting value name does not exist or its value data is not set to 2, then this is a finding.
Fix: F-45022r720328_fix
Windows group policy: 1. Open the “group policy editor” tool with gpedit.msc 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\Google Chrome\Content Settings Policy Name: Control use of the Web Bluetooth API Policy State: Enabled Policy Value: Do not allow any site to request access to Bluetooth devices via the Web Bluetooth API