{
"stig": {
"date": "2012-09-25",
"description": "Google Chrome STIG Draft",
"findings": {
"V-0001": {
"checkid": "C-0001r1_chk",
"checktext": "Universal method (Requires Chrome Browser v15 or later):\n 1. In the omnibox (address bar) type chrome://policy\n 2. If RemoteAccessHostFirewallTraversal is displayed under the Policy Name column and it is set to false under the Policy Value column, then this is not a finding.\n\nWindows method:\n1. Start regedit\n2. Navigate to HKLM\\Software\\Policies\\Google\\Chrome\\\n3. If the RemoteAccessHostFirewallTraversal value name does not exist or its value data is not set to 0, then this is a finding.",
"description": "Enables usage of STUN and relay servers when remote clients are trying to establish a connection to this machine. If this setting is enabled, then remote clients can discover and connect to this machines even if they are separated by a firewall. If this setting is disabled and outgoing UDP connections are filtered by the firewall, then this machine will only allow connections from client machines within the local network. If this policy is left not set the setting will be enabled. ",
"fixid": "F-0001r1_fix",
"fixtext": "\nValid for Chrome Browser version 14 or later.\n\nWindows registry:\n Key Path: HKLM\\Software\\Policies\\Google\\Chrome\\\n Value Name: RemoteAccessHostFirewallTraversal\n Value Type: Boolean (REG_DWORD)\n Value Data: 0\n \nWindows group policy:\n Policy Path: Computer Configuration\\Administrative Templates\\Google\\Google Chrome\\Configure remote access options\\\n Policy Name: Enable firewall traversal from remote access host\n Policy State: Disabled\n Policy Value: N/A\n\t\t",
"iacontrols": null,
"id": "V-0001",
"ruleID": "SV-0001r1_rule",
"severity": "medium",
"title": "Firewall traversal from remote host must be disabled",
"version": "DTBC-0001"
},
"V-0002": {
"checkid": "C-0002r1_chk",
"checktext": "Universal method (Requires Chrome Browser v15 or later):\n 1. In the omnibox (address bar) type chrome://policy\n 2. If DefaultGeolocationSetting is displayed under the Policy Name column and it is set to Do not allow any site to track the users\u2019 physical location under the Policy Value column, then this is not a finding.\n\nWindows method:\n1. Start regedit\n2. Navigate to HKLM\\Software\\Policies\\Google\\Chrome\\\n3. If the DefaultGeolocationSetting value name does not exist or its value data is not set to 2, then this is a finding.",
"description": "Allows you to set whether websites are allowed to track the users' physical location. Tracking the users' physical location can be allowed by default, denied by default or the user can be asked every time a website requests the physical location. If this policy is left not set, 'AskGeolocation' will be used and the user will be able to change it.\n\t1 = Allow sites to track the users' physical location\n\t2 = Do not allow any site to track the users' physical location\n\t3 = Ask whenever a site wants to track the users' physical location\n",
"fixid": "F-0002r1_fix",
"fixtext": "\nValid for Chrome Browser version 10 or later.\n\nWindows registry:\n Key Path: HKLM\\Software\\Policies\\Google\\Chrome\\\n Value Name: DefaultGeolocationSetting\n Value Type: Integer (REG_DWORD)\n Value Data: 2\n \nWindows group policy:\n Policy Path: Computer Configuration\\Administrative Templates\\Google\\Google Chrome\\Content Settings\\\n Policy Name: Default geolocation setting\n Policy State: Enabled\n Policy Value: Do not allow any site to track the users' physical location\n\t\t",
"iacontrols": null,
"id": "V-0002",
"ruleID": "SV-0002r1_rule",
"severity": "medium",
"title": "Site tracking user's location must be disabled",
"version": "DTBC-0002"
},
"V-0003": {
"checkid": "C-0003r1_chk",
"checktext": "Universal method (Requires Chrome Browser v15 or later):\n 1. In the omnibox (address bar) type chrome://policy\n 2. If Default notification setting is displayed under the Policy Name column and it is set to Do not allow any site to show desktop notifications under the Policy Value column, then this is not a finding.\n\nWindows method:\n1. Start regedit\n2. Navigate to HKLM\\Software\\Policies\\Google\\Chrome\\\n3. If the DefaultNotificationsSetting value name does not exist or its value data is not set to 2, then this is a finding.",
"description": "Allows you to set whether websites are allowed to display desktop notifications. Displaying desktop notifications can be allowed by default, denied by default or the user can be asked every time a website wants to show desktop notifications. If this policy is left not set, 'AskNotifications' will be used and the user will be able to change it.\n 1 = Allow sites to show desktop notifications\n 2 = Do not allow any site to show desktop notifications\n 3 = Ask every time a site wants to show desktop notifications\n",
"fixid": "F-0003r1_fix",
"fixtext": "\nValid for Chrome Browser version 10 or later.\n\nWindows registry:\n Key Path: HKLM\\Software\\Policies\\Google\\Chrome\\\n Value Name: DefaultNotificationsSetting\n Value Type: Integer (REG_DWORD)\n Value Data: 2\n \nWindows group policy:\n Policy Path: Computer Configuration\\Administrative Templates\\Google\\Google Chrome\\Content Settings\\\n Policy Name: Default notification setting\n Policy State: Enabled\n Policy Value: Do not allow any site to show desktop notifications\n\t\t",
"iacontrols": null,
"id": "V-0003",
"ruleID": "SV-0003r1_rule",
"severity": "medium",
"title": "sites' ability for showing desktop notifications must be disabled",
"version": "DTBC-0003"
},
"V-0004": {
"checkid": "C-0004r1_chk",
"checktext": "Universal method (Requires Chrome Browser v15 or later):\n 1. In the omnibox (address bar) type chrome://policy\n 2. If DefaultPopupsSetting is displayed under the Policy Name column and it is set to Do not allow any site to show popups under the Policy Value column, then this is not a finding.\n\nWindows method:\n1. Start regedit\n2. Navigate to HKLM\\Software\\Policies\\Google\\Chrome\\\n3. If the value name DefaultPopupsSetting does not exist or its value data is not set to 2, then this is a finding.",
"description": "Allows you to set whether websites are allowed to show pop-ups. Showing popups can be either allowed for all websites or denied for all websites. If this policy is left not set, 'BlockPopups' will be used and the user will be able to change it.\n 1 = Allow all sites to show pop-ups\n 2 = Do not allow any site to show popups\n",
"fixid": "F-0004r1_fix",
"fixtext": "\nValid for Chrome Browser version 10 or later.\n\nWindows registry:\n Key Path: HKLM\\Software\\Policies\\Google\\Chrome\\\n Value Name: DefaultPopupsSetting\n Value Type: Integer (REG_DWORD)\n Value Data: 2\n \nWindows group policy:\n Policy Path: Computer Configuration\\Administrative Templates\\Google\\Google Chrome\\Content Settings\\\n Policy Name: Default popups setting\n Policy State: Enabled\n Policy Value: Do not allow any site to show popups\n\t\t",
"iacontrols": null,
"id": "V-0004",
"ruleID": "SV-0004r1_rule",
"severity": "medium",
"title": "Sites' ability to show pop-ups must be disabled",
"version": "DTBC-0004"
},
"V-0005": {
"checkid": "C-0005r1_chk",
"checktext": "Universal method (Requires Chrome Browser v15 or later):\n 1. In the omnibox (address bar) type chrome://policy\n 2. If ExtensionInstallBlacklist is displayed under the Policy Name column and it is set to * under the Policy Value column, then this is not a finding.\n\nWindows method:\n1. Start regedit\n2. Navigate to HKLM\\Software\\Policies\\Google\\Chrome\\ExtensionInstallBlacklist\n3. If the ExtensionInstallBlacklist key does not exist, or a registry value name of 1 does not exist under that key, or the registry value name of 1 does not have its value data set to * then this is a finding.",
"description": "Allows you to specify which extensions the users can NOT install. Extensions already installed will be removed if blacklisted. A blacklist value of '*' means all extensions are blacklisted unless they are explicitly listed in the whitelist. If this policy is left not set the user can install any extension in Google Chrome.\n",
"fixid": "F-0005r1_fix",
"fixtext": "\nValid for Chrome Browser version 8 or later.\n\nWindows registry:\n Key Path: HKLM\\Software\\Policies\\Google\\Chrome\\ExtensionInstallBlacklist\n Value Name: 1\n Value Type: String (REG_SZ)\n Value Data: *\n \nWindows group policy:\n Policy Path: Computer Configuration\\Administrative Templates\\Google\\Google Chrome\\Extensions\\\n Policy Name: Configure extension installation blacklist\n Policy State: Enabled\n Policy Value: *\n\t\t",
"iacontrols": null,
"id": "V-0005",
"ruleID": "SV-0005r1_rule",
"severity": "medium",
"title": "Extensions must be blacklisted by default",
"version": "DTBC-0005"
},
"V-0006": {
"checkid": "C-0006r1_chk",
"checktext": "Universal method (Requires Chrome Browser v15 or later):\n 1. In the omnibox (address bar) type chrome://policy\n 2. If ExtensionInstallWhitelist is displayed under the Policy Name column and it is set to oiigbmnaadbkfbmpbfijlflahbdbdgd or a list of administrator approved extension IDs, then this is not a finding.\n\nWindows method:\n1. Start regedit\n2. Navigate to HKLM\\Software\\Policies\\Google\\Chrome\\ExtensionInstallWhitelist\n3. If the ExtensionInstallWhitelist key does not exist or is not set to oiigbmnaadbkfbmpbfijlflahbdbdgd or a list of administrator approved extension IDs, then this is a finding.",
"description": "Allows you to specify which extensions are not subject to the blacklist. A blacklist value of * means all extensions are blacklisted and users can only install extensions listed in the whitelist. By default, no extensions are whitelisted. If all extensions have been blacklisted by policy, then the whitelist policy can be used to allow specific extensions to be installed. Administrators should determine which extensions should be allowed to be installed by their users. If no extensions are whitelisted, then no extensions can be installed when combined with blacklisting all extensions.\n",
"fixid": "F-0006r1_fix",
"fixtext": "\nValid for Chrome Browser version 8 or later.\n\nWindows registry:\n Key Path: HKLM\\Software\\Policies\\Google\\Chrome\\ExtensionInstallWhitelist\n Value Name: \n Value Type: String (REG_SZ)\n Value Data: oiigbmnaadbkfbmpbfijlflahbdbdgd\n \nWindows group policy:\n Policy Path: Computer Configuration\\Administrative Templates\\Google\\Google Chrome\\Extensions\\\n Policy Name: Configure extension installation whitelist\n Policy State: Enabled\n Policy Value: oiigbmnaadbkfbmpbfijlflahbdbdgd\n \nNote: oiigbmnaadbkfbmpbfijlflahbdbdgd is the ID for scriptno\n\t\t",
"iacontrols": null,
"id": "V-0006",
"ruleID": "SV-0006r1_rule",
"severity": "medium",
"title": "Extensions that are approved for use must be whitelisted",
"version": "DTBC-0006"
},
"V-0007": {
"checkid": "C-0007r1_chk",
"checktext": "Universal method (Requires Chrome Browser v15 or later):\n 1. In the omnibox (address bar) type chrome://policy\n 2. If DefaultSearchProviderName is displayed under the Policy Name column and it is set to Google Encrypted Search under the Policy Value column, then this is not a finding.\n\nWindows method:\n1. Start regedit\n2. Navigate to HKLM\\Software\\Policies\\Google\\Chrome\\\n3. If the DefaultSearchProviderName value name does not exist or it is not set to Google Encrypted Search, then this is a finding.",
"description": "Specifies the name of the default search provider. If left empty or not set, the host name specified by the search URL will be used. This policy is only considered if the 'DefaultSearchProviderEnabled' policy is enabled\n",
"fixid": "F-0007r1_fix",
"fixtext": "\nValid for Chrome Browser version 8 or later.\n\nWindows registry:\n Key Path: HKLM\\Software\\Policies\\Google\\Chrome\\\n Value Name: DefaultSearchProviderName\n Value Type: String (REG_SZ)\n Value Data: Google Encrypted Search\n \nWindows group policy:\n Policy Path: Computer Configuration\\Administrative Templates\\Google\\Google Chrome\\Default search provider\\\n Policy Name: Default search provider name\n Policy State: Enabled\n Policy Value: Google Encrypted Search\n\t\t",
"iacontrols": null,
"id": "V-0007",
"ruleID": "SV-0007r1_rule",
"severity": "medium",
"title": "The default search provider's name must be set",
"version": "DTBC-0007"
},
"V-0008": {
"checkid": "C-0008r1_chk",
"checktext": "Universal method (Requires Chrome Browser v15 or later):\n 1. In the omnibox (address bar) type chrome://policy\n 2. If DefaultSearchProviderSearchURL is displayed under the Policy Name column and it is set to https://encrypted.google.com/search?{google:acceptedSuggestion}{google:originalQueryForSuggestion}sourceid=chrome&ie={inputEncoding}&q=%{searchTerms} under the Policy Value column, then this is not a finding.\n\nWindows method:\n1. Start regedit\n2. Navigate to HKLM\\Software\\Policies\\Google\\Chrome\\\n3. If the DefaultSearchProviderSearchURL value name does not exist or its value data is not set to https://encrypted.google.com/search?{google:acceptedSuggestion}{google:originalQueryForSuggestion}sourceid=chrome&ie={inputEncoding}&q=%{searchTerms} then this is a finding.",
"description": "Specifies the URL of the search engine used when doing a default search. The URL should contain the string '{searchTerms}', which will be replaced at query time by the terms the user is searching for.\n\nThis option must be set when the 'DefaultSearchProviderEnabled' policy is enabled and will only be respected if this is the case.\n",
"fixid": "F-0008r1_fix",
"fixtext": "\nValid for Chrome Browser version 8 or later.\n\nWindows registry:\n Key Path: HKLM\\Software\\Policies\\Google\\Chrome\\\n Value Name: DefaultSearchProviderSearchURL\n Value Type: Boolean (REG_DWORD)\n Value Data: 0\n \nWindows group policy:\n Policy Path: Computer Configuration\\Administrative Templates\\Google\\Google Chrome\\Default search provider\\\n Policy Name: Default search provider search URL\n Policy State: Enabled\n Policy Value: https://encrypted.google.com/search?{google:acceptedSuggestion}{google:originalQueryForSuggestion}sourceid=chrome&ie={inputEncoding}&q=%{searchTerms}\n\t\t",
"iacontrols": null,
"id": "V-0008",
"ruleID": "SV-0008r1_rule",
"severity": "medium",
"title": "The default search provider URL must be set",
"version": "DTBC-0008"
},
"V-0009": {
"checkid": "C-0009r1_chk",
"checktext": "Universal method (Requires Chrome Browser v15 or later):\n 1. In the omnibox (address bar) type chrome://policy\n 2. If DefaultSearchProviderEnabled is displayed under the Policy Name column and it is set to true under the Policy Value column, then this is not a finding.\n\nWindows method:\n1. Start regedit\n2. Navigate to HKLM\\Software\\Policies\\Google\\Chrome\\\n3. If the DefaultSearchProviderEnabled value name does not exist or its value data is not set to 1, then this is a finding.",
"description": "Enables the use of a default search provider. If you enable this setting, a default search is performed when the user types text In the omnibox that is not a URL. You can specify the default search provider to be used by setting the rest of the default search policies. If these are left empty, the user can choose the default provider. If you disable this setting, no search is performed when the user enters non-URL text in the omnibox. If you enable or disable this setting, users cannot change or override this setting in Google Chrome. If this policy is left not set, the default search provider is enabled, and the user will be able to set the search provider list.\n",
"fixid": "F-0009r1_fix",
"fixtext": "\nValid for Chrome Browser version 8 or later.\n\nWindows registry:\n Key Path: HKLM\\Software\\Policies\\Google\\Chrome\\\n Value Name: DefaultSearchProviderEnabled\n Value Type: Boolean (REG_DWORD)\n Value Data: 1\n \nWindows group policy:\n Policy Path: Computer Configuration\\Administrative Templates\\Google\\Google Chrome\\Default search provider\\\n Policy Name: Enable the default search provider\n Policy State: Enabled\n Policy Value: N/A\n\t\t",
"iacontrols": null,
"id": "V-0009",
"ruleID": "SV-0009r1_rule",
"severity": "medium",
"title": "Default search provider must be enabled",
"version": "DTBC-0009"
},
"V-0010": {
"checkid": "C-0010r1_chk",
"checktext": "Universal method (Requires Chrome Browser v15 or later):\n 1. In the omnibox (address bar) type chrome://policy\n 2. If PasswordManagerAllowShowPasswords is displayed under the Policy Name column and it is set to false under the Policy Value column, then this is not a finding.\n\nWindows method:\n1. Start regedit\n2. Navigate to HKLM\\Software\\Policies\\Google\\Chrome\\\n3. If the PasswordManagerAllowShowPasswords value name does not exist or its value data is not set to 0, then this is a finding.",
"description": "Controls whether the user may show passwords in clear text in the password manager. If you disable this setting, the password manager does not allow showing stored passwords in clear text in the password manager window. If you enable or do not set this policy, users can view their passwords in clear text in the password manager.\n",
"fixid": "F-0010r1_fix",
"fixtext": "\nValid for Chrome Browser version 8 or later.\n\nWindows registry:\n Key Path: HKLM\\Software\\Policies\\Google\\Chrome\\\n Value Name: PasswordManagerAllowShowPasswords\n Value Type: Boolean (REG_DWORD)\n Value Data: 0\n \nWindows group policy:\n Policy Path: Computer Configuration\\Administrative Templates\\Google\\Google Chrome\\Password manager\\\n Policy Name: Allow users to show passwords in Password Manager\n Policy State: Disabled\n Policy Value: N/A\n\t\t",
"iacontrols": null,
"id": "V-0010",
"ruleID": "SV-0010r1_rule",
"severity": "medium",
"title": "Use of cleartext passwords in the Password Manager must be disabled",
"version": "DTBC-0010"
},
"V-0011": {
"checkid": "C-0011r1_chk",
"checktext": "Universal method (Requires Chrome Browser v15 or later):\n 1. In the omnibox (address bar) type chrome://policy\n 2. If PasswordManagerEnabled is displayed under the Policy Name column and it is set to false under the Policy Value column, then this is not a finding.\n\nWindows method:\n1. Start regedit\n2. Navigate to HKLM\\Software\\Policies\\Google\\Chrome\\\n3. If the PasswordManagerEnabled value name does not exist or its value data is not set to 0, then this is a finding.",
"description": "Enables saving passwords and using saved passwords in Google Chrome. If you enable this setting, users can have Google Chrome memorize passwords and provide them automatically the next time they log in to a site. If you disable this setting, users are not able to save passwords or use already saved passwords. If you enable or disable this setting, users cannot change or override this setting in Google Chrome. If this policy is left not set, this will be enabled but the user will be able to change it.\n",
"fixid": "F-0011r1_fix",
"fixtext": "\nValid for Chrome Browser version 8 or later.\n\nWindows registry:\n Key Path: HKLM\\Software\\Policies\\Google\\Chrome\\\n Value Name: PasswordManagerEnabled\n Value Type: Boolean (REG_DWORD)\n Value Data: 0\n \nWindows group policy:\n Policy Path: Computer Configuration\\Administrative Templates\\Google\\Google Chrome\\Password Manager\\\n Policy Name: Enable the password manager\n Policy State: Disabled\n Policy Value: N/A\n\t\t",
"iacontrols": null,
"id": "V-0011",
"ruleID": "SV-0011r1_rule",
"severity": "medium",
"title": "The Password Manager must be disabled",
"version": "DTBC-0011"
},
"V-0012": {
"checkid": "C-0012r1_chk",
"checktext": "Universal method (Requires Chrome Browser v15 or later):\n 1. In the omnibox (address bar) type chrome://policy\n 2. If AuthSchemes is displayed under the Policy Name column and it is set to negotiate under the Policy Value column, then this is not a finding.\n\nWindows method:\n1. Start regedit\n2. Navigate to HKLM\\Software\\Policies\\Google\\Chrome\n3. If the AuthSchemes value name does not exist or its value data is not set to negotiate, then this is a finding.",
"description": "Specifies which HTTP Authentication schemes are supported by Google Chrome. Possible values are 'basic', 'digest', 'ntlm' and 'negotiate'. Separate multiple values with commas. If this policy is left not set, all four schemes will be used.\n",
"fixid": "F-0012r1_fix",
"fixtext": "\nValid for Chrome Browser version 9 or later.\n\nWindows registry:\n Key Path: HKLM\\Software\\Policies\\Google\\Chrome\\\n Value Name: AuthSchemes\n Value Type: String (REG_SZ)\n Value Data: negotiate\n \nWindows group policy:\n Policy Path: Computer Configuration\\Administrative Templates\\Google\\Google Chrome\\Policies for HTTP Authentication\\\n Policy Name: Supported authentication schemes\n Policy State: Enabled\n Policy Value: negotiate\n\t\t",
"iacontrols": null,
"id": "V-0012",
"ruleID": "SV-0012r1_rule",
"severity": "medium",
"title": "The HTTP Authentication must be set to negotiate",
"version": "DTBC-0012"
},
"V-0013": {
"checkid": "C-0013r1_chk",
"checktext": "Universal method (Requires Chrome Browser v15 or later):\n 1. In the omnibox (address bar) type chrome://policy\n 2. If AllowOutdatedPlugins is displayed under the Policy Name column and it is set to false under the Policy Name column, then this is not a finding.\n\nWindows method:\n1. Start regedit\n2. Navigate to HKLM\\Software\\Policies\\Google\\Chrome\n3. If the AllowOutdatedPlugins value name does not exist or its value data is not set to 0, then this is a finding.",
"description": "Allows Google Chrome to run plugins that are outdated. If you enable this setting, outdated plugins are used as normal plugins. If you disable this setting, outdated plugins will not be used and users will not be asked for permission to run them. If this setting is not set, users will be asked for permission to run outdated plugins.\n",
"fixid": "F-0013r1_fix",
"fixtext": "\nValid for Chrome Browser version 12 or later.\n\nWindows registry:\n Key Path: HKLM\\Software\\Policies\\Google\\Chrome\\\n Value Name: AllowOutdatedPlugins\n Value Type: Boolean (REG_DWORD)\n Value Data: 0\n \nWindows group policy:\n Policy Path: Computer Configuration\\Administrative Templates\\Google\\Google Chrome\\\n Policy Name: Allow running plugins that are outdated\n Policy State: Disabled\n Policy Value: N/A\n\t\t",
"iacontrols": null,
"id": "V-0013",
"ruleID": "SV-0013r1_rule",
"severity": "medium",
"title": "The running of outdated plugins must be disabled",
"version": "DTBC-0013"
},
"V-0014": {
"checkid": "C-0014r1_chk",
"checktext": "Universal method (Requires Chrome Browser v15 or later):\n 1. In the omnibox (address bar) type chrome://policy\n 2. If AlwaysAuthorizePlugins is displayed under the Policy Name column and it is set to false under the Policy Value column, then this is not a finding.\n\nWindows method:\n1. Start regedit\n2. Navigate to HKLM\\Software\\Policies\\Google\\Chrome\\\n3. If the AlwaysAuthorizePlugins value name does not exist or its value data is not set to 0, then this is a finding.",
"description": "Allows Google Chrome to run plugins that require authorization. If you enable this setting, plugins that are not outdated always run. If this setting is disabled or not set, users will be asked for permission to run plugins that require authorization. These are plugins that can compromise security.\n",
"fixid": "F-0014r1_fix",
"fixtext": "\nValid for Chrome Browser version 13 or later.\n\nWindows registry:\n Key Path: HKLM\\Software\\Policies\\Google\\Chrome\\\n Value Name: AlwaysAuthorizePlugins\n Value Type: Boolean (REG_DWORD)\n Value Data: 0\n \nWindows group policy:\n Policy Path: Computer Configuration\\Administrative Templates\\Google\\Google Chrome\\\n Policy Name: Always runs plugins that require authorization\n Policy State: Disabled\n Policy Value: N/A\n\t\t",
"iacontrols": null,
"id": "V-0014",
"ruleID": "SV-0014r1_rule",
"severity": "medium",
"title": "Plugins requiring authorization must ask for user permission",
"version": "DTBC-0014"
},
"V-0015": {
"checkid": "C-0015r1_chk",
"checktext": "Universal method (Requires Chrome Browser v15 or later):\n 1. In the omnibox (address bar) type chrome://policy\n 2. If BlockThirdPartyCookies is displayed under the Policy Name column and it is set to true under the Policy Value column, then this is not a finding.\n\nWindows method:\n1. Start regedit\n2. Navigate to HKLM\\Software\\Policies\\Google\\Chrome\\\n3. If the BlockThirdPartyCookies value name does not exist or its value data is not set to 1, then this is a finding.",
"description": "Blocks third party cookies. Enabling this setting prevents cookies from being set by web page elements that are not from the domain that is in the browser's address bar. Disabling this setting allows cookies to be set by web page elements that are not from the domain that is in the browser's address bar and prevents users from changing this setting. If this policy is left not set, third party cookies will be enabled but the user will be able to change that.\n",
"fixid": "F-0015r1_fix",
"fixtext": "\nValid for Chrome Browser version 10 or later.\n\nWindows registry:\n Key Path: HKLM\\Software\\Policies\\Google\\Chrome\\\n Value Name: BlockThirdPartyCookies\n Value Type: Boolean (REG_DWORD)\n Value Data: 1\n \nWindows group policy:\n Policy Path: Computer Configuration\\Administrative Templates\\Google\\Google Chrome\\\n Policy Name: Block third party cookies\n Policy State: Enabled\n Policy Value: N/A\n\t\t",
"iacontrols": null,
"id": "V-0015",
"ruleID": "SV-0015r1_rule",
"severity": "medium",
"title": "Third party cookies must be blocked",
"version": "DTBC-0015"
},
"V-0016": {
"checkid": "C-0016r1_chk",
"checktext": "Universal method(Requires Chrome Browser v15 or later):\n 1. In the omnibox(address bar) type chrome://policy\n 2. If the policy \"ClearSiteDataOnExit\" is shown and is set to false, this is not a finding.\n\nWindows:\nStart regedit\nNavigate to HKLM\\Software\\Policies\\Google\\Chrome\\ClearSiteDataOnExit\nIf this key does not exist or is not set to 0 this is a finding.",
"description": "This policy is an override for the \"Clear cookies and other site data when I close my browser\" content settings option. When set to enabled Google Chrome will delete all locally stored data from the browser when it is shut down. If set to disabled site data will not be cleared on exit. If this policy is left not set Google Chrome will use the default which is to preserve site data on shut down and the user will be able to change this. If the \"RestoreOnStartup\" policy is set to restore URLs from previous sessions this policy will not clear cookies or other data relevant to restoring the previous browsing session completely.\n",
"fixid": "F-0016r1_fix",
"fixtext": "\nValid for Chrome Browser version 11 or later.\nWindows Registry:\n Registry Path: HKLM\\Software\\Policies\\Google\\Chrome\\\n Registry Key: ClearSiteDataOnExit\n Key Type: Boolean (REG_DWORD)\n Set the value of the registry key to 0\n \nWindows group policy:\n Policy Path: Computer Configuration\\Administrative Templates\\Google\\Google Chrome\\\n Policy Name: \"Clear site data on browser shutdown\"\n Policy State: Disabled\n Policy Value: N/A\n\t\t",
"iacontrols": null,
"id": "V-0016",
"ruleID": "SV-0016r1_rule",
"severity": "medium",
"title": "Site data must not be wiped on closing the browser",
"version": "DTBC-0016"
},
"V-0017": {
"checkid": "C-0017r1_chk",
"checktext": "Universal method (Requires Chrome Browser v15 or later):\n 1. In the omnibox (address bar) type chrome://policy\n 2. If BackgroundModeEnabled is displayed under the Policy Name column and it is set to false under the Policy Value column, then this is not a finding.\n\nWindows method:\n1. Start regedit\n2. Navigate to HKLM\\Software\\Policies\\Google\\Chrome\\\n3. If the BackgroundModeEnabled value name does not exist or its value data is not set to 0, then this is a finding.",
"description": "Determines whether a Google Chrome process is started on OS login and keeps running when the last browser window is closed, allowing background apps to remain active. The background process displays an icon in the system tray and can always be closed from there. If this policy is set to True, background mode is enabled and cannot be controlled by the user in the browser settings. If this policy is set to False, background mode is disabled and cannot be controlled by the user in the browser settings. If this policy is left unset, background mode is initially disabled and can be controlled by the user in the browser settings.\n",
"fixid": "F-0017r1_fix",
"fixtext": "\nValid for Chrome Browser version 19 or later.\n\nWindows registry:\n Key Path: HKLM\\Software\\Policies\\Google\\Chrome\\\n Value Name: BackgroundModeEnabled\n Value Type: Boolean (REG_DWORD)\n Value Data: 0\n \nWindows group policy:\n Policy Path: Computer Configuration\\Administrative Templates\\Google\\Google Chrome\\\n Policy Name: Continue running background apps when Google Chrome is closed\n Policy State: Disabled\n Policy Value: N/A\n\t\t",
"iacontrols": null,
"id": "V-0017",
"ruleID": "SV-0017r1_rule",
"severity": "medium",
"title": "Background processing must be disabled",
"version": "DTBC-0017"
},
"V-0018": {
"checkid": "C-0018r1_chk",
"checktext": "Universal method (Requires Chrome Browser v15 or later):\n 1. In the omnibox (address bar) type chrome://policy\n 2. If DisableSpdy is displayed under the Policy Name column and it is set to true under the Policy Name column, then this is not a finding.\n\nWindows method:\n1. Start regedit\n2. Navigate to HKLM\\Software\\Policies\\Google\\Chrome\\\n3. If the DisableSpdy value name does not exist or its value data is not set to 1, then this is a finding.",
"description": "Disables use of the SPDY protocol in Google Chrome. If this policy is enabled the SPDY protocol will not be available in Google Chrome. Setting this policy to disabled will allow the usage of SPDY. If this policy is left not set, SPDY will be available.\n",
"fixid": "F-0018r1_fix",
"fixtext": "\nValid for Chrome Browser version 8 or later.\n\nWindows registry:\n Key Path: HKLM\\Software\\Policies\\Google\\Chrome\\\n Value Name: DisableSpdy\n Value Type: Boolean (REG_DWORD)\n Value Data: 1\n \nWindows group policy:\n Policy Path: Computer Configuration\\Administrative Templates\\Google\\Google Chrome\\\n Policy Name: Disable SPDY protocol\n Policy State: Enabled\n Policy Value: N/A\n\t\t",
"iacontrols": null,
"id": "V-0018",
"ruleID": "SV-0018r1_rule",
"severity": "medium",
"title": "The SPDY protocol must be disabled",
"version": "DTBC-0018"
},
"V-0019": {
"checkid": "C-0019r1_chk",
"checktext": "Universal method (Requires Chrome Browser v15 or later):\n 1. In the omnibox (address bar) type chrome://policy\n 2. If Disable3DAPIs is displayed under the Policy Name column and it is set to true under the Policy Value column, then this is not a finding.\n\nWindows method:\n1. Start regedit\n2. Navigate to HKLM\\Software\\Policies\\Google\\Chrome\\\n3. If the Disable3DAPIs value name does not exist or its value data is not set to 1, then this is a finding.",
"description": "Disable support for 3D graphics APIs. Enabling this setting prevents web pages from accessing the graphics processing unit (GPU). Specifically, web pages can not access the WebGL API and plugins can not use the Pepper 3D API. Disabling this setting or leaving it not set potentially allows web pages to use the WebGL API and plugins to use the Pepper 3D API. The default settings of the browser may still require command line arguments to be passed in order to use these APIs.\n",
"fixid": "F-0019r1_fix",
"fixtext": "\nValid for Chrome Browser version 9 or later.\n\nWindows registry:\n Key Path: HKLM\\Software\\Policies\\Google\\Chrome\\\n Value Name: Disable3DAPIs\n Value Type: Boolean (REG_DWORD)\n Value Data: 1\n \nWindows group policy:\n Policy Path: Computer Configuration\\Administrative Templates\\Google\\Google Chrome\\\n Policy Name: Disable support for 3D graphics APIs\n Policy State: Enabled\n Policy Value: N/A\n\t\t",
"iacontrols": null,
"id": "V-0019",
"ruleID": "SV-0019r1_rule",
"severity": "medium",
"title": "3D Graphics APIs must be disabled",
"version": "DTBC-0019"
},
"V-0020": {
"checkid": "C-0020r1_chk",
"checktext": "Universal method (Requires Chrome Browser v15 or later):\n 1. In the omnibox (address bar) type chrome://policy\n 2. If SyncDisabled is displayed under the Policy Name column and it is set to true under the Policy Value column, then this is not a finding.\n\nWindows method:\n1. Start regedit\n2. Navigate to HKLM\\Software\\Policies\\Google\\Chrome\\\n3. If the SyncDisabled value name does not exist or its value data is not set to 1, then this is a finding.",
"description": "Disables data synchronization in Google Chrome using Google-hosted synchronization services and prevents users from changing this setting. If you enable this setting, users cannot change or override this setting in Google Chrome. If this policy is left not set Google Sync will be available for the user to choose whether to use it or not.\n",
"fixid": "F-0020r1_fix",
"fixtext": "\nValid for Chrome Browser version 8 or later.\n\nWindows registry:\n Key Path: HKLM\\Software\\Policies\\Google\\Chrome\\\n Value Name: SyncDisabled\n Value Type: Boolean (REG_DWORD)\n Value Data: 1\n \nWindows group policy:\n Policy Path: Computer Configuration\\Administrative Templates\\Google\\Google Chrome\\\n Policy Name: Disable synchronization of data with Google\n Policy State: Enabled\n Policy Value: N/A\n\t\t",
"iacontrols": null,
"id": "V-0020",
"ruleID": "SV-0020r1_rule",
"severity": "medium",
"title": "Google Data Synchronization must be disabled",
"version": "DTBC-0020"
},
"V-0021": {
"checkid": "C-0021r1_chk",
"checktext": "Universal method (Requires Chrome Browser v15 or later):\n 1. In the omnibox (address bar) type chrome://policy\n 2. If DisabledSchemes is displayed under the Policy Name column and it is set to file,javascript under the Policy Value column, then this is not a finding.\n\nWindows method:\n1. Start regedit\n2. Navigate to HKLM\\Software\\Policies\\Google\\Chrome\\DisabledSchemes\n3. If the DisabledSchemes key does not exist, or the 1 value name does not exist under that key and its value data is not set to file, or the 2 value name does not exist under that key and its value data is not set to javascript, then this is a finding..",
"description": "Disables the listed protocol schemes in Google Chrome. URLs using a scheme from this list will not load and can not be navigated to. If this policy is left not set or the list is empty all schemes will be accessible in Google Chrome.\n",
"fixid": "F-0021r1_fix",
"fixtext": "\nValid for Chrome Browser version 12 or later.\n\nWindows registry:\n Key Path: HKLM\\Software\\Policies\\Google\\Chrome\\DisabledSchemes\\\n Value Name: 1\n Value Type: String (REG_SZ)\n Value Data: file\n\n Key Path: HKLM\\Software\\Policies\\Google\\Chrome\\DisabledSchemes\\\n Value Name: 2\n Value Type: String (REG_SZ)\n Value Data: javascript\n \nWindows group policy:\n Policy Path: Computer Configuration\\Administrative Templates\\Google\\Google Chrome\\\n Policy Name: Disable URL protocol schemes\n Policy State: Enabled\n Policy Value 1: file\n Policy Value 2: javascript\n\t\t",
"iacontrols": null,
"id": "V-0021",
"ruleID": "SV-0021r1_rule",
"severity": "medium",
"title": "The URL protocol schemas \"file\" and \"javascript\" must be disabled",
"version": "DTBC-0021"
},
"V-0022": {
"checkid": "C-0022r1_chk",
"checktext": "Universal method (Requires Chrome Browser v15 or later):\n 1. In the omnibox (address bar) type chrome://policy\n 2. If AutoFillEnabled is displayed under the Policy Name column and it is set to false under the Policy Value column, then this is not a finding.\n\nWindows method:\n1. Start regedit\n2. Navigate to HKLM\\Software\\Policies\\Google\\Chrome\\\n3. If the AutoFillEnabled value name does not exist or its value data is not set to 0, then this is a finding.",
"description": "Enables Google Chrome's AutoFill feature and allows users to auto complete web forms using previously stored information such as address or credit card information. If you disable this setting, AutoFill will be inaccessible to users. If you enable this setting or do not set a value, AutoFill will remain under the control of the user. This will allow them to configure AutoFill profiles and to switch AutoFill on or off at their own discretion.\n",
"fixid": "F-0022r1_fix",
"fixtext": "\nValid for Chrome Browser version 8 or later.\n\nWindows registry:\n Key Path: HKLM\\Software\\Policies\\Google\\Chrome\\\n Value Name: AutoFillEnabled\n Value Type: Boolean (REG_DWORD)\n Value Data: 0\n \nWindows group policy:\n Policy Path: Computer Configuration\\Administrative Templates\\Google\\Google Chrome\\\n Policy Name: Enable AutoFill\n Policy State: Disabled\n Policy Value: N/A\n\t\t",
"iacontrols": null,
"id": "V-0022",
"ruleID": "SV-0022r1_rule",
"severity": "medium",
"title": "AutoFill must be disabled",
"version": "DTBC-0022"
},
"V-0023": {
"checkid": "C-0023r1_chk",
"checktext": "Universal method (Requires Chrome Browser v15 or later):\n 1. In the omnibox (address bar) type chrome://policy\n 2. If CloudPrintProxyEnabled is displayed under the Policy Name column and it is set to false under the Policy Value column, then this is not a finding.\n\nWindows method:\n1. Start regedit\n2. Navigate to HKLM\\Software\\Policies\\Google\\Chrome\\\n3. If the CloudPrintProxyEnabled value name does not exist or its value data is not set to 0, then this is a finding.",
"description": "Enables Google Chrome to act as a proxy between Google Cloud Print and legacy printers connected to the machine. If this setting is enabled or not configured, users can enable the cloud print proxy by authentication with their Google account. If this setting is disabled, users cannot enable the proxy, and the machine will not be allowed to share it's printers with Google Cloud Print. If this policy is left not set, this will be enabled but the user will be able to change it.\n",
"fixid": "F-0023r1_fix",
"fixtext": "\nValid for Chrome Browser version 17 or later.\n\nWindows registry:\n Key Path: HKLM\\Software\\Policies\\Google\\Chrome\\\n Value Name: CloudPrintProxyEnabled\n Value Type: Boolean (REG_DWORD)\n Value Data: 0\n \nWindows group policy:\n Policy Path: Computer Configuration\\Administrative Templates\\Google\\Google Chrome\\\n Policy Name: Enable Google Cloud Print proxy\n Policy State: Disabled\n Policy Value: N/A\n\t\t",
"iacontrols": null,
"id": "V-0023",
"ruleID": "SV-0023r1_rule",
"severity": "medium",
"title": "Cloud print sharing must be disabled",
"version": "DTBC-0023"
},
"V-0024": {
"checkid": "C-0024r1_chk",
"checktext": "Universal method (Requires Chrome Browser v15 or later):\n 1. In the omnibox (address bar) type chrome://policy\n 2. If SyncDisabled is displayed under the Policy Name column and it is set to true under the Policy Value column, then this is not a finding.\n\nWindows method:\n1. Start regedit\n2. Navigate to HKLM\\Software\\Policies\\Google\\Chrome\\\n3. If the SyncDisabled value name does not exist or its value data is not set to 1, then this is a finding.",
"description": "Enables Google Chrome's Instant feature and prevents users from changing this setting. If you enable this setting, Google Chrome Instant is enabled. If you disable this setting, Google Chrome Instant is disabled. If you enable or disable this setting, users cannot change or override this setting. If this setting is left not set the user can decide to use this function or not.\n",
"fixid": "F-0024r1_fix",
"fixtext": "\nValid for Chrome Browser version 8 or later.\n\nWindows registry:\n Key Path: HKLM\\Software\\Policies\\Google\\Chrome\\\n Value Name: SyncDisabled\n Value Type: Boolean (REG_DWORD)\n Value Data: 1\n \nWindows group policy:\n Policy Path: Computer Configuration\\Administrative Templates\\Google\\Google Chrome\\\n Policy Name: Disable synchronization of data with Google\n Policy State: Enabled\n Policy Value: N/A\n\t\t",
"iacontrols": null,
"id": "V-0024",
"ruleID": "SV-0024r1_rule",
"severity": "medium",
"title": "Google Chrome Instant must be disabled",
"version": "DTBC-0024"
},
"V-0025": {
"checkid": "C-0025r1_chk",
"checktext": "Universal method (Requires Chrome Browser v15 or later):\n 1. In the omnibox (address bar) type chrome://policy\n 2. If DnsPrefetchingEnabled is displayed under the Policy Name column and it is set to false under the Policy Value column, then this is not a finding.\n\nWindows method:\n1. Start regedit\n2. Navigate to HKLM\\Software\\Policies\\Google\\Chrome\\\n3. If the DnsPrefetchingEnabled value name does not exist or its value data is not set to 0, then this is a finding.",
"description": "Enables network prediction in Google Chrome and prevents users from changing this setting. If you enable or disable this setting, users cannot change or override this setting in Google Chrome. If this policy is left not set, this will be enabled but the user will be able to change it.\n",
"fixid": "F-0025r1_fix",
"fixtext": "\nValid for Chrome Browser version 8 or later.\n\nWindows registry:\n Key Path: HKLM\\Software\\Policies\\Google\\Chrome\\\n Value Name: DnsPrefetchingEnabled\n Value Type: Boolean (REG_DWORD)\n Value Data: 0\n \nWindows group policy:\n Policy Path: Computer Configuration\\Administrative Templates\\Google\\Google Chrome\\\n Policy Name: Enable network prediction\n Policy State: Disabled\n Policy Value: N/A\n\t\t",
"iacontrols": null,
"id": "V-0025",
"ruleID": "SV-0025r1_rule",
"severity": "medium",
"title": "Network prediction must be disabled",
"version": "DTBC-0025"
},
"V-0026": {
"checkid": "C-0026r1_chk",
"checktext": "Universal method (Requires Chrome Browser v15 or later):\n 1. In the omnibox (address bar) type chrome://policy\n 2. If MetricsReportingEnabled is displayed under the Policy Name column and it is set to false under the Policy Value column, then this is not a finding.\n\nWindows method:\n1. Start regedit\n2. Navigate to HKLM\\Software\\Policies\\Google\\Chrome\\\n3. If the MetricsReportingEnabled value name does not exist or its value data is not set to 0, then this is a finding.",
"description": "Enables anonymous reporting of usage and crash-related data about Google Chrome to Google and prevents users from changing this setting. If you enable this setting, anonymous reporting of usage and crash-related data is sent to Google. If you disable this setting, anonymous reporting of usage and crash-related data is never sent to Google. If you enable or disable this setting, users cannot change or override this setting in Google Chrome. If this policy is left not set the setting will be what the user chose upon installation / first run.\n",
"fixid": "F-0026r1_fix",
"fixtext": "\nValid for Chrome Browser version 8 or later.\n\nWindows registry:\n Key Path: HKLM\\Software\\Policies\\Google\\Chrome\\\n Value Name: MetricsReportingEnabled\n Value Type: Boolean (REG_DWORD)\n Value Data: 0\n \nWindows group policy:\n Policy Path: Computer Configuration\\Administrative Templates\\Google\\Google Chrome\\\n Policy Name: Enable reporting of usage and crash-related data\n Policy State: Disabled\n Policy Value: N/A\n\t\t",
"iacontrols": null,
"id": "V-0026",
"ruleID": "SV-0026r1_rule",
"severity": "medium",
"title": "Mestrics reporting to Google must be disabled",
"version": "DTBC-0026"
},
"V-0027": {
"checkid": "C-0027r1_chk",
"checktext": "Universal method (Requires Chrome Browser v15 or later):\n 1. In the omnibox (address bar) type chrome://policy\n 2. If SearchSuggestEnabled is displayed under the Policy Name column and it is set to false under the Policy Value column, then this is not a finding.\n\nWindows method:\n1. Start regedit\n2. Navigate to HKLM\\Software\\Policies\\Google\\Chrome\\\n3. If the SearchSuggestEnabled value name does not exist or its value data is not set to 0, then this is a finding.",
"description": "Enables search suggestions in Google Chrome's Omnibox and prevents users from changing this setting. If you enable this setting, search suggestions are used. If you disable this setting, search suggestions are never used. If you enable or disable this setting, users cannot change or override this setting in Google Chrome. If this policy is left not set, this will be enabled but the user will be able to change it.\n",
"fixid": "F-0027r1_fix",
"fixtext": "\nValid for Chrome Browser version 8 or later.\n\nWindows registry:\n Key Path: HKLM\\Software\\Policies\\Google\\Chrome\\\n Value Name: SearchSuggestEnabled\n Value Type: Boolean (REG_DWORD)\n Value Data: 0\n \nWindows group policy:\n Policy Path: Computer Configuration\\Administrative Templates\\Google\\Google Chrome\\\n Policy Name: Enable search suggestions\n Policy State: Disabled\n Policy Value: N/A\n\t\t",
"iacontrols": null,
"id": "V-0027",
"ruleID": "SV-0027r1_rule",
"severity": "medium",
"title": "Search suggestions must be enabled",
"version": "DTBC-0027"
},
"V-0028": {
"checkid": "C-0028r1_chk",
"checktext": "Universal method (Requires Chrome Browser v15 or later):\n 1. In the omnibox (address bar) type chrome://policy\n 2. If InstantEnabled is displayed under the Policy Name column and it is set to false under the Policy Value column, then this is not a finding.\n\nWindows method:\n1. Start regedit\n2. Navigate to HKLM\\Software\\Policies\\Google\\Chrome\\\n3. If the InstantEnabled value name does not exist or its value data is not set to 0, then this is a finding.",
"description": "Enables Google Chrome to submit documents to Google Cloud Print for printing. NOTE: This only affects Google Cloud Print support in Google Chrome. It does not prevent users from submitting print jobs on web sites. If this setting is enabled or not configured, users can print to Google Cloud Print from the Google Chrome print dialog. If this setting is disabled, users cannot print to Google Cloud Print from the Google Chrome print dialog\n",
"fixid": "F-0028r1_fix",
"fixtext": "\nValid for Chrome Browser version 11 or later.\n\nWindows registry:\n Key Path: HKLM\\Software\\Policies\\Google\\Chrome\\\n Value Name: InstantEnabled\n Value Type: Boolean (REG_DWORD)\n Value Data: 0\n \nWindows group policy:\n Policy Path: Computer Configuration\\Administrative Templates\\Google\\Google Chrome\\\n Policy Name: Enable Instant\n Policy State: Disabled\n Policy Value: N/A\n\t\t",
"iacontrols": null,
"id": "V-0028",
"ruleID": "SV-0028r1_rule",
"severity": "medium",
"title": "Submitting documents to Google Print Cloud must be disabled",
"version": "DTBC-0028"
},
"V-0029": {
"checkid": "C-0029r1_chk",
"checktext": "Universal method (Requires Chrome Browser v15 or later):\n 1. In the omnibox (address bar) type chrome://policy\n 2. If ImportSavedPasswords is displayed under the Policy Name column and it is set to false under the Policy Value column, then this is not a finding.\n\nWindows method:\n1. Start regedit\n2. Navigate to HKLM\\Software\\Policies\\Google\\Chrome\\\n3. If the ImportSavedPasswords value name does not exist or its value data is not set to 0, then this is a finding.",
"description": "This policy forces the saved passwords to be imported from the previous default browser if enabled. If enabled, this policy also affects the import dialog. If disabled, the saved passwords are not imported. If it is not set, the user may be asked whether to import, or importing may happen automatically.\n",
"fixid": "F-0029r1_fix",
"fixtext": "\nValid for Chrome Browser version 15 or later.\n\nWindows registry:\n Key Path: HKLM\\Software\\Policies\\Google\\Chrome\\\n Value Name: ImportSavedPasswords\n Value Type: Boolean (REG_DWORD)\n Value Data: 0\n \nWindows group policy:\n Policy Path: Computer Configuration\\Administrative Templates\\Google\\Google Chrome\\\n Policy Name: Import saved passwords from default browser on first run\n Policy State: Disabled\n Policy Value: N/A\n\t\t",
"iacontrols": null,
"id": "V-0029",
"ruleID": "SV-0029r1_rule",
"severity": "medium",
"title": "Importing of saved passwords must be disabled",
"version": "DTBC-0029"
},
"V-0030": {
"checkid": "C-0030r1_chk",
"checktext": "Universal method (Requires Chrome Browser v15 or later):\n 1. In the omnibox (address bar) type chrome://policy\n 2. If IncognitoModeAvailability is displayed under the Policy Name column and it is set to 1 under the Policy Value column, then this is not a finding.\n\nWindows method:\n1. Start regedit\n2. Navigate to HKLM\\Software\\Policies\\Google\\Chrome\\\n3. If the IncognitoModeAvailability value name does not exist or its value data is not set to 1, then this is a finding.",
"description": "Specifies whether the user may open pages in Incognito mode in Google Chrome. If 'Enabled' is selected or the policy is left unset, pages may be opened in Incognito mode. If 'Disabled' is selected, pages may not be opened in Incognito mode. If 'Forced' is selected, pages may be opened ONLY in Incognito mode.\n 0 = Incognito mode available.\n 1 = Incognito mode disabled.\n 2 = Incognito mode forced.\n",
"fixid": "F-0030r1_fix",
"fixtext": "\nValid for Chrome Browser version 14 or later.\n\nWindows registry:\n Key Path: HKLM\\Software\\Policies\\Google\\Chrome\\\n Value Name: IncognitoModeAvailability\n Value Type: Integer (REG_DWORD)\n Value Data: 1\n \nWindows group policy:\n Policy Path: Computer Configuration\\Administrative Templates\\Google\\Google Chrome\\\n Policy Name: Incognito mode availability\n Policy State: Enabled\n Policy Value: Incognito mode disabled\n\t\t",
"iacontrols": null,
"id": "V-0030",
"ruleID": "SV-0030r1_rule",
"severity": "medium",
"title": "Incognito mode must be disabled",
"version": "DTBC-0030"
},
"V-0031": {
"checkid": "C-0031r1_chk",
"checktext": "Universal method(Requires Chrome Browser v15 or later):\n 1. In the omnibox (address bar) type chrome://policy\n 2. If HideWebStorePromo is displayed under the Policy Name column and it is set to true under the Policy Value column, then this is not a finding.\n\nWindows method:\n1. Start regedit\n2. Navigate to HKLM\\Software\\Policies\\Google\\Chrome\\\n3. If the HideWebStorePromo value name does not exist or its value data is not set to 1, then this is a finding.",
"description": "When set to True, promotions for Chrome Web Store apps will not appear on the new tab page. Setting this option to False or leaving it not set will make the promotions for Chrome Web Store apps appear on the new tab page\n",
"fixid": "F-0031r1_fix",
"fixtext": "\nValid for Chrome Browser version 15 or later.\n\nWindows registry:\n Key Path: HKLM\\Software\\Policies\\Google\\Chrome\\\n Value Name: HideWebStorePromo\n Value Type: Boolean (REG_DWORD)\n Value Data: 1\n \nWindows group policy:\n Policy Path: Computer Configuration\\Administrative Templates\\Google\\Google Chrome\\\n Policy Name: Prevent app promotions from appearing on the new tab page\n Policy State: Enabled\n Policy Value: N/A\n\t\t",
"iacontrols": null,
"id": "V-0031",
"ruleID": "SV-0031r1_rule",
"severity": "medium",
"title": "Web store ads must be disabled",
"version": "DTBC-0031"
},
"V-0032": {
"checkid": "C-0032r1_chk",
"checktext": "Universal method(Requires Chrome Browser v15 or later):\n 1. In the omnibox(address bar) type chrome://policy\n 2. If the policy \"DiskCacheDir\" is shown and is set to \"${local_app_data}\\Chrome\\Cache\", this is not a finding.\n\nWindows:\nStart regedit\nNavigate to HKLM\\Software\\Policies\\Google\\Chrome\\DiskCacheDir\nIf this key does not exist or is not set to \"${local_app_data}\\Chrome\\Cache\" this is a finding.",
"description": "Configures the directory that Google Chrome will use for storing cached files on the disk. If you set this policy, Google Chrome will use the provided directory regardless whether the user has specified the '--disk-cache-dir' flag or not. If this policy is left not set the default cache directory will be used and the user will be able to override it with the '--disk-cache-dir' command line flag.\n",
"fixid": "F-0032r1_fix",
"fixtext": "\nValid for Chrome Browser version 13 or later.\nWindows Registry:\n Registry Path: HKLM\\Software\\Policies\\Google\\Chrome\\\n Registry Key: DiskCacheDir\n Key Type: String (REG_SZ)\n Set the value of the registry key to \"${local_app_data}\\Chrome\\Cache\"\n \nWindows group policy:\n Policy Path: Computer Configuration\\Administrative Templates\\Google\\Google Chrome\\\n Policy Name: \"Set disk cache directory\"\n Policy State: Enabled\n Policy Value: \"${local_app_data}\\Chrome\\Cache\"\n\t\t",
"iacontrols": null,
"id": "V-0032",
"ruleID": "SV-0032r1_rule",
"severity": "medium",
"title": "the Chrome cache location must be set",
"version": "DTBC-0032"
},
"V-0033": {
"checkid": "C-0033r1_chk",
"checktext": "Universal method(Requires Chrome Browser v15 or later):\n 1. In the omnibox(address bar) type chrome://policy\n 2. If the policy \"UserDataDir\" is shown and is set to \"${roaming_app_data}\\Chrome\\Data\", this is not a finding.\n\nWindows:\nStart regedit\nNavigate to HKLM\\Software\\Policies\\Google\\Chrome\\UserDataDir\nIf this key does not exist or is not set to \"${roaming_app_data}\\Chrome\\Data\" this is a finding.",
"description": "Configures the directory that Google Chrome will use for storing user data. If you set this policy, Google Chrome will use the provided directory regardless whether the user has specified the '--user-data-dir' flag or not. If this policy is left not set the default profile path will be used and the user will be able to override it with the '--user-data-dir' command line flag.\n",
"fixid": "F-0033r1_fix",
"fixtext": "\nValid for Chrome Browser version 11 or later.\nWindows Registry:\n Registry Path: HKLM\\Software\\Policies\\Google\\Chrome\\\n Registry Key: UserDataDir\n Key Type: String (REG_SZ)\n Set the value of the registry key to \"${roaming_app_data}\\Chrome\\Data\"\n \nWindows group policy:\n Policy Path: Computer Configuration\\Administrative Templates\\Google\\Google Chrome\\\n Policy Name: \"Set user data directory\"\n Policy State: Enabled\n Policy Value: \"${roaming_app_data}\\Chrome\\Data\"\n\t\t",
"iacontrols": null,
"id": "V-0033",
"ruleID": "SV-0033r1_rule",
"severity": "medium",
"title": "The user data location must be set",
"version": "DTBC-0033"
},
"V-0034": {
"checkid": "C-0034r1_chk",
"checktext": "Universal method (Requires Chrome Browser v15 or later):\n 1. In the omnibox (address bar) type chrome://policy\n 2. If DisabledPlugins is displayed under the Policy Name column and it is set to * under the Policy Value column, then this is not a finding.\n\nWindows method:\n1. Start regedit\n2. Navigate to HKLM\\Software\\Policies\\Google\\Chrome\\DisabledPlugins\n3. If the DisabledPlugins key does not exist, or the 1 value name does not exist under that key and the value data is not set to * then this is a finding.",
"description": "Specifies a list of plugins that are disabled in Google Chrome and prevents users from changing this setting. The wildcard characters '*' and '?' can be used to match sequences of arbitrary characters. '*' matches an arbitrary number of characters while '?' specifies an optional single character, i.e. matches zero or one characters. The escape character is '\\', so to match actual '*', '?', or '\\' characters, you can put a '\\' in front of them. If you enable this setting, the specified list of plugins is never used in Google Chrome. The plugins are marked as disabled in 'about:plugins' and users cannot enable them. Note that this policy can be overriden by EnabledPlugins and DisabledPluginsExceptions. If this policy is left not set the user can use any plugin installed on the system except for hard-coded incompatible, outdated or dangerous plugins\n",
"fixid": "F-0034r1_fix",
"fixtext": "\nValid for Chrome Browser version 8 or later.\n\nWindows registry:\n Key Path: HKLM\\Software\\Policies\\Google\\Chrome\\DisabledPlugins\n Value Name: 1\n Value Type: String (REG_SZ)\n Value Data: *\n \nWindows group policy:\n Policy Path: Computer Configuration\\Administrative Templates\\Google\\Google Chrome\\\n Policy Name: Specify a list of disabled plugins\n Policy State: Enabled\n Policy Value: *\n\t\t",
"iacontrols": null,
"id": "V-0034",
"ruleID": "SV-0034r1_rule",
"severity": "medium",
"title": "Plugins must be disabled by default",
"version": "DTBC-0034"
},
"V-0035": {
"checkid": "C-0035r1_chk",
"checktext": "Universal method (Requires Chrome Browser v15 or later):\n 1. In the omnibox (address bar) type chrome://policy\n 2. If EnabledPlugins is displayed under the Policy Name column and it is set to Java*,Shockwave Flash,Chrome PDF Viewer under the Policy Value column, then this is not a finding.\n\nWindows method:\n1. Start regedit\n2. Navigate to HKLM\\Software\\Policies\\Google\\Chrome\\EnabledPlugins\n3. If the EnabledPlugins key does not exist and the 1 value name data is not set to Java*, the 2 value name data is not set to Shockwave Flash, and the 3 value name is not set to Chrome PDF Viewer then this is a finding.",
"description": "Specifies a list of plugins that are enabled in Google Chrome and prevents users from changing this setting. The wildcard characters '*' and '?' can be used to match sequences of arbitrary characters. '*' matches an arbitrary number of characters while '?' specifies an optional single character, i.e. matches zero or one characters. The escape character is '\\', so to match actual '*', '?', or '\\' characters, you can put a '\\' in front of them. The specified list of plugins is always used in Google Chrome if they are installed. The plugins are marked as enabled in 'about:plugins' and users cannot disable them. Note that this policy overrides both DisabledPlugins and DisabledPluginsExceptions. If this policy is left not set the user can disable any plugin installed on the system.\n",
"fixid": "F-0035r1_fix",
"fixtext": "\nValid for Chrome Browser version 11 or later.\n\nWindows registry:\n Key Path: HKLM\\Software\\Policies\\Google\\Chrome\\EnabledPlugins\n Value Name: 1\n Value Type: String (REG_SZ)\n Value Data: Java*\n\n Key Path: HKLM\\Software\\Policies\\Google\\Chrome\\EnabledPlugins\n Value Name: 2\n Value Type: String (REG_SZ)\n Value Data: Shockwave Flash\n\n Key Path: HKLM\\Software\\Policies\\Google\\Chrome\\EnabledPlugins\n Value Name: 3\n Value Type: String (REG_SZ)\n Value Data: Chrome PDF Viewer\n \nWindows group policy:\n Policy Path: Computer Configuration\\Administrative Templates\\Google\\Google Chrome\\\n Policy Name: Specify a list of enabled plugins\n Policy State: Enabled\n Policy Value 1: Java*\n Policy Value 2: Shockwave Flash\n Policy Value 3: Chrome PDF Viewer\n\t\t",
"iacontrols": null,
"id": "V-0035",
"ruleID": "SV-0035r1_rule",
"severity": "medium",
"title": "Plugins approved for use must be enabled",
"version": "DTBC-0035"
},
"V-0036": {
"checkid": "C-0036r1_chk",
"checktext": "Universal method (Requires Chrome Browser v15 or later):\n 1. In the omnibox (address bar) type chrome://policy\n 2. If DisablePluginFinder is displayed under the Policy Name column and it is set to true under the Policy Value column, then this is not a finding.\n\nWindows method:\n1. Start regedit\n2. Navigate to HKLM\\Software\\Policies\\Google\\Chrome\\\n3. If the DisablePluginFinder value name does not exist or its value data is not set to 1, then this is a finding.",
"description": "If you set this setting to enabled the automatic search and installation of missing plugins will be disabled in Google Chrome. Setting this option to disabled or leave it not set the plugin finder will be active.\n",
"fixid": "F-0036r1_fix",
"fixtext": "\nValid for Chrome Browser version 11 or later.\n\nWindows registry:\n Key Path: HKLM\\Software\\Policies\\Google\\Chrome\\\n Value Name: DisablePluginFinder\n Value Type: Boolean (REG_DWORD)\n Value Data: 1\n \nWindows group policy:\n Policy Path: Computer Configuration\\Administrative Templates\\Google\\Google Chrome\\\n Policy Name: Specify whether the plugin finder should be disabled\n Policy State: Enabled\n Policy Value: N/A\n\t\t",
"iacontrols": null,
"id": "V-0036",
"ruleID": "SV-0036r1_rule",
"severity": "medium",
"title": "Automated installation of missing plugins must be disabled",
"version": "DTBC-0036"
},
"V-0037": {
"checkid": "C-0037r1_chk",
"checktext": "Universal method (Requires Chrome Browser v15 or later):\n 1. In the omnibox (address bar) type chrome://policy\n 2. If EnableOnlineRevocationChecks is displayed under the Policy Name column and it is set to true under the Policy Value column, then this is not a finding.\n\nWindows method:\n1. Start regedit\n2. Navigate to HKLM\\Software\\Policies\\Google\\Chrome\\\n3. If the EnableOnlineRevocationChecks value name does not exist or its value data is not set to 1, then this is a finding.",
"description": "In light of the fact that soft-fail, online revocation checks provide no effective security benefit, they are disabled by default in Google Chrome version 19 and later. By setting this policy to true, the previous behaviour is restored and online OCSP/CRL checks will be performed. If the policy is not set, or is set to false, then Chrome will not perform online revocation checks in Chrome 19 and later.\n",
"fixid": "F-0037r1_fix",
"fixtext": "\nValid for Chrome Browser version 19 or later.\n\nWindows registry:\n Key Path: HKLM\\Software\\Policies\\Google\\Chrome\\\n Value Name: EnableOnlineRevocationChecks\n Value Type: Boolean (REG_DWORD)\n Value Data: 1\n \nWindows group policy:\n Policy Path: Computer Configuration\\Administrative Templates\\Google\\Google Chrome\\\n Policy Name: Whether online OCSP/CRL checks are performed\n Policy State: Enabled\n Policy Value: N/A\n\t\t",
"iacontrols": null,
"id": "V-0037",
"ruleID": "SV-0037r1_rule",
"severity": "medium",
"title": "Online revocation checks must be done",
"version": "DTBC-0037"
},
"V-0038": {
"checkid": "C-0038r1_chk",
"checktext": "Universal method (Requires Chrome Browser v15 or later):\n 1. In the omnibox (address bar) type chrome://policy\n 2. If SafeBrowsingEnabled is displayed under the Policy Name column and it is set to true under the Policy Value column, then this is not a finding.\n\nWindows method:\n1. Start regedit\n2. Navigate to HKLM\\Software\\Policies\\Google\\Chrome\\\n3. If the SafeBrowsingEnabled value name not exist or its value data is not set to 1, then this is a finding.",
"description": "Enables Google Chrome's Safe Browsing feature and prevents users from changing this setting. If you enable this setting, Safe Browsing is always active. If you disable this setting, Safe Browsing is never active. If you enable or disable this setting, users cannot change or override this setting in Google Chrome. If this policy is left not set, this will be enabled but the user will be able to change it.\n",
"fixid": "F-0038r1_fix",
"fixtext": "\nValid for Chrome Browser version 14 or later.\n\nWindows registry:\n Key Path: HKLM\\Software\\Policies\\Google\\Chrome\\\n Value Name: SafeBrowsingEnabled\n Value Type: Boolean (REG_DWORD)\n Value Data: 1\n \nWindows group policy:\n Policy Path: Computer Configuration\\Administrative Templates\\Google\\Google Chrome\\\n Policy Name: Enable Safe Browsing\n Policy State: Enabled\n Policy Value: N/A\n\t\t",
"iacontrols": null,
"id": "V-0038",
"ruleID": "SV-0038r1_rule",
"severity": "medium",
"title": "Safe Browsing must be enabled",
"version": "DTBC-0038"
},
"V-0039": {
"checkid": "C-0039r1_chk",
"checktext": "Universal method (Requires Chrome Browser v15 or later):\n 1. In the omnibox (address bar) type chrome://policy\n 2. If SavingBrowserHistoryDisabled is displayed under the Policy Name column and it is set to false under the Policy Value column, then this is not a finding.\n\nWindows:\n1. Start regedit\n2. Navigate to HKLM\\Software\\Policies\\Google\\Chrome\\\n3. If the SavingBrowserHistoryDisabled value name does not exist or its value data is not set to 0, then this is a finding.",
"description": "Disables saving browser history in Google Chrome and prevents users from changing this setting. If this setting is enabled, browsing history is not saved. If this setting is disabled or not set, browsing history is saved.\n",
"fixid": "F-0039r1_fix",
"fixtext": "\nValid for Chrome Browser version 8 or later.\n\nWindows registry:\n Key Path: HKLM\\Software\\Policies\\Google\\Chrome\\\n Value Name: SavingBrowserHistoryDisabled\n Value Type: Boolean (REG_DWORD)\n Value Data: 0\n \nWindows group policy:\n Policy Path: Computer Configuration\\Administrative Templates\\Google\\Google Chrome\\\n Policy Name: Disable saving browser history\n Policy State: Disabled\n Policy Value: N/A\n\t\t",
"iacontrols": null,
"id": "V-0039",
"ruleID": "SV-0039r1_rule",
"severity": "medium",
"title": "Browser history must be saved",
"version": "DTBC-0039"
},
"V-0040": {
"checkid": "C-0040r1_chk",
"checktext": "Universal method(Requires Chrome Browser v15 or later):\n 1. In the omnibox(address bar) type chrome://policy\n 2. If the policy \"DefaultPluginsSetting\" is shown and is set to \"Block all plugins\", this is not a finding.\n\nWindows:\nStart regedit\nNavigate to HKLM\\Software\\Policies\\Google\\Chrome\\DefaultPluginsSetting\nIf this key does not exist or is not set to 2 this is a finding.",
"description": "Allows you to set whether websites are allowed to automatically run plugins. Automatically running plugins can be either allowed for all websites or denied for all websites. If this policy is left not set, 'AllowPlugins' will be used and the user will be able to change it.\n 1 = Allow all sites to automatically run plugins\n 2 = Block all plugins\n",
"fixid": "F-0040r1_fix",
"fixtext": "\nValid for Chrome Browser version 10 or later.\n\nWindows Registry:\n Registry Path: HKLM\\Software\\Policies\\Google\\Chrome\\\n Registry Key: DefaultPluginsSetting\n Key Type: Integer (REG_DWORD)\n Set the value of the registry key to 2\n \nWindows group policy:\n Policy Path: Computer Configuration\\Administrative Templates\\Google\\Google Chrome\\Content Settings\\\n Policy Name: \"Default plugins setting\"\n Policy State: Enabled\n Policy Value: \"Block all plugins\"\n\t\t",
"iacontrols": null,
"id": "V-0040",
"ruleID": "SV-0040r1_rule",
"severity": "medium",
"title": "Default behavior must block plugin usage",
"version": "DTBC-0040"
},
"V-0041": {
"checkid": "C-0041r1_chk",
"checktext": "Universal method(Requires Chrome Browser v15 or later):\n 1. In the omnibox(address bar) type chrome://policy\n 2. If the policy \"JavaScriptBlockedForUrls\" is shown and is set to \"*\", this is not a finding.\n\nWindows:\nStart regedit\nNavigate to HKLM\\Software\\Policies\\Google\\Chrome\\JavaScriptBlockedForUrls\nIf this key does not exist or is not set to \"*\" this is a finding.",
"description": "Allows you to set a list of url patterns that specify sites which are not allowed to run JavaScript. If this policy is left not set the global default value will be used for all sites either from the 'DefaultJavaScriptSetting' policy if it is set, or the user's personal configuration otherwise.\n",
"fixid": "F-0041r1_fix",
"fixtext": "\nValid for Chrome Browser version 11 or later.\n\nWindows Registry:\n Registry Path: HKLM\\Software\\Policies\\Google\\Chrome\\\n Registry Key: JavaScriptBlockedForUrls\n Key Type: List of strings\n Set the value of the registry key to \"*\"\n \nWindows group policy:\n Policy Path: Computer Configuration\\Administrative Templates\\Google\\Google Chrome\\Content Settings\\\n Policy Name: \"Block JavaScript on these sites\"\n Policy State: Enabled\n Policy Value: \"*\"\n\nIf this setting is not feasible, the usage of the ScriptNo extension is recommend. This will give the users control at blocking JavaScript by default, and granting privileges to websites they need JavaScript for.\n\t\t",
"iacontrols": null,
"id": "V-0041",
"ruleID": "SV-0041r1_rule",
"severity": "medium",
"title": "JavaScript must be disabled by default",
"version": "DTBC-0041"
},
"V-0042": {
"checkid": "C-0042r1_chk",
"checktext": "Universal method(Requires Chrome Browser v15 or later):\n 1. In the omnibox(address bar) type chrome://policy\n 2. If the policy \"JavaScriptAllowedForUrls\" is shown and is set to \"[*.]gov\", \"[*.]mil\", \"[*.]google.com\", and \"[*.]microsoft.com\", this is not a finding.\n\nWindows:\nStart regedit\nNavigate to HKLM\\Software\\Policies\\Google\\Chrome\\JavaScriptAllowedForUrls\nIf this key does not exist or is not set to \"[*.]gov\", \"[*.]mil\", \"[*.]google.com\", and \"[*.]microsoft.com\" this is a finding.",
"description": "Allows you to set a list of url patterns that specify sites which are allowed to run JavaScript. If this policy is left not set the global default value will be used for all sites either from the 'DefaultJavaScriptSetting' policy if it is set, or the user's personal configuration otherwise.\n",
"fixid": "F-0042r1_fix",
"fixtext": "\nValid for Chrome Browser version 11 or later.\n\nWindows Registry:\n Registry Path: HKLM\\Software\\Policies\\Google\\Chrome\\\n Registry Key: JavaScriptAllowedForUrls\n Key Type: List of strings\n Set the value of the registry key to \"[*.]gov\", \"[*.]mil\", \"[*.]google.com\", and \"[*.]microsoft.com\"\n \nWindows group policy:\n Policy Path: Computer Configuration\\Administrative Templates\\Google\\Google Chrome\\Content Settings\\\n Policy Name: \"Allow JavaScript on these sites\"\n Policy State: Enabled\n Policy Value: \"[*.]gov\", \"[*.]mil\", \"[*.]google.com\", and \"[*.]microsoft.com\"\n\t\t",
"iacontrols": null,
"id": "V-0042",
"ruleID": "SV-0042r1_rule",
"severity": "medium",
"title": "JavaScript must be enabled for approved domains",
"version": "DTBC-0042"
},
"V-0043": {
"checkid": "C-0043r1_chk",
"checktext": "Universal method(Requires Chrome Browser v15 or later):\n 1. In the omnibox(address bar) type chrome://policy\n 2. If the policy \"PluginsBlockedForUrls\" is shown and is set to \"*\", this is not a finding.\n\nWindows:\nStart regedit\nNavigate to HKLM\\Software\\Policies\\Google\\Chrome\\PluginsBlockedForUrls\nIf this key does not exist or is not set to \"*\" this is a finding.",
"description": "Allows you to set a list of url patterns that specify sites which are not allowed to run plugins. If this policy is left not set the global default value will be used for all sites either from the 'DefaultPluginsSetting' policy if it is set, or the user's personal configuration otherwise.\n",
"fixid": "F-0043r1_fix",
"fixtext": "\nValid for Chrome Browser version 11 or later.\n\nWindows Registry:\n Registry Path: HKLM\\Software\\Policies\\Google\\Chrome\\\n Registry Key: PluginsBlockedForUrls\n Key Type: List of strings\n Set the value of the registry key to \"*\"\n \nWindows group policy:\n Policy Path: Computer Configuration\\Administrative Templates\\Google\\Google Chrome\\Content Settings\\\n Policy Name: \"Block plugins on these sites\"\n Policy State: Enabled\n Policy Value: \"*\"\n\t\t",
"iacontrols": null,
"id": "V-0043",
"ruleID": "SV-0043r1_rule",
"severity": "medium",
"title": "Plugin usage must be disabled by default",
"version": "DTBC-0043"
},
"V-0044": {
"checkid": "C-0044r1_chk",
"checktext": "Universal method(Requires Chrome Browser v15 or later):\n 1. In the omnibox(address bar) type chrome://policy\n 2. If the policy \"PluginsAllowedForUrls\" is shown and is set to \"[*.]gov\", \"[*.]mil\", and \"[*.]microsoft.com\", this is not a finding.\n\nWindows:\nStart regedit\nNavigate to HKLM\\Software\\Policies\\Google\\Chrome\\PluginsAllowedForUrls\nIf this key does not exist or is not set to \"[*.]gov\", \"[*.]mil\", and \"[*.]microsoft.com\" this is a finding.",
"description": "Allows you to set a list of url patterns that specify sites which are allowed to run plugins. If this policy is left not set the global default value will be used for all sites either from the 'DefaultPluginsSetting' policy if it is set, or the user's personal configuration otherwise.\n",
"fixid": "F-0044r1_fix",
"fixtext": "\nValid for Chrome Browser version 11 or later.\nWindows Registry:\n Registry Path: HKLM\\Software\\Policies\\Google\\Chrome\\\n Registry Key: PluginsAllowedForUrls\n Key Type: List of strings\n Set the value of the registry key to \"[*.]gov\", \"[*.]mil\", and \"[*.]microsoft.com\"\n \nWindows group policy:\n Policy Path: Computer Configuration\\Administrative Templates\\Google\\Google Chrome\\Content Settings\\\n Policy Name: \"Allow plugins on these sites\"\n Policy State: Enabled\n Policy Value: \"[*.]gov\", \"[*.]mil\", and \"[*.]microsoft.com\"\n\t\t",
"iacontrols": null,
"id": "V-0044",
"ruleID": "SV-0044r1_rule",
"severity": "medium",
"title": "Site that are approved to use approved plugins must be whitelisted",
"version": "DTBC-0044"
},
"V-0045": {
"checkid": "C-0045r1_chk",
"checktext": "Universal method(Requires Chrome Browser v15 or later):\n 1. In the omnibox(address bar) type chrome://policy\n 2. If the policy \"ProxyMode\" is shown and is set to \"system\", this is not a finding.\n\nWindows:\nStart regedit\nNavigate to HKLM\\Software\\Policies\\Google\\Chrome\\ProxyMode\nIf this key does not exist or is not set to \"system\" this is a finding.",
"description": "Allows you to set a list of url patterns that specify sites which are allowed to set session only cookies. If this policy is left not set the global default value will be used for all sites either from the 'DefaultCookiesSetting' policy if it is set, or the user's personal configuration otherwise. If the \"RestoreOnStartup\" policy is set to restore URLs from previous sessions this policy will not be respectred and cookies will be stored permanently for those sites.\n",
"fixid": "F-0045r1_fix",
"fixtext": "\nValid for Chrome Browser version 11 or later.\n\nWindows registry:\n Key Path: HKLM\\Software\\Policies\\Google\\Chrome\\\n Value Name: CookiesSessionOnlyForUrls\n Value Type: List of strings\n Value Data: null\n \nWindows group policy:\n Policy Path: Computer Configuration\\Administrative Templates\\Google\\Google Chrome\\\n Policy Name: Allow session only cookies on these sites\n Policy State: Disabled\n Policy Value: N/A\n\t\t",
"iacontrols": null,
"id": "V-0045",
"ruleID": "SV-0045r1_rule",
"severity": "medium",
"title": "Session only based cookies must be disabled",
"version": "DTBC-0045"
}
},
"profiles": {
"MAC-1_Classified": {
"description": "",
"findings": {
"V-0001": "true",
"V-0002": "true",
"V-0003": "true",
"V-0004": "true",
"V-0005": "true",
"V-0006": "true",
"V-0007": "true",
"V-0008": "true",
"V-0009": "true",
"V-0010": "true",
"V-0011": "true",
"V-0012": "true",
"V-0013": "true",
"V-0014": "true",
"V-0015": "true",
"V-0016": "true",
"V-0017": "true",
"V-0018": "true",
"V-0019": "true",
"V-0020": "true",
"V-0021": "true",
"V-0022": "true",
"V-0023": "true",
"V-0024": "true",
"V-0025": "true",
"V-0026": "true",
"V-0027": "true",
"V-0028": "true",
"V-0029": "true",
"V-0030": "true",
"V-0031": "true",
"V-0032": "true",
"V-0033": "true",
"V-0034": "true",
"V-0035": "true",
"V-0036": "true",
"V-0037": "true",
"V-0038": "true",
"V-0039": "true",
"V-0040": "true",
"V-0041": "true",
"V-0042": "true",
"V-0043": "true",
"V-0044": "true",
"V-0045": "true",
"V-0046": "true",
"V-0047": "true",
"V-0048": "true"
},
"id": "MAC-1_Classified",
"title": "I - Mission Critical Classified"
},
"MAC-1_Public": {
"description": "",
"findings": {
"V-0001": "true",
"V-0002": "true",
"V-0003": "true",
"V-0004": "true",
"V-0005": "true",
"V-0006": "true",
"V-0007": "true",
"V-0008": "true",
"V-0009": "true",
"V-0010": "true",
"V-0011": "true",
"V-0012": "true",
"V-0013": "true",
"V-0014": "true",
"V-0015": "true",
"V-0016": "true",
"V-0017": "true",
"V-0018": "true",
"V-0019": "true",
"V-0020": "true",
"V-0021": "true",
"V-0022": "true",
"V-0023": "true",
"V-0024": "true",
"V-0025": "true",
"V-0026": "true",
"V-0027": "true",
"V-0028": "true",
"V-0029": "true",
"V-0030": "true",
"V-0031": "true",
"V-0032": "true",
"V-0033": "true",
"V-0034": "true",
"V-0035": "true",
"V-0036": "true",
"V-0037": "true",
"V-0038": "true",
"V-0039": "true",
"V-0040": "true",
"V-0041": "true",
"V-0042": "true",
"V-0043": "true",
"V-0044": "true",
"V-0045": "true",
"V-0046": "true",
"V-0047": "true",
"V-0048": "true"
},
"id": "MAC-1_Public",
"title": "I - Mission Critical Public"
},
"MAC-1_Sensitive": {
"description": "",
"findings": {
"V-0001": "true",
"V-0002": "true",
"V-0003": "true",
"V-0004": "true",
"V-0005": "true",
"V-0006": "true",
"V-0007": "true",
"V-0008": "true",
"V-0009": "true",
"V-0010": "true",
"V-0011": "true",
"V-0012": "true",
"V-0013": "true",
"V-0014": "true",
"V-0015": "true",
"V-0016": "true",
"V-0017": "true",
"V-0018": "true",
"V-0019": "true",
"V-0020": "true",
"V-0021": "true",
"V-0022": "true",
"V-0023": "true",
"V-0024": "true",
"V-0025": "true",
"V-0026": "true",
"V-0027": "true",
"V-0028": "true",
"V-0029": "true",
"V-0030": "true",
"V-0031": "true",
"V-0032": "true",
"V-0033": "true",
"V-0034": "true",
"V-0035": "true",
"V-0036": "true",
"V-0037": "true",
"V-0038": "true",
"V-0039": "true",
"V-0040": "true",
"V-0041": "true",
"V-0042": "true",
"V-0043": "true",
"V-0044": "true",
"V-0045": "true",
"V-0046": "true",
"V-0047": "true",
"V-0048": "true"
},
"id": "MAC-1_Sensitive",
"title": "I - Mission Critical Sensitive"
},
"MAC-2_Classified": {
"description": "",
"findings": {
"V-0001": "true",
"V-0002": "true",
"V-0003": "true",
"V-0004": "true",
"V-0005": "true",
"V-0006": "true",
"V-0007": "true",
"V-0008": "true",
"V-0009": "true",
"V-0010": "true",
"V-0011": "true",
"V-0012": "true",
"V-0013": "true",
"V-0014": "true",
"V-0015": "true",
"V-0016": "true",
"V-0017": "true",
"V-0018": "true",
"V-0019": "true",
"V-0020": "true",
"V-0021": "true",
"V-0022": "true",
"V-0023": "true",
"V-0024": "true",
"V-0025": "true",
"V-0026": "true",
"V-0027": "true",
"V-0028": "true",
"V-0029": "true",
"V-0030": "true",
"V-0031": "true",
"V-0032": "true",
"V-0033": "true",
"V-0034": "true",
"V-0035": "true",
"V-0036": "true",
"V-0037": "true",
"V-0038": "true",
"V-0039": "true",
"V-0040": "true",
"V-0041": "true",
"V-0042": "true",
"V-0043": "true",
"V-0044": "true",
"V-0045": "true",
"V-0046": "true",
"V-0047": "true",
"V-0048": "true"
},
"id": "MAC-2_Classified",
"title": "II - Mission Support Classified"
},
"MAC-2_Public": {
"description": "",
"findings": {
"V-0001": "true",
"V-0002": "true",
"V-0003": "true",
"V-0004": "true",
"V-0005": "true",
"V-0006": "true",
"V-0007": "true",
"V-0008": "true",
"V-0009": "true",
"V-0010": "true",
"V-0011": "true",
"V-0012": "true",
"V-0013": "true",
"V-0014": "true",
"V-0015": "true",
"V-0016": "true",
"V-0017": "true",
"V-0018": "true",
"V-0019": "true",
"V-0020": "true",
"V-0021": "true",
"V-0022": "true",
"V-0023": "true",
"V-0024": "true",
"V-0025": "true",
"V-0026": "true",
"V-0027": "true",
"V-0028": "true",
"V-0029": "true",
"V-0030": "true",
"V-0031": "true",
"V-0032": "true",
"V-0033": "true",
"V-0034": "true",
"V-0035": "true",
"V-0036": "true",
"V-0037": "true",
"V-0038": "true",
"V-0039": "true",
"V-0040": "true",
"V-0041": "true",
"V-0042": "true",
"V-0043": "true",
"V-0044": "true",
"V-0045": "true",
"V-0046": "true",
"V-0047": "true",
"V-0048": "true"
},
"id": "MAC-2_Public",
"title": "II - Mission Support Public"
},
"MAC-2_Sensitive": {
"description": "",
"findings": {
"V-0001": "true",
"V-0002": "true",
"V-0003": "true",
"V-0004": "true",
"V-0005": "true",
"V-0006": "true",
"V-0007": "true",
"V-0008": "true",
"V-0009": "true",
"V-0010": "true",
"V-0011": "true",
"V-0012": "true",
"V-0013": "true",
"V-0014": "true",
"V-0015": "true",
"V-0016": "true",
"V-0017": "true",
"V-0018": "true",
"V-0019": "true",
"V-0020": "true",
"V-0021": "true",
"V-0022": "true",
"V-0023": "true",
"V-0024": "true",
"V-0025": "true",
"V-0026": "true",
"V-0027": "true",
"V-0028": "true",
"V-0029": "true",
"V-0030": "true",
"V-0031": "true",
"V-0032": "true",
"V-0033": "true",
"V-0034": "true",
"V-0035": "true",
"V-0036": "true",
"V-0037": "true",
"V-0038": "true",
"V-0039": "true",
"V-0040": "true",
"V-0041": "true",
"V-0042": "true",
"V-0043": "true",
"V-0044": "true",
"V-0045": "true",
"V-0046": "true",
"V-0047": "true",
"V-0048": "true"
},
"id": "MAC-2_Sensitive",
"title": "II - Mission Support Sensitive"
},
"MAC-3_Classified": {
"description": "",
"findings": {
"V-0001": "true",
"V-0002": "true",
"V-0003": "true",
"V-0004": "true",
"V-0005": "true",
"V-0006": "true",
"V-0007": "true",
"V-0008": "true",
"V-0009": "true",
"V-0010": "true",
"V-0011": "true",
"V-0012": "true",
"V-0013": "true",
"V-0014": "true",
"V-0015": "true",
"V-0016": "true",
"V-0017": "true",
"V-0018": "true",
"V-0019": "true",
"V-0020": "true",
"V-0021": "true",
"V-0022": "true",
"V-0023": "true",
"V-0024": "true",
"V-0025": "true",
"V-0026": "true",
"V-0027": "true",
"V-0028": "true",
"V-0029": "true",
"V-0030": "true",
"V-0031": "true",
"V-0032": "true",
"V-0033": "true",
"V-0034": "true",
"V-0035": "true",
"V-0036": "true",
"V-0037": "true",
"V-0038": "true",
"V-0039": "true",
"V-0040": "true",
"V-0041": "true",
"V-0042": "true",
"V-0043": "true",
"V-0044": "true",
"V-0045": "true",
"V-0046": "true",
"V-0047": "true",
"V-0048": "true"
},
"id": "MAC-3_Classified",
"title": "III - Administrative Classified"
},
"MAC-3_Public": {
"description": "",
"findings": {
"V-0001": "true",
"V-0002": "true",
"V-0003": "true",
"V-0004": "true",
"V-0005": "true",
"V-0006": "true",
"V-0007": "true",
"V-0008": "true",
"V-0009": "true",
"V-0010": "true",
"V-0011": "true",
"V-0012": "true",
"V-0013": "true",
"V-0014": "true",
"V-0015": "true",
"V-0016": "true",
"V-0017": "true",
"V-0018": "true",
"V-0019": "true",
"V-0020": "true",
"V-0021": "true",
"V-0022": "true",
"V-0023": "true",
"V-0024": "true",
"V-0025": "true",
"V-0026": "true",
"V-0027": "true",
"V-0028": "true",
"V-0029": "true",
"V-0030": "true",
"V-0031": "true",
"V-0032": "true",
"V-0033": "true",
"V-0034": "true",
"V-0035": "true",
"V-0036": "true",
"V-0037": "true",
"V-0038": "true",
"V-0039": "true",
"V-0040": "true",
"V-0041": "true",
"V-0042": "true",
"V-0043": "true",
"V-0044": "true",
"V-0045": "true",
"V-0046": "true",
"V-0047": "true",
"V-0048": "true"
},
"id": "MAC-3_Public",
"title": "III - Administrative Public"
},
"MAC-3_Sensitive": {
"description": "",
"findings": {
"V-0001": "true",
"V-0002": "true",
"V-0003": "true",
"V-0004": "true",
"V-0005": "true",
"V-0006": "true",
"V-0007": "true",
"V-0008": "true",
"V-0009": "true",
"V-0010": "true",
"V-0011": "true",
"V-0012": "true",
"V-0013": "true",
"V-0014": "true",
"V-0015": "true",
"V-0016": "true",
"V-0017": "true",
"V-0018": "true",
"V-0019": "true",
"V-0020": "true",
"V-0021": "true",
"V-0022": "true",
"V-0023": "true",
"V-0024": "true",
"V-0025": "true",
"V-0026": "true",
"V-0027": "true",
"V-0028": "true",
"V-0029": "true",
"V-0030": "true",
"V-0031": "true",
"V-0032": "true",
"V-0033": "true",
"V-0034": "true",
"V-0035": "true",
"V-0036": "true",
"V-0037": "true",
"V-0038": "true",
"V-0039": "true",
"V-0040": "true",
"V-0041": "true",
"V-0042": "true",
"V-0043": "true",
"V-0044": "true",
"V-0045": "true",
"V-0046": "true",
"V-0047": "true",
"V-0048": "true"
},
"id": "MAC-3_Sensitive",
"title": "III - Administrative Sensitive"
}
},
"slug": "google_chrome_draft",
"title": "Google Chrome STIG Draft",
"version": "1"
}
}