Back

Configure Internet Browser security options according to organizational standards.


CONTROL ID
02166
CONTROL TYPE
Configuration
CLASSIFICATION
Preventive

SUPPORTING AND SUPPORTED CONTROLS




This Control directly supports the implied Control(s):
  • Establish, implement, and maintain system hardening procedures., CC ID: 12001

This Control has the following implementation support Control(s):
  • Configure the "Internet Explorer Maintenance Policy Processing - Allow processing across a slow network connection" setting., CC ID: 04910
  • Configure the "Disable Internet Connection wizard" setting., CC ID: 02242
  • Configure the "Disable Automatic Install of Internet Explorer components" setting., CC ID: 04337
  • Configure the "Disable Periodic Check for Internet Explorer software updates" setting., CC ID: 04338
  • Configure the "Do not allow users to enable or disable add-ons" setting in Internet Explorer properly., CC ID: 04340
  • Configure the "Turn off Crash Detection" setting in Internet Explorer properly., CC ID: 04345
  • Configure the "internet explorer processes (mk protocol)" setting., CC ID: 04347
  • Configure the "internet explorer processes (consistent MIME handling)" setting., CC ID: 04348
  • Configure the "internet explorer processes (MIME sniffing)" setting., CC ID: 04349
  • Configure the "Internet Explorer Processes (Restrict ActiveX Install)" setting., CC ID: 04352
  • Configure the "internet explorer processes (restrict file download)" setting., CC ID: 04353
  • Configure the "Deny all add-ons unless specifically allowed in the Add-on List" setting., CC ID: 04354
  • Configure the "Disable Save this program to disk option" setting in limited functionality environments properly., CC ID: 04366
  • Configure the "Disable the Advanced Page" setting in limited functionality environments., CC ID: 04367
  • Configure the "Disable the Security Page" setting in limited functionality environments properly., CC ID: 04368
  • Configure the "Disable adding channels" setting in Internet Explorer properly., CC ID: 04369
  • Configure the "Disable adding schedules for offline pages" setting., CC ID: 04370
  • Configure the "Disable all scheduled offline pages" setting., CC ID: 04371
  • Configure the "Disable channel user interface completely" setting., CC ID: 04372
  • Configure the "Disable downloading of site subscription content" setting., CC ID: 04373
  • Configure the "Disable editing and creating of schedule groups" setting., CC ID: 04374
  • Configure the "Disable editing schedules for offline pages" setting., CC ID: 04375
  • Configure the "Disable offline page hit logging" setting., CC ID: 04376
  • Configure the "Disable removing channels" setting., CC ID: 04377
  • Configure the "Disable removing schedules for offline pages" setting., CC ID: 04378
  • Configure the "Disable 'Configuring History'" setting in specialized security environments properly., CC ID: 04405
  • Configure the "Disable AutoComplete for forms" setting in limited functionality environments properly., CC ID: 04406
  • Configure the "Prevent 'fix settings' functionality" setting in limited functionality environments properly., CC ID: 04407
  • Configure the "Prevent deletion of 'Temporary Internet Files and Cookies'" setting in limited functionality environments properly., CC ID: 04408
  • Configure the "Turn Off 'Delete Browsing History' Functionality" setting in limited functionality environments properly., CC ID: 04409
  • Configure the "Turn off the Security Settings Check feature" setting in limited functionality environments properly., CC ID: 04410
  • Configure the "Prevent ignoring certificate errors" setting in limited functionality environments properly., CC ID: 04411
  • Configure the "allow install on demand (Internet Explorer)" setting in limited functionality environments properly., CC ID: 04412
  • Configure the "Check for server certificate revocation" setting in limited functionality environments properly., CC ID: 04413
  • Configure the "Access data sources across domains" setting., CC ID: 04415
  • Configure the "Allow active scripting" setting in limited functionality environments properly., CC ID: 04416
  • Configure the "Allow binary and script behaviors" setting in limited functionality environments properly., CC ID: 04417
  • Configure the "Allow cut, copy, or paste operations from the clipboard via script" setting., CC ID: 04418
  • Configure the "Allow drag and drop or copy and paste files" setting., CC ID: 04419
  • Configure the "Allow file downloads" setting in limited functionality environments properly., CC ID: 04420
  • Configure the "Allow font downloads" setting in limited functionality environments properly., CC ID: 04421
  • Configure the "Allow installation of desktop items" setting in limited functionality environments properly., CC ID: 04422
  • Configure the "Allow META REFRESH" setting in limited functionality environments properly., CC ID: 04423
  • Configure the "Allow script-initiated windows without size or position constraints" setting in limited functionality environments properly., CC ID: 04424
  • Configure the "Allow status bar updates via script" setting in limited functionality environments properly., CC ID: 04425
  • Configure the "Automatic prompting for file downloads" setting in limited functionality environments properly., CC ID: 04426
  • Configure the "Download signed ActiveX controls" setting in limited functionality environments properly., CC ID: 04427
  • Configure the "Download unsigned ActiveX controls" setting in limited functionality environments properly., CC ID: 04428
  • Configure the "Initialize and script ActiveX controls not marked as safe" setting in limited functionality environments properly., CC ID: 04429
  • Configure the "Java permissions" setting in limited functionality environments properly., CC ID: 04430
  • Configure the "Launching applications and files in an IFRAME" setting in limited functionality environments properly., CC ID: 04431
  • Configure the "Logon Options" setting in limited functionality environments., CC ID: 04432
  • Configure the "Navigate sub-frames across different domains" setting in limited functionality environments properly., CC ID: 04433
  • Configure the "Open file based on content, not on file extension" setting in limited functionality environments properly., CC ID: 04434
  • Configure the "Run.NET Framework-reliant components not signed with Authenticode" setting in limited functionality environments properly., CC ID: 04435
  • Configure the "Run.NET Framework-reliant components signed with Authenticode" setting in limited functionality environments properly., CC ID: 04436
  • Configure the "Run ActiveX controls and plugins" setting in limited functionality environments properly., CC ID: 04437
  • Configure the "Script ActiveX controls marked safe for scripting" setting in limited functionality environments properly., CC ID: 04438
  • Configure the "Scripting of Java applets" setting in limited functionality environments properly., CC ID: 04439
  • Configure the "Software channel permissions" setting in limited functionality environments properly., CC ID: 04440
  • Configure the "Use Pop-up Blocker" setting in limited functionality environments properly., CC ID: 04441
  • Configure the "Web sites in less privileged Web content zones could navigate into this zone" setting in limited functionality environments properly., CC ID: 04442
  • Configure the .NET Framework to prevent unauthorized mobile code from executing., CC ID: 04531
  • Configure the "Turn off changing the URL to be displayed for checking updates to Internet Explorer and Internet Tools" setting., CC ID: 04644
  • Configure the "Prevent performance of first run customize settings" setting., CC ID: 04645
  • Configure the "Allow Scriptlets" setting in limited functionality environments properly., CC ID: 02237
  • Configure the "Disable showing the splash screen" setting., CC ID: 02238
  • Configure the "Add-on List" setting., CC ID: 02239
  • Configure the "Loose XAML" setting in limited functionality environments properly., CC ID: 02240
  • Configure the "Disable the Privacy page" setting., CC ID: 02241
  • Configure the "XPS documents" setting in limited functionality environments properly., CC ID: 02243
  • Configure the "Turn off Managing Phishing filter" setting., CC ID: 02244
  • Configure the "Turn on Protected Mode" setting in limited functionality environments properly., CC ID: 02245
  • Configure the "Userdata persistence" setting in limited functionality environments properly., CC ID: 02246
  • Configure the "Display mixed content" setting in limited functionality environments properly., CC ID: 02247
  • Configure the "Check for signature on download programs" setting., CC ID: 02250
  • Configure the "Turn on the Internet Connection Wizard Auto Detect" setting., CC ID: 02252
  • Configure the "Web Browser Applications" setting for the Restricted Sites Zone properly., CC ID: 02254
  • Configure the "Turn off page transitions" setting., CC ID: 02255
  • Configure the "Turn off configuring the update check interval (in days)" setting., CC ID: 02257
  • Configure the "Web Browser Applications" setting for the Internet Zone properly., CC ID: 02259
  • Configure the "Turn Off First-Run Opt-In" setting in limited functionality environments properly., CC ID: 02261
  • Configure the "Do not allow resetting Internet Explorer settings" setting., CC ID: 02262
  • Configure the "Enable third-party browser extensions" setting., CC ID: 02263
  • Configure the "Disable the reset Web settings feature" setting., CC ID: 02264
  • Configure the "Disable external branding of Internet Explorer" setting., CC ID: 02266
  • Configure the "Enable Native XMLHttp Support" setting., CC ID: 02267
  • Configure the "Site to Zone Assignment List" to organizational standards., CC ID: 08650
  • Configure the "Notification bar" setting to organizational standards., CC ID: 10008


SELECTED AUTHORITY DOCUMENTS COMPLIED WITH




  • Web browsers are configured to block or disable support for Flash content. (Security Control: 1484; Revision: 1, Australian Government Information Security Manual, March 2021)
  • Web browsers are configured to block web advertisements. (Security Control: 1485; Revision: 0, Australian Government Information Security Manual, March 2021)
  • Web browsers are configured to block Java from the internet. (Security Control: 1486; Revision: 0, Australian Government Information Security Manual, March 2021)
  • Internet Explorer 11 does not process content from the internet. (Control: ISM-1666; Revision: 0, Australian Government Information Security Manual, June 2023)
  • Web browsers do not process Java from the internet. (Control: ISM-1486; Revision: 1, Australian Government Information Security Manual, June 2023)
  • Web browsers do not process web advertisements from the internet. (Control: ISM-1485; Revision: 1, Australian Government Information Security Manual, June 2023)
  • Internet Explorer 11 does not process content from the internet. (Control: ISM-1666; Revision: 0, Australian Government Information Security Manual, September 2023)
  • Web browsers do not process Java from the internet. (Control: ISM-1486; Revision: 1, Australian Government Information Security Manual, September 2023)
  • Web browsers do not process web advertisements from the internet. (Control: ISM-1485; Revision: 1, Australian Government Information Security Manual, September 2023)
  • The organization should consider blocking cookies and client-side active content (Java and ActiveX). If cookies are allowed, the organization should limit the life of the cookies to the current session. Files downloaded from external websites should be blocked from running automatically. (§ 3.5.41 thru § 3.5.43, Australian Government ICT Security Manual (ACSI 33))
  • The following preferences should be set for Safari: Auto Fill options should be disabled, cookies should be disabled and existing cookies removed, and private browsing should be enabled. When the user has finished viewing web pages and is not online, the cache should be emptied. (Pg 114, Mac OS X Security Configuration for version 10.4 or later, second edition, Second Edition)
  • The unauthorized disclosure of information about system configuration (that could be useful to hackers) should be prevented by preventing source code of server-side executables and scripts from being viewed by a web browser. (CF.04.02.05c, The Standard of Good Practice for Information Security)
  • Web application sessions should be protected against being hijacked or cloned by configuring the security parameters in 'cookies' used to hold session information. (CF.04.02.06b, The Standard of Good Practice for Information Security)
  • Mobile devices that require access to the Internet (typically using web browser software) should route web browser traffic via a web proxy server. (CF.14.03.06b, The Standard of Good Practice for Information Security)
  • Mobile web browser software should be configured to limit the caching of information. (CF.14.03.07b, The Standard of Good Practice for Information Security)
  • Mobile web browser software should be configured to restrict pop-up windows. (CF.14.03.07c, The Standard of Good Practice for Information Security)
  • Mobile web browser software should be configured to enable the web browsers privacy mode (or equivalent) to stop the browser storing authentication information, such as passwords or tracking information. (CF.14.03.07d, The Standard of Good Practice for Information Security)
  • The unauthorized disclosure of information about system configuration (that could be useful to hackers) should be prevented by preventing source code of server-side executables and scripts from being viewed by a web browser. (CF.04.02.05c, The Standard of Good Practice for Information Security, 2013)
  • Web application sessions should be protected against being hijacked or cloned by configuring the security parameters in 'cookies' used to hold session information. (CF.04.02.06b, The Standard of Good Practice for Information Security, 2013)
  • Mobile devices that require access to the Internet (typically using web browser software) should route web browser traffic via a web proxy server. (CF.14.03.06b, The Standard of Good Practice for Information Security, 2013)
  • Mobile web browser software should be configured to limit the caching of information. (CF.14.03.07b, The Standard of Good Practice for Information Security, 2013)
  • Mobile web browser software should be configured to restrict pop-up windows. (CF.14.03.07c, The Standard of Good Practice for Information Security, 2013)
  • Mobile web browser software should be configured to enable the web browsers privacy mode (or equivalent) to stop the browser storing authentication information, such as passwords or tracking information. (CF.14.03.07d, The Standard of Good Practice for Information Security, 2013)
  • The organization must prohibit persistent cookies, unless prior approval has been obtained in writing from the CMS SSG. (CSR 10.6.3, Pub 100-17 Medicare Business Partners Systems Security, Transmittal 7, Appendix A: CMS Core Security Requirements CSR, March 17, 2006)
  • These requirements are for all Internet browsers. The system administrator should ensure the browser is capable of 128-bit encryption, the software update feature is not enabled, JavaScript and Java are disabled, the home page should be the local site home page or a blank page, it is a supported ver… (§ 4.6, Defense Information Systems Agency UNIX Security Technical Implementation Guide Version 5 Release 1, Version 5, Release 1)
  • Web browsers must be configured in accordance with the Desktop Application STIG. Cookies must be disabled or accepted only from the originating web site. Unsigned ActiveX, Windows Scripting Host, and Shell Scripts must not be allowed to be executed, unless they are from a trusted source and are sign… (§ 5.3, App D, DISA Secure Remote Computing Security Technical Implementation Guide, Version 1 Release 2)
  • Broadband or high-speed connections used for Remote Access, Mobile Access and Telework, introduces a greater risk of an attack compared to dial-up connections since users are connected for much longer periods and these connections often use static IP addresses provided by Internet Service Providers … (§ 2.3, DISA Secure Remote Computing Security Technical Implementation Guide, Version 2, Release 1)
  • Computer-wide, rather than per-user, assignment of sites to zones for Internet Explorer should be enabled or disabled as appropriate. Technical Mechanisms: GPO Setting: Computer Configuration\Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Site to … (CCE-4763-9, Common Configuration Enumeration List, Combined XML: Internet Explorer 7, 5.20130214)
  • The "Site to Zone Assignment List" machine setting should be configured correctly. Technical Mechanisms: Computer Configuration\Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Site to Zone Assignment List HKEY_LOCAL_MACHINE\Software\Policies\Micros… (CCE-15815-4, Common Configuration Enumeration List, Combined XML: Microsoft Internet Explorer 8, 5.20130214)
  • If the RP is using a front-channel presentation mechanism, as defined in Section 7.2 (e.g., the OpenID Connect Implicit Client profile or the SAML Web SSO profile), it SHALL require FAL2 or greater in order to protect the information in the assertion from disclosure to the browser or other parties i… (4 ¶ 6, Digital Identity Guidelines: Federation and Assertions, NIST SP 800-63C)
  • Computer-wide, rather than per-user, assignment of sites to zones for Internet Explorer should be enabled or disabled as appropriate. (oval:gov.nist.fdcc.ie7:def:9998, FDCC Windows IE7 SCAP content using OVAL (fdcc-ie7-oval.xml, fdcc-ie7-patches.xml), Version 5.4)
  • Site to Zone Assignment List (site_to_zone_assignment_list_local_computer, NIST SCAP Microsoft Internet Explorer Version 7 (fdcc-ie7-xccdf.xml), FDCC IE7 (1.2) SCAP Content - OVAL 5.4)