Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Enable CSP strict mode by default #39173

Closed
epixa opened this issue Jun 18, 2019 · 1 comment · Fixed by #41700
Closed

Enable CSP strict mode by default #39173

epixa opened this issue Jun 18, 2019 · 1 comment · Fixed by #41700
Labels
enhancement New value added to drive a business result Feature:Security/CSP Platform Security - Content Security Policy release_note:breaking Team:Security Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more! v8.0.0

Comments

@epixa
Copy link
Contributor

epixa commented Jun 18, 2019

CSP strict mode blocks access to Kibana for any legacy browser that doesn't support rudimentary content security policy protections. This ensures that a Kibana install is not put at risk by unintentionally supporting outdated and insecure browsers.

Prior to 8.0, csp.strict is disabled by default. From 8.0 onward, csp.strict should be enabled by default to provide the maximum amount of protection for most installs. Admins that wish to support outdated and insecure browsers (e.g. IE11) can explicitly disable CSP strict mode with csp.strict: false in kibana.yml.

We should check this value in our telemetry as well so we have a better understanding of how common it is for people to disable strict mode to support things like IE11.

@epixa epixa added release_note:breaking Team:Security Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more! enhancement New value added to drive a business result v8.0.0 Feature:Security/CSP Platform Security - Content Security Policy labels Jun 18, 2019
@elasticmachine
Copy link
Contributor

Pinging @elastic/kibana-security

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New value added to drive a business result Feature:Security/CSP Platform Security - Content Security Policy release_note:breaking Team:Security Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more! v8.0.0
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants