-
Notifications
You must be signed in to change notification settings - Fork 20
Memo for developing a content security policy #336
Comments
Lifted from the 18F front end guide regarding CSPs:
We should implement this, at least in the front end application. It is a relatively straightforward task and should be quick. Essentially, we want to tell the browser which URLs it is OK to load content on the Crime Data Explorer from. Currently, we get almost all of the assets and data from the same host as the application (crime-data-explorer.fr.cloud.gov) which is easy to restrict. There are a few resources that come from different URLs, all of which we can add to our whitelist:
I am unsure if the downloads from S3 will continue to work with a CSP, but if not, we can also add that host to our whitelist. The API application doesn't have any HTML that is returned but we should still use a CSP to restrict the content a browser might load at the URL. I can open the relevant issues for these two tasks in the respective repos. |
thanks @jeremiak |
Both of the technical fixes have been done and merged but they still need to be released. @LarryBafundo maybe we can push for a release at the end of this sprint and have Cindy review everything? We can always push it out earlier than the end of the sprint if desired. Was there any feedback from Mike about how this might affect the ATO timeline? |
sounds good, let's aim for the end of this sprint |
Mike asked us to develop a memo (bullet points are fine) that explain what a content security policy is (CSP), why its important, and high-level recommendations for developing one.
I'm not sure what the timeline is, but he said it would help inform their ATO process.
@jeremiak let me know if we need more specifics, or if you would like to reach out to Mike directly.
The text was updated successfully, but these errors were encountered: