In today's digital landscape, security is paramount. One crucial aspect of web browser security is site isolation, which prevents malicious websites from accessing data from other sites. Google Chrome offers a feature called "Strict Site Isolation," also known as "SitePerProcess," to enhance security. This article delves into how to enable this feature using configuration profiles, specifically within a managed environment like Jamf Pro.
Site isolation is a security mechanism that isolates websites into separate processes. This prevents a compromised website from accessing sensitive data from other websites open in the same browser session. The "SitePerProcess" flag in Chrome enforces this strict isolation.
Enabling SitePerProcess can be tricky. While Chrome offers a chrome://flags
interface to "force" enable features, relying on this method for enterprise deployments is not recommended. These flags are primarily for experimental features and may change or disappear without notice.
The recommended approach for enabling Strict Site Isolation in a managed environment is through configuration profiles. These profiles allow administrators to enforce settings consistently across multiple devices.
Here's how to do it:
.plist
) file containing the necessary configuration for the SitePerProcess
flag.Example Plist Content:
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
<plist version="1.0">
<dict>
<key>SitePerProcess</key>
<true/>
</dict>
</plist>
This .plist
file sets the SitePerProcess
key to true
, enabling Strict Site Isolation.
After deploying the configuration profile, it's essential to verify that the SitePerProcess
policy is enabled. Do not rely on chrome://flags
for verification, as it might not accurately reflect the managed policy state.
Instead, use chrome://policy
to confirm the policy's status. This page displays all active Chrome policies, including those enforced through configuration profiles.
Additionally, Google provides a test website to verify if Strict Site Isolation is working correctly: https://support.google.com/chrome/a/answer/7581529.
SitePerProcess
policy.By leveraging configuration profiles, administrators can effectively enable Strict Site Isolation in Google Chrome, enhancing the security posture of their managed environments. Remember to verify the policy status using chrome://policy
and explore Google's test site to ensure the feature is functioning as expected. This approach provides a robust and manageable solution for protecting against potential security threats.