In today's security landscape, protecting your organization from vulnerabilities like Spectre and Meltdown is crucial. One effective measure is enabling Strict Site Isolation in Google Chrome. This article dives into how to enforce the SitePerProcess
flag, achieving robust site isolation using configuration profiles, specifically within environments managed by tools like Jamf Pro.
Strict Site Isolation is a security feature in Chrome that ensures websites from different origins are always put into different processes. This mitigates the risk of cross-site data leaks and enhances overall security. While Chrome offers flags to enable features, relying on these directly isn't the recommended approach for enterprise environments.
Instead of using chrome://flags
to "force" enable features, deploying a configuration profile offers a more reliable and manageable solution. As zachary_fisher pointed out in a Jamf Nation discussion, chrome://flags
and chrome://policy
represent different settings. Configuration profiles ensure the policy is consistently applied across your managed devices.
Here's how to create a configuration profile to enforce the SitePerProcess
flag:
com.google.Chrome.plist
) with the following content:<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
<plist version="1.0">
<dict>
<key>SitePerProcess</key>
<true/>
</dict>
</plist>
Upload to Jamf Pro: In your Jamf Pro console:
com.google.Chrome.plist
file.Verify the Policy: After deploying the configuration profile, verify its successful application by navigating to chrome://policy
in Chrome on a managed device. The SitePerProcess
policy should be listed as enabled.
Several users in the Jamf Nation forum encountered challenges initially:
Google provides a dedicated test site to confirm if Strict Site Isolation is working correctly:
Enforcing Strict Site Isolation is a proactive security measure that significantly reduces the attack surface of your Chrome deployments. By utilizing configuration profiles through systems like Jamf Pro, organizations can ensure consistent and reliable application of this critical security policy. Securing your Apple environment with Jamf's endpoint protection capabilities is essential in today's threat landscape. Consider exploring Jamf's other security solutions to create a comprehensive security posture.