Default restrictive Content Security Policy for non-app requests #51323
Labels
Feature:Hardening
Harding of Kibana from a security perspective
Feature:Security/CSP
Platform Security - Content Security Policy
Team:Security
Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more!
Requests to load the client-side of Kibana will still be served with the content security policy defined with csp.rules, but other responses sent from Kibana server could include a content security policy that is especially restrictive.
For most static files this isn't necessary, but it also isn't harmful. For certain static files, like svgs, this policy will help protect against dynamic scripting when loading them directly in the browser.
Originally started #47375.
As noted in #47375, we should start by introducing a CSP of
PR should also include functional (end-to-end) tests verifying this behavior.
This comment notes the following:
I do not believe that SIEM uses graphql anymore, so this is likely something that we don't have to worry about.
The text was updated successfully, but these errors were encountered: