9.4: Restrict Unnecessary or Unauthorized Browser and Email Client Extensions
Restrict, either through uninstalling or disabling, any unauthorized or unnecessary browser or email client plugins, extensions, and add-on applications.
Asset Type |
Security Function |
Implementation Groups |
---|---|---|
Applications |
Protect |
2, 3 |
Dependencies
Safeguard 1.1: Establish and Maintain Detailed Enterprise Asset Inventory
Safeguard 2.1: Establish and Maintain a Software Inventory
Inputs
GV1
: Enterprise asset inventoryGV5
: Aurhorized software inventory
Operations
Use
GV1
to identify and enumerate assets subject to browser/email plugin restrictions (M1)Use
GV5
to identify authorized browser and email plugins- For each asset listed in Operation 1, collect the list of installed browser plugins and compare to the output of Operation 2
Identify and enumerate assets with only authorized browser plugins installed or enabled (M2)
Identify and enumerate assets with one or more unauthorized browser plugins installed or enabled (M3)
- For each asset listed in Operation 1, collect the list of installed email plugins and compare to the output of Operation 2
Identify and enumerate assets with only authorized email plugins installed or enabled (M4)
Identify and enumerate assets with one or more unauthorized browser plugins installed or enabled (M5)
Measures
M1 = Count of assets subject to browser/email plugin restrictions
M2 = Count of assets with only authorized browser plugins installed or enabled
M3 = Count of assets with unauthorized browser plugins installed or enabled
M4 = Count of assets with only authorized email plugins installed or enabled
M5 = Count of assets with unauthorized email plugins installed or enabled
Metrics
Browser Plugin Enforcement Quality
Metric |
The percentage of assets compliant with authorized browser plugins.
|
Calculation |
|
Email Client Plugin Enforcement Quality
Metric |
The percentage of assets compliant with authorized email plugins.
|
Calculation |
|