2 min read

Strengthening Chrome: Why CIS Benchmarks Matter

Strengthening Chrome: Why CIS Benchmarks Matter

The Critical Role of Configuration in Browser Security

In the latest installment of our webinar series, Chris Loehr from Solis Security continued his deep dive into the CIS Benchmarks for hardening Google Chrome. While many organizations focus on securing their networks and endpoints, browser security often remains an afterthought. Yet, as Chris emphasized, the way your browser is configured can be the difference between a secure environment and a vulnerable one.

Understanding DNS Over HTTPS

One of the key topics discussed was the importance of DNS over HTTPS. This setting ensures that your browser’s DNS queries are encrypted, preventing potential attackers from intercepting and manipulating your web traffic. Chris highlighted that while this setting is crucial for security, it might cause compatibility issues with older systems or legacy applications that don’t support this protocol. However, the trade-off is well worth it, as it provides a significant layer of protection against DNS-based attacks.

The Hidden Risks of Autofill

Another critical setting covered was the disabling of autofill for addresses and passwords. Chris explained that while autofill is convenient, it poses significant privacy risks. Attackers who gain access to a browser can easily harvest stored information, such as addresses or passwords, using it to further compromise your systems. Disabling autofill is a simple yet effective way to reduce this risk and ensure that sensitive information isn’t inadvertently exposed.

Balancing Security and Usability

Chris also discussed the delicate balance between security and usability. He acknowledged that while some security measures might be seen as disruptive, especially in environments where convenience is prioritized, it’s essential to weigh these disruptions against the potential risks. In regulated industries like banking, where Chris has extensive experience, the cost of a breach far outweighs the inconvenience of a few extra clicks.

The Power of Documentation and Defensibility

An important takeaway from this session was the emphasis on documentation and defensibility. Chris stressed that when you configure Chrome according to CIS Benchmarks, you’re not just enhancing security—you’re also creating a defensible position in case of an audit or legal scrutiny. Auditors and regulators look for well-documented security practices, and following recognized benchmarks like CIS provides a solid foundation for compliance.

Building a Strong Security Culture

As Chris pointed out, security isn’t just about technology—it’s about culture. By implementing these configurations and educating your team on their importance, you’re fostering a security-conscious environment. This culture of security awareness is vital for long-term protection, especially as threats continue to evolve.

Secure Your Browser, Secure Your Business

The insights shared in this session underscore the importance of taking browser security seriously. By following CIS Benchmarks, you can significantly reduce your risk of exposure and build a more resilient cybersecurity posture. For those who want to explore these settings in more detail, watching the full episode is highly recommended.


Watch the full episode here, register for upcoming episodes here, and get a special offer to generate internal and external free reports by reaching out with the comment “settings webinar” here.

Protecting Against Common Threats with Secure Content and JavaScript Settings

Protecting Against Common Threats with Secure Content and JavaScript Settings

As we continue our exploration of browser security, this week’s focus shifts to securing content and JavaScript settings within your browser—critical...

READ MORE
Hidden Risks in Your Chrome Browser Security

Hidden Risks in Your Chrome Browser Security

The Overlooked Importance of Browser Security Browsers have become the gatekeepers of our digital lives, yet many overlook the need for robust...

READ MORE
Why Automation is the Key to Long-Term Security Hardening

Why Automation is the Key to Long-Term Security Hardening

Let’s face it—manual security management is a daunting task, especially when dealing with countless settings across multiple endpoints. One small...

READ MORE