Details
While the risk associated with browser development tools is more related to the proper design of a web application, a risk vector remains within the browser. The developer tools allow end users and application developers to view and edit all types of web application-related data via the browser. Page elements, source code, javascript, API calls, application data, etc., may all be viewed and potentially manipulated. Manipulation could be useful for troubleshooting legitimate issues, and this may be performed in a development environment. Manipulation could also be malicious and must be addressed.
Solution
Set the policy value for ‘Computer Configuration/Administrative Templates/Microsoft Edge/Control where developer tools can be used’ to ‘enabled’ and select ‘Don’t allow using the developer tools’.
Supportive Information
The following resource is also helpful.
This security hardening control applies to the following category of controls within NIST 800-53: Configuration Management.This control applies to the following type of system Windows.
References
- 800-53|CM-7a.
- CAT|III
- CCI|CCI-000381
- Rule-ID|SV-235751r626523_rule
- STIG-ID|EDGE-00-000034
- Vuln-ID|V-235751