New Report
Menlo Security finds a new sophisticated phishing campaign.
Icon Rounded Closed - BRIX Templates

Browser Posture Management FAQs

There’s been a sharp rise in threats targeting browsers — and a critical increase in the need to secure and manage them.

Research has shown that the browser is the most widely used application in the enterprise, and Google Chrome and Microsoft Edge are by far the most popular. Both of these fully featured browsers are provided at no charge, making them an excellent choice for enterprises and end-users alike.

As they have evolved, these browsers have added an astonishing number of differentiated features, becoming more like an operating system than a simple method of fulfilling search queries. Like any other enterprise asset, it is vital to manage these powerful browsers to ensure that their advanced features are used appropriately and that they do not expand the enterprise attack surface or defeat data privacy controls.

Modern security teams need a browser security strategy. Even if browsing sessions are isolated and secured, the endpoint browser controls many aspects of how users interact with the web, including managing passwords, validating HTTPS connections, determining what types of data are shared with external services, and more.

What type of policies are managed in the browser? Are they complex?

One of the biggest issues with managing browser policies is that there are so many of them to choose from, and within each policy there are often two to three different options. While it is possible to handle this task manually, it is time-consuming and laden with implications that aren’t obvious at first glance.

How often do browser policies change?

Both Chrome and Edge regularly release new features, either to correct issues or to enable new functionality; for example, Chrome releases a full browser update about every 6 weeks, while minor updates, such as security fixes and software updates happen more frequently.That means that the process of managing the browser is not a “one-and-done” proposition, but rather a dynamic process that must be maintained over time.

How important is it for enterprises to manage policies?

Simply allowing the browser to go unmanaged may have been the simplest approach in the past. Unfortunately, this path is increasingly untenable. In part, that’s because many new browser capabilities are created to ease consumer friction and build the browser vendor’s ecosystem. And many of these features are enabled by default.

But these capabilities, while creating conveniences for consumers, can have security, compliance, and privacy implications that are problematic in the enterprise.

What are the compliance implications of browser posture management?

Managing the browser is a vital component of many different types of standards, including those from the Center for Internet Security (CIS). CIS benchmarks are often adopted in the following industries:

  • Healthcare – CIS benchmarks can help to ensure privacy of patient Personally Identifiable Information (PII), and compliance with Health Insurance Portability and Accountability Act (HIPAA).
  • Financial Services – CIS standards are often used in banks, insurance companies and other financial institutions. These benchmarks can aid in the protection of customer data, as well as compliance with regulations such as Payment Card Industry Data Security Standard (PCI-DSS).
  • ‍‍State, Local, and Federal Government – These agencies are subject to a variety of compliance requirements. Compliance with security benchmarks for the browser are a vital element.
  • Education – The browser has become integral to today’s educational environment, and safeguarding student and faculty data is important. Following security benchmarks can prevent problems before they happen, while helping institutions to comply with regulations like the Family Educational Rights and Privacy Act (FERPA).

Are you letting your browser — or your users — determine enterprise security?

As mentioned earlier, some browser features can affect overall enterprise security in unforeseen ways, including expanding your attack surface and thwarting data privacy policies. Some elements may require intervention even in cases where the default policies seem appropriate. That’s because if policies are not specifically locked down, websites may query users for access, leaving the choice up to them.

Are you making policy decisions?

Each enterprise — and each group of users within an enterprise — has its own needs and requirements. There is no such thing as “one-size-fits-all,” and you know better what will work than an outsider. The modern enterprise browser has flexible policy controls and reporting capabilities to ensure users only have access to the websites, applications and features needed to perform their role. Simplified iterations of policies are important, but whether or not to implement recommendations should remain in-house.

Browser Posture Manager

Find out how Menlo Security Browser Posture Manager can help you