CSP directives supported by policies
Page Shield policies support most Content Security Policy (CSP) directives, covering both monitored and unmonitored resources. You can use a policy to control other types of resources besides scripts and their connections, even though Page Shield is not monitoring these resources.
Each CSP directive can contain multiple values, including:
- Schemes
- Hostnames
- URIs
- Special keywords between single quotes (for example,
'none'
) - Hashes between single quotes (for example,
'sha384-oqVuAfXRKap7fdgcCY5uykM6+R9GqQ8K/uxy9rx7HNQlGYl1kPzQho1wx4JwY8wC'
)
Hostname and URI values support a *
wildcard for the leftmost subdomain.
The following table lists the supported CSP directives and special values you can use in Page Shield policies:
Directive | Name in the dashboard | Supported special values | Monitored |
---|---|---|---|
script-src |
Scripts | 'none' 'self' 'unsafe-inline' 'unsafe-eval' '<HASH>' |
Yes |
connect-src |
Connections | 'none' 'self' 'unsafe-inline' 'unsafe-eval' '<HASH>' |
Yes |
default-src |
Default | 'none' 'self' 'unsafe-inline' 'unsafe-eval' '<HASH>' |
No |
img-src |
Images | 'none' 'self' 'unsafe-inline' 'unsafe-eval' '<HASH>' |
No |
style-src |
Styles | 'none' 'self' 'unsafe-inline' 'unsafe-eval' '<HASH>' |
No |
font-src |
Fonts | 'none' 'self' 'unsafe-inline' 'unsafe-eval' '<HASH>' |
No |
object-src |
Objects | 'none' 'self' 'unsafe-inline' 'unsafe-eval' '<HASH>' |
No |
media-src |
Media | 'none' 'self' 'unsafe-inline' 'unsafe-eval' '<HASH>' |
No |
child-src |
Child | 'none' 'self' 'unsafe-inline' 'unsafe-eval' '<HASH>' |
No |
form-action |
Form actions | 'none' 'self' 'unsafe-inline' 'unsafe-eval' '<HASH>' |
No |
worker-src |
Workers | 'none' 'self' 'unsafe-inline' 'unsafe-eval' '<HASH>' |
No |
base-uri |
Base URI | 'none' 'self' 'unsafe-inline' 'unsafe-eval' '<HASH>' |
No |
manifest-src |
Manifests | 'none' 'self' 'unsafe-inline' 'unsafe-eval' '<HASH>' |
No |
frame-src |
Frames | 'none' 'self' 'unsafe-inline' 'unsafe-eval' '<HASH>' |
No |
frame-ancestors |
Frame ancestors | 'none' 'self' |
No |
upgrade-insecure-requests |
Upgrade insecure requests | N/A | No |
More resources
For more information on CSP directives and their values, refer to the following resources in the MDN documentation: