In the 2 previous posts about Content Security Policy, we talked about the main reasons why you need to get started with CSP and the common problems that you will run into. In this post, we will dive deeper into the 3 types of CSP solutions.

Phased Approach

Because reports of violations can be overwhelming for both analysis and performance reasons tCell recommends starting with the most critical directives first (such as script-src and object-src which help prevent XSS) and a very permissive set of sources that will produce few violations and reports. From there attempt to make it more restrictive source by source.

content security policy approach

Strict-Dynamic & Nonces

Strict Dynamic was introduced in CSP 3 and allows some backward compatibility while moving to nones. You can see in the image below how strict dynamic allows transitions that allow older browsers to work while protecting browsers that support CSP3.

As a reminder, this means the Nonce should be dynamic each page load and the value should be made available to the template engine. Google, in their paper CSP is Dead, Long Live CSP [1], suggest strict-dynamic as a method to get good nonce coverage of all scripts, including scripts which reference other sites.

content security policy approach

Track Inline Scripts That Already Exist

Even if you decide to move in the direction of nonce’s how do you get an accurate inventory of what scripts might break? Or if a new one was added? has open sourced a JavaScript library based on its more robust JavaScript Agent that inventories inline scripts and script sources and if they have a nonce property. You can adjust the reporting server location and start collecting information by putting this at the top of the HEAD of your page template.

CSP Inline-Agent

By keeping track of how many scripts have nonce’s you can track your progress and get an idea of how long the project will take.

If you’re interested in reading more about Content Security Policy, check out Content Security Policy: Newer CSP Directives & Common Problems to get a better understanding of the hurdles of CSP. We also have a post about the Top 3 Reasons to Get Started with Content Security Policy with a list of resources to help you get your CSP up and running.  Enjoy!