Content Security Policy (CSP)
Quick Reference Guide

Content Security Policy Reference

The new Content-Security-Policy HTTP response header helps you reduce XSS risks on modern browsers by declaring, which dynamic resources are allowed to load.

Tweet Edit on GitHub

Browser Support

Content-Security-Policy CSP Level 2 40+ Full January 2015 31+ Partial
July 2014
10+ - Edge 15+ Parital, 76+ Full
Content-Security-Policy CSP 1.0 25+ 23+ 7+ - Edge 12 build 10240+
X-Content-Security-Policy Deprecated - 4+ - 10+ Limited 12+ Limited
X-Webkit-CSP Deprecated 14+ - 6+ - -

Sources:, & Mozilla

Try our CSP Browser Test to test your browser.

Note: It is known that having both Content-Security-Policy and X-Content-Security-Policy or X-Webkit-CSP causes unexpected behaviours on certain versions of browsers. Please avoid using deprecated X-* headers.

Directive Reference

The Content-Security-Policy header value is made up of one or more directives (defined below), multiple directives are separated with a semicolon ;

This documentation is provided based on the Content Security Policy Level 2 W3C Recommendation, and the CSP Level 3 W3C Working Draft

Directive Example Value Description
default-src 'self' The default-src is the default policy for loading content such as JavaScript, Images, CSS, Fonts, AJAX requests, Frames, HTML5 Media. See the Source List Reference for possible values.

CSP Level 1 25+ 23+ 7+ 12+
script-src 'self' Defines valid sources of JavaScript.

CSP Level 1 25+ 23+ 7+ 12+
style-src 'self' Defines valid sources of stylesheets.

CSP Level 1 25+ 23+ 7+ 12+
img-src 'self' Defines valid sources of images.

CSP Level 1 25+ 23+ 7+ 12+
connect-src 'self' Applies to XMLHttpRequest (AJAX), WebSocket or EventSource. If not allowed the browser emulates a 400 HTTP status code.

CSP Level 1 25+ 23+ 7+ 12+
font-src Defines valid sources of fonts.

CSP Level 1 25+ 23+ 7+ 12+
object-src 'self' Defines valid sources of plugins, eg <object>, <embed> or <applet>.

CSP Level 1 25+ 23+ 7+ 12+
media-src Defines valid sources of audio and video, eg HTML5 <audio>, <video> elements.

CSP Level 1 25+ 23+ 7+ 12+
frame-src 'self' Defines valid sources for loading frames. In CSP Level 2 frame-src was deprecated in favor of the child-src directive. CSP Level 3, has undeprecated frame-src and it will continue to defer to child-src if not present.

CSP Level 1
sandbox allow-forms allow-scripts Enables a sandbox for the requested resource similar to the iframe sandbox attribute. The sandbox applies a same origin policy, prevents popups, plugins and script execution is blocked. You can keep the sandbox value empty to keep all restrictions in place, or add values: allow-forms allow-same-origin allow-scripts allow-popups, allow-modals, allow-orientation-lock, allow-pointer-lock, allow-presentation, allow-popups-to-escape-sandbox, and allow-top-navigation

CSP Level 1 25+ 50+ 7+ 12+
report-uri /some-report-uri Instructs the browser to POST a reports of policy failures to this URI. You can also append -Report-Only to the HTTP header name to instruct the browser to only send reports (does not block anything). This directive is deprecated in CSP Level 3 in favor of the report-to directive.

CSP Level 1 25+ 23+ 7+ 12+
child-src 'self' Defines valid sources for web workers and nested browsing contexts loaded using elements such as <frame> and <iframe>

CSP Level 2 40+ 45+ 15+
form-action 'self' Defines valid sources that can be used as a HTML <form> action.

CSP Level 2 40+ 36+ 15+
frame-ancestors 'none' Defines valid sources for embedding the resource using <frame> <iframe> <object> <embed> <applet>. Setting this directive to 'none' should be roughly equivalent to X-Frame-Options: DENY

CSP Level 2 39+ 33+ 15+
plugin-types application/pdf Defines valid MIME types for plugins invoked via <object> and <embed>. To load an <applet> you must specify application/x-java-applet.

CSP Level 2 40+ 15+
report-to groupName Defines a reporting group name defined by a Report-To HTTP response header. See the Reporting API for more info.

CSP Level 3 70+
worker-src 'none' Restricts the URLs which may be loaded as a Worker, SharedWorker or ServiceWorker.

CSP Level 3 59+ 58+
manifest-src 'none' Restricts the URLs that application manifests can be loaded.

CSP Level 3 Yes 40+
navigate-to Restricts the URLs that the document may navigate to by any means. For example when a link is clicked, a form is submitted, or window.location is invoked. If form-action is present then this directive is ignored for form submissions. Implementation Status

CSP Level 3

Source List Reference

All of the directives that end with -src support similar values known as a source list. Multiple source list values can be space separated with the exception of 'none' which should be the only value.

Source Value Example Description
* img-src * Wildcard, allows any URL except data: blob: filesystem: schemes.
'none' object-src 'none' Prevents loading resources from any source.
'self' script-src 'self' Allows loading resources from the same origin (same scheme, host and port).
data: img-src 'self' data: Allows loading resources via the data scheme (eg Base64 encoded images). img-src Allows loading resources from the specified domain name.
* img-src * Allows loading resources from any subdomain under img-src Allows loading resources only over HTTPS matching the given domain.
https: img-src https: Allows loading resources only over HTTPS on any domain.
'unsafe-inline' script-src 'unsafe-inline' Allows use of inline source elements such as style attribute, onclick, or script tag bodies (depends on the context of the source it is applied to) and javascript: URIs
'unsafe-eval' script-src 'unsafe-eval' Allows unsafe dynamic code evaluation such as JavaScript eval()
'sha256-' script-src 'sha256-xyz...' Allows an inline script or CSS to execute if its hash matches the specified hash in the header. Currently supports SHA256, SHA384 or SHA512. CSP Level 2
'nonce-' script-src 'nonce-r@nd0m' Allows an inline script or CSS to execute if the script (eg: <script nonce="r@nd0m">) tag contains a nonce attribute matching the nonce specifed in the CSP header. The nonce should be a secure random string, and should not be reused. CSP Level 2
'strict-dynamic' script-src 'strict-dynamic' Enables an allowed script to load additional scripts via non-"parser-inserted" script elements (for example document.createElement('script'); is allowed). CSP Level 3
'unsafe-hashes' script-src 'unsafe-hashes' 'sha256-abc...' Allows you to enable scripts in event handlers (eg onclick). Does not apply to javascript: or inline <script> CSP Level 3

Content-Security-Policy Examples

Here a few common scenarios for content security policies:

Allow everything but only from the same origin

default-src 'self';

Only Allow Scripts from the same origin

script-src 'self';

Allow Google Analytics, Google AJAX CDN and Same Origin

script-src 'self';

Starter Policy

This policy allows images, scripts, AJAX, and CSS from the same origin, and does not allow any other resources to load (eg object, frame, media, etc). It is a good starting point for many sites.

default-src 'none'; script-src 'self'; connect-src 'self'; img-src 'self'; style-src 'self';

Content-Security-Policy Error Messages

In Chrome when a Content Security Policy Script Violation happens you get a message like this one in the Chrome Developer Tools:

Refused to load the script 'script-uri' because it violates the following Content Security Policy directive: "your CSP directive".

In Firefox you might see messages like this in the Web Developer Tools:

Content Security Policy: A violation occurred for a report-only CSP policy ("An attempt to execute inline scripts has been blocked"). The behavior was allowed, and a CSP report was sent.

In addition to a console message, a securitypolicyviolation event is fired on the window. See

Server Side Configuration

Any server side programming environment should allow you to send back a custom HTTP response header. You can also use your web server to send back the header.

Apache Content-Security-Policy Header

Add the following to your httpd.conf in your VirtualHost or in an .htaccess file:

Header set Content-Security-Policy "default-src 'self';"

Nginx Content-Security-Policy Header

In your server {} block add:

add_header Content-Security-Policy "default-src 'self';";

You can also append always to the end to ensure that nginx sends the header reguardless of response code.

IIS Content-Security-Policy Header

You can use the HTTP Response Headers GUI in IIS Manager or add the following to your web.config:

      <add name="Content-Security-Policy" value="default-src 'self';" />

CSP Resources

Want more info on CSP, checkout these links: