How to use Django’s Content Security Policy¶
Basic config¶
To enable Content Security Policy (CSP) in your Django project:
Add the CSP middleware to your
MIDDLEWAREsetting:MIDDLEWARE = [ # ... "django.middleware.csp.ContentSecurityPolicyMiddleware", # ... ]
Configure the CSP policies in your
settings.pyusing eitherSECURE_CSPorSECURE_CSP_REPORT_ONLY(or both). The CSP Settings docs provide more details about the differences between these two:from django.utils.csp import CSP # To enforce a CSP policy: SECURE_CSP = { "default-src": [CSP.SELF], # Add more directives to be enforced. } # Or for report-only mode: SECURE_CSP_REPORT_ONLY = { "default-src": [CSP.SELF], # Add more directives as needed. "report-uri": "/path/to/reports-endpoint/", }
Nonce config¶
To use nonces in your CSP policy, beside the basic config, you need to:
Include the
NONCEplaceholder value in the CSP settings. This only applies toscript-srcorstyle-srcdirectives:from django.utils.csp import CSP SECURE_CSP = { "default-src": [CSP.SELF], # Allow self-hosted scripts and script tags with matching `nonce` attr. "script-src": [CSP.SELF, CSP.NONCE], # Example of the less secure 'unsafe-inline' option. "style-src": [CSP.SELF, CSP.UNSAFE_INLINE], }
Add the
csp()context processor to yourTEMPLATESsetting. This makes the generated nonce value available in the Django templates as thecsp_noncecontext variable:TEMPLATES = [ { "BACKEND": "django.template.backends.django.DjangoTemplates", "OPTIONS": { "context_processors": [ # ... "django.template.context_processors.csp", ], }, }, ]
In your templates, add the
nonceattribute to the relevant inline<style>or<script>tags, using thecsp_noncecontext variable:<style nonce="{{ csp_nonce }}"> /* These inline styles will be allowed. */ </style> <script nonce="{{ csp_nonce }}"> // This inline JavaScript will be allowed. </script>
Caching and Nonce Reuse
The ContentSecurityPolicyMiddleware
automatically handles generating a unique nonce and inserting the
appropriate nonce-<value> source expression into the
Content-Security-Policy (or Content-Security-Policy-Report-Only)
header when the nonce is used in a template.
To ensure correct behavior, make sure both the HTML and the header are generated within the same request and not served from cache. See the reference documentation on Nonce usage for implementation details and important caching considerations.