One of the most effective ways to reduce exposure is by using a risk-scoring model. The Peritus model, adapted from OWASP and Duo Security best practices, evaluates extensions across key factors such as publisher reputation, permissions requested, update history, and supply chain safeguards.
The outcome: a simple score that determines whether an extension is low, medium, or high risk — and whether it should be allowed, reviewed, or blocked.
The report also outlines two practical defence strategies:
Together, these strategies move organisations from passive trust to layered defence.
Browser extensions may look trivial, but the risk is anything but. They touch credentials, cookies, SaaS, and core workflows — making them a direct board-level issue.
CISOs who can demonstrate proactive governance around extensions show regulators, executives, and customers that they are managing business risk — not just technical risk.
This blog is a summary of our Browser Extension Security Report, the first in a new Peritus Insight Report Series.
👉 Download the full report here
Inside, you’ll find:
Prepared by Viktor Spetnijs, Lead Cybersecurity Specialist, Peritus Cloud Security
Browse more content in this category and keep building your knowledge with helpful insights, tutorials, and real-world tips.