Skip to contentAbout Fig Group
Technical Guides

Cyber Essentials for Chromebook / ChromeOS: configuration guide

How ChromeOS maps to Cyber Essentials v3.3 - automatic updates, Verified Boot, encrypted user data, Google Admin policies, and why Chromebooks are the easiest device class to certify.

Author

Jay Hopkins

Editor

Edited by Jack Wickham

Published

Last reviewed

Read time

6 min read

Share

Cyber Essentials for Chromebook / ChromeOS: configuration guide

Chromebooks are probably the easiest end-user device to certify under Cyber Essentials v3.3. The architecture enforces Verified Boot, automatic silent updates, encrypted user data, and sandboxed apps by default - most of what the scheme tests is on and not user-disableable. The work is enrolling devices into your Google Workspace domain, pinning Chrome Enterprise policies, and making sure every Chromebook is still within its Auto Update Expiration (AUE) date.

1. Why ChromeOS is Cyber-Essentials-friendly

The scheme tests five controls. ChromeOS handles four of them out of the box:

ControlChromeOS behaviour
FirewallNot a configurable firewall; network boundary handled upstream. ChromeOS has no exposed inbound services
Secure configurationVerified Boot, sandboxing, minimal attack surface
Security update managementSilent automatic updates every ~4 weeks; you can force faster
Malware protectionApps run in sandboxes; Chrome Safe Browsing on by default; Play Protect for Android apps
User access controlManaged via Google Workspace identity with 2SV / security keys

Only the last requires active configuration; the rest ship correct.

2. Auto Update Expiration (AUE)

Every Chromebook model has an AUE date after which Google stops shipping updates. Devices past AUE are outside the Cyber Essentials supported-OS clause and will fail.

  • Check the Auto Update policy list in Google Admin for every device in your fleet
  • Replace any Chromebook within 6 months of its AUE
  • When buying new, prefer models with 8+ years of AUE remaining (post-2023 ChromeOS Flex-ineligible laptops and newer ChromeOS devices)

3. Enrolment into Google Workspace

  • Chrome Enterprise Upgrade (one-time per device licence, usually under £30) lets you manage each Chromebook from Google Admin
  • Enrol via powerwash + enterprise enrolment flow at deployment
  • Assign devices to Organisational Units (OUs) matching your policy layers

Without enterprise enrolment, Chromebooks look like personal devices and won't satisfy user-access-control or secure-configuration evidence.

4. Mandatory Google Admin device policies

In Devices > Chrome > Settings > Device settings:

  • Sign-in restriction: restrict to users within your Workspace domain
  • Forced re-enrolment: on
  • Guest mode: disabled
  • Verified mode: enforced (prevents boot into developer mode)
  • Device off hours: disabled or tightly scoped
  • Blocked URL list: curated list of known-malicious domains (optional)

In Devices > Chrome > Settings > User & browser settings:

  • Password manager: enabled - users should use Google Password Manager or an approved third-party
  • Safe Browsing: Enhanced Protection
  • Enable Android apps: business decision; if enabled, require Play Protect
  • Allow screen lock: required
  • Idle time before screen lock: 600 seconds (10 min) or less
  • Require password on wake: on

5. Password / user access control

  • Google Workspace 2SV enforced for every user. Security-key policy for admins.
  • Minimum password length 12 characters (Cyber Essentials v3.3) - configured in Workspace password policy
  • No shared Chromebooks signed in as a shared user (defeats user-access-control). Individual user accounts only.

6. Android apps on Chromebook

ChromeOS can run Android apps via Google Play. For Cyber Essentials:

  • Push business apps via Managed Google Play only
  • Block sideloaded apps at OU level
  • Keep Play Protect on

7. Evidence assessors expect

  • Google Admin device list export showing serial number, model, OS version, AUE date, last policy sync
  • OU policy export showing the mandatory settings above
  • Workspace 2SV enrolment report
  • Evidence that any device past AUE has been decommissioned

8. Common failure points

1. Chromebooks past AUE. Most common failure. Check every device's AUE, replace those within 6 months of expiry.

2. Chromebooks not enterprise-enrolled. Personal Google accounts logged in on what should be corporate devices. Powerwash and re-enrol with Chrome Enterprise Upgrade.

3. Developer Mode enabled on a couple of engineering Chromebooks. Switch Verified Mode to enforced; narrow exceptions to a specific OU with documented business need.

4. Shared user accounts on a counter / reception Chromebook. Switch to individual named accounts.

5. 2SV not enforced for a couple of contractor accounts. Enforce at Workspace level.

What Fig checks

Our CE readiness scan pulls Google Admin device inventory (read-only) and flags devices past AUE, missing enrolment, and any OU-level policy gaps against v3.3. ChromeOS-heavy organisations pass first-time at >98% once AUE is clean - it's the easiest mobile platform to certify.

Start Cyber Essentials - from £299.99 + VAT | Pricing | CE Plus

About the author

Jay Hopkins

Jay Hopkins

Managing Director, Fig Group

IASME-licensed Cyber Essentials AssessorIASME Cyber Assurance Assessor

Jay Hopkins is the Managing Director of Fig Group and an IASME-licensed Cyber Essentials assessor. He was previously Head of Technology for a global regulated firm. He works with UK organisations across regulated sectors on baseline compliance, supply-chain assurance, and AI-augmented security tooling.

Next step

Want to see how Fig handles this?

Discover how Fig helps organisations prepare for security assessments and maintain ongoing compliance.

Request a demo

Related solutions

Continue exploring Fig