Cross-Origin Resource Policy (CORP)
The Importance of CORP
CORP complements COEP by allowing resource servers to explicitly control who can load their resources. When COEP: require-corp is active on a page, all cross-origin resources must either have CORS headers or a CORP: cross-origin header to be loaded. This creates a two-way consent model for resource sharing.
Without CORP, any website can embed your images, scripts, or other resources. While hotlinking is often just a bandwidth concern, it can also be a security issue. An attacker's page loading your resources in the context of COEP-protected page can create Spectre-exploitable situations.
For most website operators, the primary concern is ensuring your resources work correctly on pages that use COEP. If your CDN or static assets are loaded cross-origin (even from a different subdomain), they may need CORP: cross-origin headers to continue working on COEP-enabled pages.
How to Verify
A security audit identifies resources that may need CORP headers. If you serve resources loaded by other origins, consider adding Cross-Origin-Resource-Policy: cross-origin to those resources. If your resources should only be loaded by your own site, use same-origin.