STIGQter STIGQter: STIG Summary: Samsung OS 9 with Knox 3.x COBO Use Case KPE(AE) Deployment Security Technical Implementation Guide Version: 1 Release: 3 Benchmark Date: 24 Apr 2020:

The Samsung Android whitelist must be configured to not include applications with the following characteristics: - back up mobile device data to non-DoD cloud servers (including user and application access to cloud backup services); - transmit mobile device diagnostic data to non-DoD servers; - voice assistant application if available when the mobile device is locked; - voice dialing application if available when the mobile device is locked; - allows synchronization of data or applications between devices associated with the user; and - allows unencrypted (or encrypted but not FIPS 140-2 validated) data sharing with other mobile devices or printers.

DISA Rule

SV-102951r1_rule

Vulnerability Number

V-92863

Group Title

PP-MDF-301100

Rule Version

KNOX-09-000100

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure Samsung Android to include all system apps in the system app disable list that have been identified as having non-DoD-approved characteristics.

Do one of the following:
- Method # 1 (preferred): Use managed Google Play for the device (managed device).
- Method #2: Use the Knox system application disable list.

****

Method #1: On the MDM console, for the device, in the "managed Google Play" group, add all system app packages that have been identified as having non-DoD-approved characteristics to the system application disable list.

****

Method #2: On the MDM console, for the device, in the "Knox application" group, add all system app packages that have been identified as having non-DoD-approved characteristics to the system application disable list.

****

Note: Refer to the "System Apps for Disablement (Non-DoD-Approved Characteristics)" and "System Apps That Must Not Be Disabled" tables in the Supplemental document for this STIG.

Check Contents

Review device configuration settings to confirm that the system application disable list has been configured to include all system apps that have been identified as having non-DoD-approved characteristics.

This procedure is performed on both the MDM Administration console and the Samsung Android device.

Confirm if Method #1 or Method #2 is used at the Samsung device site and follow the appropriate procedure.

****

Method #1: On the MDM console, for the device, in the "managed Google Play" group, verify that the system application disable list contains all apps identified as having non-DoD-approved characteristics.

On the Samsung Android device, review the apps on the "Personal" App screen and confirm that none of the apps listed in the system application disable list are present.

If the system application disable list does not contain all the apps that have been identified as having non-DoD-approved characteristics, or if an app listed can be found on the "Personal" App screen of the Samsung Android device, this is a finding.

****

Method #2: On the MDM console, for the device, in the "Knox application" group, verify that the system application disable list contains all apps identified as having non-DoD-approved characteristics.

On the Samsung Android device, review the apps on the "Personal" App screen and confirm that none of the apps listed in the system application disable list are present.

If the system application disable list does not contain all the apps that have been identified as having non-DoD-approved characteristics, or if an app listed can be found on the "Personal" App screen of the Samsung Android device, this is a finding.

Vulnerability Number

V-92863

Documentable

False

Rule Version

KNOX-09-000100

Severity Override Guidance

Review device configuration settings to confirm that the system application disable list has been configured to include all system apps that have been identified as having non-DoD-approved characteristics.

This procedure is performed on both the MDM Administration console and the Samsung Android device.

Confirm if Method #1 or Method #2 is used at the Samsung device site and follow the appropriate procedure.

****

Method #1: On the MDM console, for the device, in the "managed Google Play" group, verify that the system application disable list contains all apps identified as having non-DoD-approved characteristics.

On the Samsung Android device, review the apps on the "Personal" App screen and confirm that none of the apps listed in the system application disable list are present.

If the system application disable list does not contain all the apps that have been identified as having non-DoD-approved characteristics, or if an app listed can be found on the "Personal" App screen of the Samsung Android device, this is a finding.

****

Method #2: On the MDM console, for the device, in the "Knox application" group, verify that the system application disable list contains all apps identified as having non-DoD-approved characteristics.

On the Samsung Android device, review the apps on the "Personal" App screen and confirm that none of the apps listed in the system application disable list are present.

If the system application disable list does not contain all the apps that have been identified as having non-DoD-approved characteristics, or if an app listed can be found on the "Personal" App screen of the Samsung Android device, this is a finding.

Check Content Reference

M

Target Key

3495

Comments