STIGQter STIGQter: STIG Summary: Samsung OS 9 with Knox 3.x COBO Use Case KPE(AE) Deployment Security Technical Implementation Guide Version: 1 Release: 3 Benchmark Date: 24 Apr 2020:

Samsung Android must be configured to not allow backup of [all applications, configuration data] to locally connected systems.

DISA Rule

SV-102995r1_rule

Vulnerability Number

V-92907

Group Title

PP-MDF-301220

Rule Version

KNOX-09-000840

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure Samsung Android to disable backup to locally connected systems.

Disabling backup to locally connected systems is implemented by the configuration policy rule "Disable USB mass storage", which is included in KNOX-09-000680.

On the MDM console, for the device, in the "Android user restrictions" group, select "disallow USB file transfer".

Check Contents

Review device configuration settings to confirm that backup to locally connected systems has been disabled.

Disabling backup to locally connected systems is validated by the validation procedure in "Disable USB mass storage", which is included in KNOX-09-000680.

Review device configuration settings to confirm that USB file transfer has been disallowed.

This procedure is performed on both the MDM Administration console and the Samsung Android device.

On the MDM console, for the device, in the "Android user restrictions" group, verify that "disallow usb file transfer" is selected.

Connect the Samsung Android device to a non-DoD network-managed PC with a USB cable.

On the PC, browse the mounted Samsung Android device and verify that it does not display any folders or files.

If on the MDM console "disallow USB file transfer" is not selected, or the PC can mount and browse folders and files on the Samsung Android device, this is a finding.

Vulnerability Number

V-92907

Documentable

False

Rule Version

KNOX-09-000840

Severity Override Guidance

Review device configuration settings to confirm that backup to locally connected systems has been disabled.

Disabling backup to locally connected systems is validated by the validation procedure in "Disable USB mass storage", which is included in KNOX-09-000680.

Review device configuration settings to confirm that USB file transfer has been disallowed.

This procedure is performed on both the MDM Administration console and the Samsung Android device.

On the MDM console, for the device, in the "Android user restrictions" group, verify that "disallow usb file transfer" is selected.

Connect the Samsung Android device to a non-DoD network-managed PC with a USB cable.

On the PC, browse the mounted Samsung Android device and verify that it does not display any folders or files.

If on the MDM console "disallow USB file transfer" is not selected, or the PC can mount and browse folders and files on the Samsung Android device, this is a finding.

Check Content Reference

M

Target Key

3495

Comments