STIGQter STIGQter: STIG Summary: Samsung Android OS 9 with Knox 3.x COPE Use Case KPE(Legacy) Deployment Security Technical Implementation Guide Version: 1 Release: 4 Benchmark Date: 24 Jul 2020:

Samsung Android must be configured to enable the Online Certificate Status Protocol (OCSP).

DISA Rule

SV-104013r1_rule

Vulnerability Number

V-93927

Group Title

PP-MDF-991000

Rule Version

KNOX-09-001345

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure Samsung Android to enable OCSP checking for all apps.

On the MDM, for the device, in the "Knox certificate" group, configure "OCSP check" to "enable for all apps".

Refer to the MDM documentation to determine how to configure OCSP checking to "enable for all apps". Some may, for example, allow a wildcard string: "*" (asterisk).

Check Contents

Review device configuration settings to confirm that OCSP checking is enabled for all apps.

This procedure is performed on the MDM Administration console only.

On the MDM console, for the device, in the "Knox certificate" group, verify that "OCSP check" is configured to "enable for all apps".

If on the MDM console "OCSP check" is not configured to "enable for all apps", this is a finding.

Vulnerability Number

V-93927

Documentable

False

Rule Version

KNOX-09-001345

Severity Override Guidance

Review device configuration settings to confirm that OCSP checking is enabled for all apps.

This procedure is performed on the MDM Administration console only.

On the MDM console, for the device, in the "Knox certificate" group, verify that "OCSP check" is configured to "enable for all apps".

If on the MDM console "OCSP check" is not configured to "enable for all apps", this is a finding.

Check Content Reference

M

Target Key

3509

Comments