STIGQter STIGQter: STIG Summary: Google Android 9.x Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 23 Aug 2019: Google Android Pie must configured to disallow outgoing beam.

DISA Rule

SV-106469r1_rule

Vulnerability Number

V-97365

Group Title

PP-MDF-991000

Rule Version

GOOG-09-010400

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure Google Android Pie device to disallow outgoing beam.

On the MDM console, in the Android user restrictions section, select "Disallow outgoing beam" to on.

Check Contents

Review the Google Android Pie device configuration settings to confirm that outgoing beam is disallowed.

This procedure is performed on both the MDM Administration console and the Google Android Pie device.

On the MDM console, in the Android user restrictions section, select "Disallow outgoing beam" to on".

On the Google Android Pie device, do the following:
1. Open Settings.
2. Tap "Connected devices".
3. Tap "Connection preferences".
4. Verify that "Android Beam" is off and grayed out.

If on the MDM console "Disallow outgoing beam" is not set to on, or on the Google Android Pie device "Android Beam" is not off and grayed out, this is a finding.

Vulnerability Number

V-97365

Documentable

False

Rule Version

GOOG-09-010400

Severity Override Guidance

Review the Google Android Pie device configuration settings to confirm that outgoing beam is disallowed.

This procedure is performed on both the MDM Administration console and the Google Android Pie device.

On the MDM console, in the Android user restrictions section, select "Disallow outgoing beam" to on".

On the Google Android Pie device, do the following:
1. Open Settings.
2. Tap "Connected devices".
3. Tap "Connection preferences".
4. Verify that "Android Beam" is off and grayed out.

If on the MDM console "Disallow outgoing beam" is not set to on, or on the Google Android Pie device "Android Beam" is not off and grayed out, this is a finding.

Check Content Reference

M

Target Key

3499

Comments