STIGQter STIGQter: STIG Summary: Samsung Android OS 10 with Knox 3.x Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 20 Mar 2020:

Samsung Android must be configured to disable USB mass storage mode.

DISA Rule

SV-109047r1_rule

Vulnerability Number

V-99943

Group Title

PP-MDF-301210

Rule Version

KNOX-10-003400

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure Samsung Android to disable USB mass storage mode.

For KPE(AE) deployments this configuration is the default configuration. No configuration is required.

On the management tool, in the device restrictions section, set "USB file transfer" to "Disallow".

Check Contents

Review Samsung Android configuration settings to determine if the mobile device has a USB mass storage mode and if it has been disabled.

For KPE(AE) deployments this configuration is the default configuration. If the management tool does not provide the capability to configure "USB file transfer", there is NO finding because the default setting cannot be changed.

This validation procedure is performed on both the management tool Administration Console and the Samsung Android device.

On the management tool, in the device restrictions section, verify that "USB file transfer" has been set to "Disallow".

On the PC, browse the mounted Samsung Android device and verify that it does not display any folders or files.

If on the management tool "USB file transfer" is not set to "Disallow", or the PC can mount and browse folders and files on the Samsung Android device, this is a finding.

Vulnerability Number

V-99943

Documentable

False

Rule Version

KNOX-10-003400

Severity Override Guidance

Review Samsung Android configuration settings to determine if the mobile device has a USB mass storage mode and if it has been disabled.

For KPE(AE) deployments this configuration is the default configuration. If the management tool does not provide the capability to configure "USB file transfer", there is NO finding because the default setting cannot be changed.

This validation procedure is performed on both the management tool Administration Console and the Samsung Android device.

On the management tool, in the device restrictions section, verify that "USB file transfer" has been set to "Disallow".

On the PC, browse the mounted Samsung Android device and verify that it does not display any folders or files.

If on the management tool "USB file transfer" is not set to "Disallow", or the PC can mount and browse folders and files on the Samsung Android device, this is a finding.

Check Content Reference

M

Target Key

3613

Comments