STIGQter STIGQter: STIG Summary: Samsung Android OS 10 with Knox 3.x Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 20 Mar 2020:

Samsung Android Personal Environment must be configured to enforce the system application disable list.

DISA Rule

SV-109069r1_rule

Vulnerability Number

V-99965

Group Title

PP-MDF-991000

Rule Version

KNOX-10-009200

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the Samsung Android device to enforce the system application disable list. Refer to the “System Apps for disablement" table in the Supplemental document.

This guidance is only for the Personal Environment of a COPE deployment.

Do one of the following:
- Method #1: KPE(AE) enrollment
- Method #2: KPE system app disable list

****

Method #1: KPE(AE) enrollment

The required configuration is the default configuration when the device is enrolled as a KPE(AE) deployment.

If the device configuration is changed, use the following procedure to bring the device back into compliance:

On the management tool, configure a list of approved Google core and preinstalled apps in the core app white list.

****

Method #2: KPE system app disable list

On the management tool, in the Personal Environment KPE application section, add all non-AO-approved system app packages to the "system app disable list".

Check Contents

Review Samsung Android Personal Environment configuration settings to determine if the system application disable list is enforced.

This procedure is only for the Personal Environment of a COPE deployment.

Confirm if Method #1 or #2 is used at the Samsung device site and follow the appropriate procedure.

This validation procedure is performed on both the management tool Administration Console and the Samsung Android device.

****

Method #1: KPE(AE) enrollment

The required configuration is the default configuration when the device is enrolled as a KPE(AE) deployment.

On the management tool, verify that the "core app white list" contains only approved core and preinstalled apps.

On the Samsung Android device, review the Personal Environment apps and confirm that apps listed in the “System Apps for disablement" table in the Supplemental document are not present.

If on the management tool the "core app white list" contains non-approved core and preinstalled apps, or on the Samsung Android device non-approved apps are listed, this is a finding.

****

Method #2: KPE system app disable list

On the management tool, in the Personal Environment KPE application section, verify that the “system app disable list” contains all apps that have not been approved for DoD use by the Authorizing Official (AO).

On the Samsung Android device, review the Personal Environment apps and confirm that none of the apps listed in the “system app disable list” are present.

If on the management tool the "system app disable list" contains non-approved core and preinstalled apps, or on the Samsung Android device non-approved apps are listed, this is a finding.

Vulnerability Number

V-99965

Documentable

False

Rule Version

KNOX-10-009200

Severity Override Guidance

Review Samsung Android Personal Environment configuration settings to determine if the system application disable list is enforced.

This procedure is only for the Personal Environment of a COPE deployment.

Confirm if Method #1 or #2 is used at the Samsung device site and follow the appropriate procedure.

This validation procedure is performed on both the management tool Administration Console and the Samsung Android device.

****

Method #1: KPE(AE) enrollment

The required configuration is the default configuration when the device is enrolled as a KPE(AE) deployment.

On the management tool, verify that the "core app white list" contains only approved core and preinstalled apps.

On the Samsung Android device, review the Personal Environment apps and confirm that apps listed in the “System Apps for disablement" table in the Supplemental document are not present.

If on the management tool the "core app white list" contains non-approved core and preinstalled apps, or on the Samsung Android device non-approved apps are listed, this is a finding.

****

Method #2: KPE system app disable list

On the management tool, in the Personal Environment KPE application section, verify that the “system app disable list” contains all apps that have not been approved for DoD use by the Authorizing Official (AO).

On the Samsung Android device, review the Personal Environment apps and confirm that none of the apps listed in the “system app disable list” are present.

If on the management tool the "system app disable list" contains non-approved core and preinstalled apps, or on the Samsung Android device non-approved apps are listed, this is a finding.

Check Content Reference

M

Target Key

3613

Comments