STIGQter STIGQter: STIG Summary: Google Android 11 COBO Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 11 Sep 2020:

Google Android 11 must be configured to generate audit records for the following auditable events: detected integrity violations.

DISA Rule

SV-228593r510289_rule

Vulnerability Number

V-228593

Group Title

PP-MDF-301420

Rule Version

GOOG-11-006100

Severity

CAT III

CCI(s)

Weight

10

Fix Recommendation

Configure the Google Android 11 device to generate audit records for the following auditable events: detected integrity violations.

On the EMM console:
1. Open "Device owner management" section.
2. Toggle "Enable security logging" to On.

Check Contents

Review Google Android device configuration settings to determine if the mobile device is configured to generate audit records for the following auditable events: detected integrity violations.

This validation procedure is performed only on the EMM Administration Console.

On the EMM console:
1. Open "Device owner management" section.
2. Verify that "Enable security logging" is toggled to On.

If the EMM console device policy is not set to enable security logging, this is a finding.

Vulnerability Number

V-228593

Documentable

False

Rule Version

GOOG-11-006100

Severity Override Guidance

Review Google Android device configuration settings to determine if the mobile device is configured to generate audit records for the following auditable events: detected integrity violations.

This validation procedure is performed only on the EMM Administration Console.

On the EMM console:
1. Open "Device owner management" section.
2. Verify that "Enable security logging" is toggled to On.

If the EMM console device policy is not set to enable security logging, this is a finding.

Check Content Reference

M

Target Key

4228

Comments