STIGQter STIGQter: STIG Summary: Google Android 11 COPE Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 11 Sept 2020:

Google Android 11 must be configured to enforce an application installation policy by specifying one or more authorized application repositories, including [selection: DoD-approved commercial app repository, EMM server, mobile application store].

DISA Rule

SV-228610r505829_rule

Vulnerability Number

V-228610

Group Title

PP-MDF-301080

Rule Version

GOOG-11-000800

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the Google Android 11 device to disable unauthorized application repositories.

On the EMM Console:
1. Open "Set user restrictions".
2. Toggle "Disallow install unknown sources" to On.
3. Toggle "Disallow installs from unknown sources globally" to On.

Check Contents

Review Google Android device configuration settings to determine if the mobile device has only approved application repositories (DoD-approved commercial app repository, EMM server, and/or mobile application store).

This validation procedure is performed on both the EMM Administration Console and the Android 11 device.

On the EMM Console:
1. Open "Set user restrictions".
2. Verify that "Disallow install unknown sources" is toggled to On.
3. Verify that "Disallow installs from unknown sources globally" is toggled to On.

On the Google device, do the following:
1. Open Settings >> Apps and notifications >> Advanced >> Special app access.
2. Open Install unknown apps.
3. Ensure the list of apps is blank or if an app is on the list, "Disabled by admin" is listed under the app name.

If the EMM console device policy is not set to allow connections to only approved application repositories or on the Android 11 device, the device policy is not set to allow connections to only approved application repositories, this is a finding.

Vulnerability Number

V-228610

Documentable

False

Rule Version

GOOG-11-000800

Severity Override Guidance

Review Google Android device configuration settings to determine if the mobile device has only approved application repositories (DoD-approved commercial app repository, EMM server, and/or mobile application store).

This validation procedure is performed on both the EMM Administration Console and the Android 11 device.

On the EMM Console:
1. Open "Set user restrictions".
2. Verify that "Disallow install unknown sources" is toggled to On.
3. Verify that "Disallow installs from unknown sources globally" is toggled to On.

On the Google device, do the following:
1. Open Settings >> Apps and notifications >> Advanced >> Special app access.
2. Open Install unknown apps.
3. Ensure the list of apps is blank or if an app is on the list, "Disabled by admin" is listed under the app name.

If the EMM console device policy is not set to allow connections to only approved application repositories or on the Android 11 device, the device policy is not set to allow connections to only approved application repositories, this is a finding.

Check Content Reference

M

Target Key

4229

Comments