STIGQter STIGQter: STIG Summary: Google Android 11 COPE Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 11 Sept 2020:

Google Android 11 must be configured to generate audit records for the following auditable events: detected integrity violations.

DISA Rule

SV-228625r505874_rule

Vulnerability Number

V-228625

Group Title

PP-MDF-301420

Rule Version

GOOG-11-006100

Severity

CAT III

CCI(s)

Weight

10

Fix Recommendation

Configure the Google Android 11 device to generate audit records for the following auditable events: detected integrity violations.

On the EMM console:
1. Open "Device owner management" section.
2. Toggle "Enable security logging" to On.

Check Contents

Review Google Android device configuration settings to determine if the mobile device is configured to generate audit records for the following auditable events: detected integrity violations.

This validation procedure is performed only on the EMM Administration Console.

On the EMM console:
1. Open "Device owner management" section.
2. Verify that "Enable security logging" is toggled to On.

If the EMM console device policy is not set to enable security logging, this is a finding.

Vulnerability Number

V-228625

Documentable

False

Rule Version

GOOG-11-006100

Severity Override Guidance

Review Google Android device configuration settings to determine if the mobile device is configured to generate audit records for the following auditable events: detected integrity violations.

This validation procedure is performed only on the EMM Administration Console.

On the EMM console:
1. Open "Device owner management" section.
2. Verify that "Enable security logging" is toggled to On.

If the EMM console device policy is not set to enable security logging, this is a finding.

Check Content Reference

M

Target Key

4229

Comments