STIGQter STIGQter: STIG Summary: Google Android 11 COPE Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 11 Sept 2020:

Google Android 11 work profile must be configured to enforce the system application disable list.

DISA Rule

SV-228631r505892_rule

Vulnerability Number

V-228631

Group Title

PP-MDF-991000

Rule Version

GOOG-11-009400

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure Google Android 11 device Work to enforce the system application disable list.

The required configuration is the default configuration when the device is enrolled. If the device configuration is changed, use the following procedure to bring the device back into compliance:

On the EMM console:
1. Open "Apps management" section.
2. Select "Hide apps on parent".
3. Enter package names of apps.

Configure a list of approved Google core and preinstalled apps in the core app allow list.

Check Contents

Review the Google Android 11 Work Profile configuration settings to confirm the system application disable list is enforced. This setting is enforced by default. Verify only approved system apps have been placed on the core allow list.

This procedure is performed on the EMM Administrator console.

Review the system app allow list and verify only approved apps are on the list.

1. Open "Apps management" section.
2. Select "Hide apps on parent".
3. Verify package names of apps.

If on the EMM console the system app allow list contains unapproved core apps, this is a finding.

Vulnerability Number

V-228631

Documentable

False

Rule Version

GOOG-11-009400

Severity Override Guidance

Review the Google Android 11 Work Profile configuration settings to confirm the system application disable list is enforced. This setting is enforced by default. Verify only approved system apps have been placed on the core allow list.

This procedure is performed on the EMM Administrator console.

Review the system app allow list and verify only approved apps are on the list.

1. Open "Apps management" section.
2. Select "Hide apps on parent".
3. Verify package names of apps.

If on the EMM console the system app allow list contains unapproved core apps, this is a finding.

Check Content Reference

M

Target Key

4229

Comments