STIGQter STIGQter: STIG Summary: Motorola Android 9.x COBO Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 14 Oct 2020:

The Motorola Android Pie must be configured to enforce an application installation policy by specifying one or more authorized application repositories, including [selection: DoD-approved commercial app repository, MDM server, mobile application store].

DISA Rule

SV-230115r569707_rule

Vulnerability Number

V-230115

Group Title

GOOG-09-000800

Rule Version

MOTO-09-000800

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the Motorola Android device to disable unauthorized application repositories.

On the MDM console:
1. Open Restrictions section.
2. Set Allow "Google Play" (Uses only Managed Google Play).
3. Set Disallow "Install unknown sources".

Check Contents

Review Motorola Android device configuration settings to determine if the mobile device has only approved application repositories (DoD-approved commercial app repository, MDM server, and/or mobile application store).

This validation procedure is performed on both the MDM Administration Console and the Android Pie device.

On the MDM console:
1. Open Restrictions section.
2. Set Allow "Google Play" (Uses only Managed Google Play).
3. Verify that Disallow is set for "Install unknown sources".

On the Android Pie device:
1. Open Settings >> Apps and notifications >> Advanced >> Special app access.
2. Open "Install unknown apps".
3. Verify the list of apps is blank or if an app is on the list, "Disabled by admin" is listed under the app name.

If the MDM console device policy is not set to allow connections to only approved application repositories, or on the Android Pie device, the device policy is not set to allow connections to only approved application repositories, this is a finding.

Vulnerability Number

V-230115

Documentable

False

Rule Version

MOTO-09-000800

Severity Override Guidance

Review Motorola Android device configuration settings to determine if the mobile device has only approved application repositories (DoD-approved commercial app repository, MDM server, and/or mobile application store).

This validation procedure is performed on both the MDM Administration Console and the Android Pie device.

On the MDM console:
1. Open Restrictions section.
2. Set Allow "Google Play" (Uses only Managed Google Play).
3. Verify that Disallow is set for "Install unknown sources".

On the Android Pie device:
1. Open Settings >> Apps and notifications >> Advanced >> Special app access.
2. Open "Install unknown apps".
3. Verify the list of apps is blank or if an app is on the list, "Disabled by admin" is listed under the app name.

If the MDM console device policy is not set to allow connections to only approved application repositories, or on the Android Pie device, the device policy is not set to allow connections to only approved application repositories, this is a finding.

Check Content Reference

M

Target Key

5234

Comments