STIGQter STIGQter: STIG Summary: Samsung Android OS 7 with Knox 2.x Security Technical Implementation Guide Version: 1 Release: 6 Benchmark Date: 25 Oct 2019: The Samsung Android 7 with Knox whitelist must be configured to not include applications with the following characteristics: - Allows unencrypted (or encrypted but not FIPS 140-2 validated) data sharing with other MDs or printers.

DISA Rule

SV-91235r1_rule

Vulnerability Number

V-76539

Group Title

PP-MDF-301100

Rule Version

KNOX-07-002200

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the Samsung Android 7 with Knox application disable list to include applications with the following characteristics:

- Allows unencrypted (or encrypted but not FIPS 140-2 validated) data sharing with other MDs or printers.

On the MDM console, add all applications which allow unencrypted (or encrypted but not FIPS 140-2 validated) data sharing with other MDs or printers to the "Application disable list" setting in the "Android Applications" rule.

Note: Refer to the Supplemental document for additional information.

Check Contents

This requirement is Not Applicable if the AO has approved unmanaged personal space/container (COPE use case). The site must have an AO signed document showing the AO has assumed the risk for using an unmanaged personal container.

Review Samsung Android 7 with Knox configuration settings to determine if the mobile device has an application disable list configured to include applications with the following characteristics:

- Allows unencrypted (or encrypted but not FIPS 140-2 validated) data sharing with other MDs or printers.

This validation procedure is performed only on the MDM Administration Console.

On the MDM console, do the following:
1. Ask the MDM administrator to display the "Application disable list" setting in the "Android Application" rule.
2. Verify the list contains all applications which allow unencrypted (or encrypted but not FIPS 140-2 validated) data sharing with other MDs or printers.

If the MDM console "Application disable list" is not properly configured or on the Samsung Android 7 with Knox device, the user is able to launch the applications on the list, this is a finding.

Note: Refer to the Supplemental document for additional information.

Vulnerability Number

V-76539

Documentable

False

Rule Version

KNOX-07-002200

Severity Override Guidance

This requirement is Not Applicable if the AO has approved unmanaged personal space/container (COPE use case). The site must have an AO signed document showing the AO has assumed the risk for using an unmanaged personal container.

Review Samsung Android 7 with Knox configuration settings to determine if the mobile device has an application disable list configured to include applications with the following characteristics:

- Allows unencrypted (or encrypted but not FIPS 140-2 validated) data sharing with other MDs or printers.

This validation procedure is performed only on the MDM Administration Console.

On the MDM console, do the following:
1. Ask the MDM administrator to display the "Application disable list" setting in the "Android Application" rule.
2. Verify the list contains all applications which allow unencrypted (or encrypted but not FIPS 140-2 validated) data sharing with other MDs or printers.

If the MDM console "Application disable list" is not properly configured or on the Samsung Android 7 with Knox device, the user is able to launch the applications on the list, this is a finding.

Note: Refer to the Supplemental document for additional information.

Check Content Reference

M

Target Key

3253

Comments