STIGQter STIGQter: STIG Summary: Samsung Android OS 7 with Knox 2.x Security Technical Implementation Guide Version: 1 Release: 6 Benchmark Date: 25 Oct 2019: The Samsung Android 7 with Knox must implement the management setting: Configure application disable list.

DISA Rule

SV-91315r1_rule

Vulnerability Number

V-76619

Group Title

PP-MDF-991000

Rule Version

KNOX-07-018400

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the Samsung Android 7 with Knox to enforce application disabled list.

On the MDM console, add all pre-installed applications that are not DoD-approved to the "Application disable list" setting in the "Android Applications" rule.

Note: Refer to the Supplemental document for additional information.

Note: Include Samsung Accounts on the list.

Check Contents

Note, this requirement is Not Applicable if the AO has approved unmanaged personal space/container (COPE use case). The site must have an AO signed document showing the AO has assumed the risk for using an unmanaged personal container.

Review Samsung Android 7 with Knox Container configuration settings to determine if the mobile device is enforcing application disabled list.

This validation procedure is performed on both the MDM Administration Console and the Samsung Android 7 with Knox device.

On the MDM console, do the following:
1. Ask the MDM administrator to display the "Application disable list" setting in the "Android Applications" rule.
2. Verify the list contains all core and pre-installed applications not approved for DoD use by the Authorizing Official (AO).

Note: Refer to the Supplemental document for additional information.

On the Samsung Android 7 with Knox device, attempt to launch an application that is included on the disable list.

Note: This application should not be visible.

If the MDM console "Application disable list" is not set to contain all core and pre-installed applications not approved by DoD or on the Samsung Android 7 with Knox device, the user is able to successfully launch an application on this list, this is a finding.

Vulnerability Number

V-76619

Documentable

False

Rule Version

KNOX-07-018400

Severity Override Guidance

Note, this requirement is Not Applicable if the AO has approved unmanaged personal space/container (COPE use case). The site must have an AO signed document showing the AO has assumed the risk for using an unmanaged personal container.

Review Samsung Android 7 with Knox Container configuration settings to determine if the mobile device is enforcing application disabled list.

This validation procedure is performed on both the MDM Administration Console and the Samsung Android 7 with Knox device.

On the MDM console, do the following:
1. Ask the MDM administrator to display the "Application disable list" setting in the "Android Applications" rule.
2. Verify the list contains all core and pre-installed applications not approved for DoD use by the Authorizing Official (AO).

Note: Refer to the Supplemental document for additional information.

On the Samsung Android 7 with Knox device, attempt to launch an application that is included on the disable list.

Note: This application should not be visible.

If the MDM console "Application disable list" is not set to contain all core and pre-installed applications not approved by DoD or on the Samsung Android 7 with Knox device, the user is able to successfully launch an application on this list, this is a finding.

Check Content Reference

M

Target Key

3253

Comments