UCF STIG Viewer Logo

Google Android 10.x Security Technical Implementation Guide


Overview

Date Finding Count (32)
2019-12-18 CAT I (High): 1 CAT II (Med): 26 CAT III (Low): 5
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Available Profiles



Findings (MAC III - Administrative Public)

Finding ID Severity Title
V-98981 High Google Android 10 devices must have the latest available Google Android 10 operating system installed.
V-98955 Medium Google Android 10 must be configured to disable multi-user modes.
V-98941 Medium Google Android 10 must be configured to disable trust agents. Note: This requirement is not applicable (NA) for specific biometric authentication factors included in the products Common Criteria evaluation.
V-98947 Medium Google Android 10 must be configured to disable USB mass storage mode.
V-98925 Medium Google Android 10 must be configured to enable a screen-lock policy that will lock the display after a period of inactivity.
V-98927 Medium Google Android 10 must be configured to lock the display after 15 minutes (or less) of inactivity.
V-98949 Medium Google Android 10 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.
V-98969 Medium The Google Android 10 Work Profile must be configured to prevent users from adding personal email accounts to the work email app.
V-98965 Medium Google Android 10 must have the DoD root and intermediate PKI certificates installed.
V-98967 Medium Google Android 10 must allow only the administrator (MDM) to install/remove DoD root and intermediate PKI certificates.
V-98961 Medium Google Android 10 users must complete required training.
V-98963 Medium Google Android 10 must be configured to enforce that Wi-Fi Sharing is disabled.
V-98957 Medium Google Android 10 must be configured to enable audit logging.
V-98933 Medium Google Android 10 must be configured to enforce an application installation policy by specifying an application whitelist that restricts applications by the following characteristics: [selection: list of digital signatures, cryptographic hash values, names, application version].
V-98931 Medium Google Android 10 must be configured to enforce an application installation policy by specifying one or more authorized application repositories, including [selection: DoD-approved commercial app repository, MDM server, mobile application store].
V-98935 Medium Google Android 10 whitelist must be configured to not include applications with the following characteristics: - back up MD data to non-DoD cloud servers (including user and application access to cloud backup services); - transmit MD diagnostic data to non-DoD servers; - voice assistant application if available when MD is locked; - voice dialing application if available when MD is locked; - allows synchronization of data or applications between devices associated with user; and - allows unencrypted (or encrypted but not FIPS 140-2 validated) data sharing with other MDs or printers.
V-98939 Medium Google Android 10 must be configured to not display the following (work profile) notifications when the device is locked: [selection: - email notifications - calendar appointments - contact associated with phone call notification - text message notification - other application-based notifications - all notifications].
V-98979 Medium Google Android 10 must be configured to disallow configuration of date and time.
V-98921 Medium Google Android 10 must be configured to enforce a minimum password length of six characters.
V-98951 Medium Google Android 10 must be configured to not allow backup of all applications and configuration data to remote systems.
V-98953 Medium Google Android 10 must be configured to disable exceptions to the access control policy that prevents application processes from accessing all data stored by other application processes.
V-98973 Medium Google Android 10 must be provisioned as a fully managed device and configured to create a work profile.
V-98971 Medium Google Android 10 work profile must be configured to enforce the system application disable list.
V-98977 Medium Google Android 10 Work Profile must be configured to disable the autofill services.
V-98923 Medium Google Android 10 must be configured to not allow passwords that include more than two repeating or sequential characters.
V-98975 Medium Google Android 10 work profile must be configured to disable automatic completion of work space Internet browser text input.
V-98943 Medium Google Android 10 must be configured to disable developer modes.
V-98945 Low Google Android 10 must be configured to display the DoD advisory warning message at start-up or each time the user unlocks the device.
V-98929 Low Google Android 10 must be configured to not allow more than 10 consecutive failed authentication attempts.
V-98983 Low Google Android 10 devices must be configured to disable the use of third-party keyboards.
V-98937 Low Google Android 10 must be configured to disable Bluetooth or configured via User Based Enforcement (UBE) to allow Bluetooth for only Headset Profile (HSP), HandsFree Profile (HFP), and Serial Port Profile (SPP).
V-98959 Low Google Android 10 must be configured to generate audit records for the following auditable events: detected integrity violations.