UCF STIG Viewer Logo

Google Android 10 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.


Overview

Finding ID Version Rule ID IA Controls Severity
V-98949 GOOG-10-003700 SV-108053r1_rule Medium
Description
Data on mobile devices is protected by numerous mechanisms, including user authentication, access control, and cryptography. When the data is backed up to an external system (either locally connected or cloud-based), many if not all of these mechanisms are no longer present. This leaves the backed-up data vulnerable to attack. Disabling backup to external systems mitigates this risk. SFR ID: FMT_SMF_EXT.1.1 #40
STIG Date
Google Android 10.x Security Technical Implementation Guide 2019-12-18

Details

Check Text ( C-97789r1_chk )
Review Google Android device configuration settings to determine if the capability to back up to a locally connected system has been disabled.

This validation procedure is performed on both the MDM Administration Console and the Android 10 device.

On the MDM console, do the following:

1. Open User restrictions.
2. Select "Disallow usb file transfer".

On the Android 10 device, do the following:

1. Plug a USB cable into Android 10 device and connect to a non-DoD network-managed PC.
2. Go to Settings >> Connected devices >> USB.
3. Ensure “No data transfer” is selected.

If the MDM console device policy is not set to disable the capability to back up to a locally connected system or on the Android 10 device, the device policy is not set to disable the capability to back up to a locally connected system, this is a finding.
Fix Text (F-104625r1_fix)
Configure the Google Android device to disable backup to locally connected systems.

NOTE: On Restrictions, the backup features for Google are not in the framework.

On the MDM console:

1. Open User restrictions.
2. Select "Disallow usb file transfer".