UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Google Android 11 COBO Security Technical Implementation Guide


Overview

Date Finding Count (31)
2020-09-18 CAT I (High): 1 CAT II (Med): 23 CAT III (Low): 7
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Available Profiles



Findings (MAC III - Administrative Sensitive)

Finding ID Severity Title
V-228602 High Google Android 11 devices must have the latest available Google Android 11 operating system installed.
V-228577 Medium Google Android 11 must be configured to lock the display after 15 minutes (or less) of inactivity.
V-228576 Medium Google Android 11 must be configured to enable a screen-lock policy that will lock the display after a period of inactivity.
V-228575 Medium Google Android 11 must be configured to not allow passwords that include more than two repeating or sequential characters.
V-228574 Medium Google Android 11 must be configured to enforce a minimum password length of six characters.
V-228595 Medium Google Android 11 must be configured to enforce that Wi-Fi Sharing is disabled.
V-228594 Medium Google Android 11 users must complete required training.
V-228579 Medium Google Android 11 must be configured to enforce an application installation policy by specifying one or more authorized application repositories, including [selection: DoD-approved commercial app repository, EMM server, mobile application store].
V-228596 Medium Google Android 11 must have the DoD root and intermediate PKI certificates installed.
V-228590 Medium Google Android 11 must be configured to disable multi-user modes.
V-228592 Medium Google Android 11 must be configured to enable audit logging.
V-228589 Medium Google Android 11 must be configured to not allow backup of all applications and configuration data to remote systems.
V-228599 Medium Google Android 11 work profile must be configured to disable automatic completion of workspace Internet browser text input.
V-228598 Medium Google Android 11 work profile must be configured to enforce the system application disable list.
V-228601 Medium Google Android 11 must be configured to disallow configuration of date and time.
V-228600 Medium Google Android 11 Work Profile must be configured to disable the autofill services.
V-228597 Medium Google Android 11 must allow only the administrator (EMM) to install/remove DoD root and intermediate PKI certificates.
V-228588 Medium Google Android 11 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.
V-228583 Medium Google Android 11 must be configured to not display the following (work profile) notifications when the device is locked: [selection:- email notifications - calendar appointments - contact associated with phone call notification - text message notification- other application-based notifications- all notifications].
V-228580 Medium Google Android 11 must be configured to enforce an application installation policy by specifying an application allow list that restricts applications by the following characteristics: [selection: list of digital signatures, cryptographic hash values, names, application version].
V-228581 Medium Google Android 11 allow list must be configured to not include applications with the following characteristics: - back up MD data to non-DoD cloud servers (including user and application access to cloud backup services); - transmit MD diagnostic data to non-DoD servers; - voice assistant application if available when MD is locked; - voice dialing application if available when MD is locked; - allows synchronization of data or applications between devices associated with user; and - allows unencrypted (or encrypted but not FIPS 140-2 validated) data sharing with other MDs or printers.
V-228587 Medium Google Android 11 must be configured to disable USB mass storage mode.
V-228584 Medium Google Android 11 must be configured to disable trust agents. NOTE: This requirement is not applicable (NA) for specific biometric authentication factors included in the product's Common Criteria evaluation.
V-228585 Medium Google Android 11 must be configured to disable developer modes.
V-228591 Low Google Android 11 must allow only the Administrator (EMM) to perform the following management function: enable/disable location services.
V-228593 Low Google Android 11 must be configured to generate audit records for the following auditable events: detected integrity violations.
V-228603 Low Google Android 11 devices must be configured to disable the use of third-party keyboards.
V-228578 Low Google Android 11 must be configured to not allow more than ten consecutive failed authentication attempts.
V-228582 Low Google Android 11 must be configured to disable Bluetooth or configured via User Based Enforcement (UBE) to allow Bluetooth for only Headset Profile (HSP), HandsFree Profile (HFP), and Serial Port Profile (SPP).
V-228586 Low Google Android 11 must be configured to display the DoD advisory warning message at start-up or each time the user unlocks the device.
V-228604 Low Google Android 11 devices must be configured to enable Common Criteria Mode (CC Mode).