UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Google Android 11 COPE Security Technical Implementation Guide


Overview

Date Finding Count (34)
2020-09-18 CAT I (High): 1 CAT II (Med): 26 CAT III (Low): 7
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Available Profiles



Findings (MAC II - Mission Support Classified)

Finding ID Severity Title
V-228636 High Google Android 11 devices must have the latest available Google Android 11 operating system installed.
V-228616 Medium Google Android 11 must be configured to disable developer modes.
V-228614 Medium Google Android 11 must be configured to not display the following (work profile) notifications when the device is locked: [selection:- email notifications - calendar appointments - contact associated with phone call notification - text message notification- other application-based notifications- all notifications].
V-228615 Medium Google Android 11 must be configured to disable trust agents. NOTE: This requirement is not applicable (NA) for specific biometric authentication factors included in the product's Common Criteria evaluation.
V-228612 Medium Google Android 11 allow list must be configured to not include applications with the following characteristics: - back up MD data to non-DoD cloud servers (including user and application access to cloud backup services); - transmit MD diagnostic data to non-DoD servers; - voice assistant application if available when MD is locked; - voice dialing application if available when MD is locked; - allows synchronization of data or applications between devices associated with user; and - allows unencrypted (or encrypted but not FIPS 140-2 validated) data sharing with other MDs or printers.
V-228610 Medium Google Android 11 must be configured to enforce an application installation policy by specifying one or more authorized application repositories, including [selection: DoD-approved commercial app repository, EMM server, mobile application store].
V-228611 Medium Google Android 11 must be configured to enforce an application installation policy by specifying an application allow list that restricts applications by the following characteristics: [selection: list of digital signatures, cryptographic hash values, names, application version].
V-228632 Medium Google Android 11 must be provisioned as a fully managed device and configured to create a work profile.
V-228618 Medium Google Android 11 must be configured to disable USB mass storage mode.
V-228619 Medium Google Android 11 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.
V-228633 Medium Google Android 11 work profile must be configured to disable automatic completion of workspace Internet browser text input.
V-228634 Medium Google Android 11 Work Profile must be configured to disable the autofill services.
V-228635 Medium Google Android 11 must be configured to disallow configuration of date and time.
V-228608 Medium Google Android 11 must be configured to lock the display after 15 minutes (or less) of inactivity.
V-228630 Medium The Google Android 11 Work Profile must be configured to prevent users from adding personal email accounts to the work email app.
V-228605 Medium Google Android 11 must be configured to enforce a minimum password length of six characters.
V-228607 Medium Google Android 11 must be configured to enable a screen-lock policy that will lock the display after a period of inactivity.
V-228606 Medium Google Android 11 must be configured to not allow passwords that include more than two repeating or sequential characters.
V-228622 Medium Google Android 11 must be configured to disable multi-user modes.
V-228621 Medium Google Android 11 must be configured to disable exceptions to the access control policy that prevents application processes from accessing all data stored by other application processes.
V-228620 Medium Google Android 11 must be configured to not allow backup of all applications and configuration data to remote systems.
V-228627 Medium Google Android 11 must be configured to enforce that Wi-Fi Sharing is disabled.
V-228626 Medium Google Android 11 users must complete required training.
V-228624 Medium Google Android 11 must be configured to enable audit logging.
V-228629 Medium Google Android 11 must allow only the administrator (EMM) to install/remove DoD root and intermediate PKI certificates.
V-228628 Medium Google Android 11 must have the DoD root and intermediate PKI certificates installed.
V-228631 Medium Google Android 11 work profile must be configured to enforce the system application disable list.
V-228617 Low Google Android 11 must be configured to display the DoD advisory warning message at start-up or each time the user unlocks the device.
V-228613 Low Google Android 11 must be configured to disable Bluetooth or configured via User Based Enforcement (UBE) to allow Bluetooth for only Headset Profile (HSP), HandsFree Profile (HFP), and Serial Port Profile (SPP).
V-228638 Low Google Android 11 devices must be configured to enable Common Criteria Mode (CC Mode).
V-228637 Low Google Android 11 devices must be configured to disable the use of third-party keyboards.
V-228609 Low Google Android 11 must be configured to not allow more than ten consecutive failed authentication attempts.
V-228623 Low Google Android 11 must allow only the Administrator (EMM) to perform the following management function: enable/disable location services.
V-228625 Low Google Android 11 must be configured to generate audit records for the following auditable events: detected integrity violations.