UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Google Android 11 must be configured to generate audit records for the following auditable events: detected integrity violations.


Overview

Finding ID Version Rule ID IA Controls Severity
V-228625 GOOG-11-006100 SV-228625r505874_rule Low
Description
Audit logs enable monitoring of security-relevant events and subsequent forensics when breaches occur. They help identify attacks so that breaches can either be prevented or limited in their scope. They facilitate analysis to improve performance and security. The Requirement Statement lists key events that the system must generate an audit record for. Application note: Requirement applies only to integrity violation detections that can be logged by the audit logging component. SFR ID: FMT_SMF_EXT.1.1 #37
STIG Date
Google Android 11 COPE Security Technical Implementation Guide 2020-09-18

Details

Check Text ( C-30860r505872_chk )
Review Google Android device configuration settings to determine if the mobile device is configured to generate audit records for the following auditable events: detected integrity violations.

This validation procedure is performed only on the EMM Administration Console.

On the EMM console:
1. Open "Device owner management" section.
2. Verify that "Enable security logging" is toggled to On.

If the EMM console device policy is not set to enable security logging, this is a finding.
Fix Text (F-30837r505873_fix)
Configure the Google Android 11 device to generate audit records for the following auditable events: detected integrity violations.

On the EMM console:
1. Open "Device owner management" section.
2. Toggle "Enable security logging" to On.