UCF STIG Viewer Logo

Google Android 12 work profile must be configured to enforce the system application disable list.


Overview

Finding ID Version Rule ID IA Controls Severity
V-250443 GOOG-12-010200 SV-250443r802687_rule Medium
Description
The system application disable list controls user access to/execution of all core and preinstalled applications. Core application: Any application integrated into Google Android 12 by Google. Preinstalled application: Additional noncore applications included in the Google Android 12 build by Google or the wireless carrier. Some system applications can compromise DoD data or upload users' information to non-DoD-approved servers. A user must be blocked from using such applications that exhibit behavior that can result in compromise of DoD data or DoD user information. The site administrator must analyze all preinstalled applications on the device and disable all applications not approved for DoD use by configuring the system application disable list. SFR ID: FMT_SMF_EXT.1.1 #47
STIG Date
Google Android 12 COPE Security Technical Implementation Guide 2021-09-17

Details

Check Text ( C-53878r802685_chk )
Review the managed Google Android 12 Work Profile configuration settings to confirm the system application disable list is enforced. This setting is enforced by default. Verify only approved system apps have been placed on the core allowlist.

This procedure is performed on the EMM Administrator console.

Review the system app allowlist and verify only approved apps are on the list.

COBO:

1. Open "Apps management" section.
2. Select "Hide apps".
3. Verify that package names of apps are listed.

COPE:

1. Open "Apps management" section.
2. Select "Hide apps on parent".
3. Verify that package names of apps are listed.

If on the EMM console the system app allowlist contains unapproved core apps, this is a finding.
Fix Text (F-53832r802686_fix)
Configure the Google Android 12 device to enforce the system application disable list.

The required configuration is the default configuration when the device is enrolled. If the device configuration is changed, use the following procedure to bring the device back into compliance:

On the EMM console:

COBO:

1. Open "Apps management" section.
2. Select "Hide apps".
3. Enter package names of apps to hide.

COPE:

1. Open "Apps management" section.
2. Select "Hide apps on parent".
3. Enter package names of apps to hide.

Configure a list of approved Google core and preinstalled apps in the core app allowlist.