UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The Google Android 13 must allow only the administrator (EMM) to install/remove DOD root and intermediate PKI certificates.


Overview

Finding ID Version Rule ID IA Controls Severity
V-254762 GOOG-13-012300 SV-254762r862485_rule Medium
Description
DOD root and intermediate PKI certificates are used to verify the authenticity of PKI certificates of users and web services. If the user is allowed to remove root and intermediate certificates, the user could allow an adversary to falsely sign a certificate in such a way that it could not be detected. Restricting the ability to remove DOD root and intermediate PKI certificates to the Administrator mitigates this risk. SFR ID: FMT_MOF_EXT.1.2 #47
STIG Date
Google Android 13 COBO Security Technical Implementation Guide 2022-10-13

Details

Check Text ( C-58373r862483_chk )
Review the device configuration to confirm that the user is unable to remove DOD root and intermediate PKI certificates.

On the EMM console:
1. Open "Set user restrictions".
2. Verify "Disallow config credentials" is toggled to "ON".

On the Google Android 13 device:
1. Open Settings.
2. Tap "Security".
3. Tap "Advanced".
4. Tap "Encryption & credentials".
5. Tap "Trusted credentials".
6. Verify the user is unable to untrust or remove any work certificates.

If on the Google Android 13 device the user is able to remove certificates, this is a finding.
Fix Text (F-58319r862484_fix)
Configure Google Android 13 device to prevent a user from removing DOD root and intermediate PKI certificates.

On the EMM console:
1. Open "Set user restrictions".
2. Toggle "Disallow config credentials" to "ON".