UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Google Android 13 COBO Security Technical Implementation Guide


Overview

Date Finding Count (31)
2024-06-05 CAT I (High): 1 CAT II (Med): 25 CAT III (Low): 5
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Available Profiles



Findings (MAC I - Mission Critical Public)

Finding ID Severity Title
V-254758 High Android 13 devices must have the latest available Google Android 13 operating system installed.
V-254736 Medium Google Android 13 must be configured to enable a screen-lock policy that will lock the display after a period of inactivity.
V-254737 Medium Google Android 13 must be configured to lock the display after 15 minutes (or less) of inactivity.
V-254734 Medium Google Android 13 must be configured to enforce a minimum password length of six characters.
V-254735 Medium Google Android 13 must be configured to not allow passwords that include more than four repeating or sequential characters.
V-254733 Medium Google Android 13 must be configured to enable audit logging.
V-254738 Medium Google Android 13 must be configured to not allow more than 10 consecutive failed authentication attempts.
V-254739 Medium Google Android 13 must be configured to enforce an application installation policy by specifying one or more authorized application repositories, including [selection: DOD-approved commercial app repository, MDM server, mobile application store].
V-254761 Medium Google Android 13 must be configured to disable all data signaling over [assignment: list of externally accessible hardware ports (for example, USB)].
V-254762 Medium The Google Android 13 must allow only the administrator (EMM) to install/remove DOD root and intermediate PKI certificates.
V-254747 Medium Google Android 13 must be configured to disable USB mass storage mode.
V-254746 Medium Google Android 13 must be configured to generate audit records for the following auditable events: Detected integrity violations.
V-254744 Medium Google Android 13 must be configured to disable developer modes.
V-254743 Medium Google Android 13 must be configured to disable trust agents.
V-254742 Medium Google Android 13 must be configured to not display the following (work profile) notifications when the device is locked: [selection: a. email notifications b. calendar appointments c. contact associated with phone call notification d. text message notification e. other application-based notifications f. all notifications].
V-254741 Medium Google Android 13 allowlist must be configured to not include applications with the following characteristics: 1. Back up mobile device (MD) data to non-DOD cloud servers (including user and application access to cloud backup services); 2. Transmit MD diagnostic data to non-DOD servers; 3. Voice assistant application if available when MD is locked; 4. Voice dialing application if available when MD is locked; 5. Allows synchronization of data or applications between devices associated with user; and 6. Allows unencrypted (or encrypted but not FIPS 140-2 validated) data sharing with other MDs or printers.
V-254740 Medium Google Android 13 must be configured to enforce an application installation policy by specifying an application allowlist that restricts applications by the following characteristics: [selection: list of digital signatures, cryptographic hash values, names, application version].
V-254749 Medium Google Android 13 must be configured to not allow backup of [all applications, configuration data] to remote systems.
V-254748 Medium Google Android 13 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.
V-254754 Medium Google Android 13 must be configured to enforce that Wi-Fi Sharing is disabled.
V-254755 Medium Google Android 13 must have the DOD root and intermediate PKI certificates installed.
V-254756 Medium The Google Android 13 work profile must be configured to enforce the system application disable list.
V-254757 Medium Google Android 13 must be configured to disallow configuration of date and time.
V-254750 Medium Google Android 13 must be configured to disable multiuser modes.
V-254752 Medium Google Android 13 must be configured to disable ad hoc wireless client-to-client connection capability.
V-254753 Medium Google Android 13 users must complete required training.
V-254760 Low Android 13 devices must be configured to enable Common Criteria Mode (CC Mode).
V-254763 Low Google Android 13 must allow only the Administrator (MDM) to perform the following management function: Disable Phone Hub.
V-254745 Low Google Android 13 must be configured to display the DOD advisory warning message at startup or each time the user unlocks the device.
V-254759 Low Android 13 devices must be configured to disable the use of third-party keyboards.
V-254751 Low Google Android 13 must be configured to disable Bluetooth or configured via User Based Enforcement (UBE) to allow Bluetooth for only Headset Profile (HSP), Hands-Free Profile (HFP), and Serial Port Profile (SPP).