Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-254777 | GOOG-13-007800 | SV-254777r862713_rule | Medium |
Description |
---|
Audit logs enable monitoring of security-relevant events and subsequent forensics when breaches occur. They help identify attacks so that breaches can be prevented or limited in their scope. They facilitate analysis to improve performance and security. The Requirement Statement lists key events for which the system must generate an audit record. Note: This requirement applies only to integrity violation detections that can be logged by the audit logging component. SFR ID: FMT_SMF_EXT.1.1 #37 |
STIG | Date |
---|---|
Google Android 13 COPE Security Technical Implementation Guide | 2022-10-13 |
Check Text ( C-58388r862711_chk ) |
---|
Review managed Google Android 13 device configuration settings to determine if the mobile device is configured to generate audit records for the following auditable events: Detected integrity violations. This validation procedure is performed only on the EMM Administration Console. On the EMM console: COBO and COPE: 1. Open "Device owner management" section. 2. Verify that "Enable security logging" is toggled to "ON". If the EMM console device policy is not set to enable security logging, this is a finding. |
Fix Text (F-58334r862712_fix) |
---|
Configure the Google Android 13 device to generate audit records for the following auditable events: Detected integrity violations. On the EMM console: COBO and COPE: 1. Open "Device owner management" section. 2. Toggle "Enable security logging" to "ON". |