UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The Google Android 13 BYOAD must be configured so that the work profile is removed if the device is no longer receiving security or software updates.


Overview

Finding ID Version Rule ID IA Controls Severity
V-258468 GOOG-13-801000 SV-258468r929220_rule Medium
Description
When a BYOAD is out of compliance, DOD data and apps must be removed to protect against compromise of sensitive DOD information. Reference: DOD policy "Use of Non-Government Mobile Devices" (3.b.(1)ii). SFR ID: FMT_SMF_EXT.1.1 #47
STIG Date
Google Android 13 MDFPP 3.3 BYOAD Security Technical Implementation Guide 2023-09-19

Details

Check Text ( C-62208r929218_chk )
Verify the EMM system is configured to wipe the work profile if the Google Android 13 BYOAD is no longer receiving security or software updates. The exact procedure will depend on the EMM system used at the site.

If the EMM system is not configured to wipe the work profile if the Google Android 13 BYOAD is no longer receiving security or software updates, this is a finding.
Fix Text (F-62117r929219_fix)
Configure the EMM system so the work profile is removed if the Google Android 13 BYOAD is no longer receiving security or software updates. The exact procedure will depend on the EMM system used at the site.