UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The Google Android 14 must allow only the administrator (EMM) to install/remove DOD root and intermediate PKI certificates.


Overview

Finding ID Version Rule ID IA Controls Severity
V-258406 GOOG-14-012300 SV-258406r928243_rule Medium
Description
DOD root and intermediate PKI certificates are used to verify the authenticity of PKI certificates of users and web services. If the user is allowed to remove root and intermediate certificates, the user could allow an adversary to falsely sign a certificate in such a way that it could not be detected. Restricting the ability to remove DOD root and intermediate PKI certificates to the Administrator mitigates this risk. SFR ID: FMT_MOF_EXT.1.2 #47
STIG Date
Google Android 14 COBO Security Technical Implementation Guide 2023-10-04

Details

Check Text ( C-62147r928241_chk )
Review the device configuration to confirm that the user is unable to remove DOD root and intermediate PKI certificates.

On the EMM console:
1. Open "Set user restrictions".
2. Verify "Disallow config credentials" is toggled to "ON".

On the Google Android 14 device:
1. Open Settings.
2. Tap "Security & privacy".
3. Tap "More security & privacy".
4. Tap "Encryption & credentials".
5. Tap "Trusted credentials".
6. Verify the user is unable to untrust or remove any work certificates.

If on the Google Android 14 device the user is able to remove certificates, this is a finding.
Fix Text (F-62071r928242_fix)
Configure Google Android 14 device to prevent a user from removing DOD root and intermediate PKI certificates.

On the EMM console:
1. Open "Set user restrictions".
2. Toggle "Disallow config credentials" to "ON".