UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Google Android 14 COBO Security Technical Implementation Guide


Overview

Date Finding Count (30)
2024-06-05 CAT I (High): 1 CAT II (Med): 24 CAT III (Low): 5
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Available Profiles



Findings (MAC II - Mission Support Sensitive)

Finding ID Severity Title
V-258402 High Android 14 devices must have the latest available Google Android 14 operating system installed.
V-258377 Medium Google Android 14 must be configured to enable audit logging.
V-258378 Medium Google Android 14 must be configured to enforce a minimum password length of six characters.
V-258379 Medium Google Android 14 must be configured to not allow passwords that include more than four repeating or sequential characters.
V-258398 Medium Google Android 14 must be configured to enforce that Wi-Fi Sharing is disabled.
V-258399 Medium Google Android 14 must have the DOD root and intermediate PKI certificates installed.
V-258390 Medium Google Android 14 must be configured to generate audit records for the following auditable events: Detected integrity violations.
V-258391 Medium Google Android 14 must be configured to disable USB mass storage mode.
V-258392 Medium Google Android 14 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.
V-258393 Medium Google Android 14 must be configured to not allow backup of [all applications, configuration data] to remote systems.
V-258394 Medium Google Android 14 must be configured to disable multiuser modes.
V-258396 Medium Google Android 14 must be configured to disable ad hoc wireless client-to-client connection capability.
V-258397 Medium Google Android 14 users must complete required training.
V-258405 Medium Google Android 14 must be configured to disable all data signaling over [assignment: list of externally accessible hardware ports (for example, USB)].
V-258406 Medium The Google Android 14 must allow only the administrator (EMM) to install/remove DOD root and intermediate PKI certificates.
V-258400 Medium The Google Android 14 work profile must be configured to enforce the system application disable list.
V-258401 Medium Google Android 14 must be configured to disallow configuration of date and time.
V-258388 Medium Google Android 14 must be configured to disable developer modes.
V-258383 Medium Google Android 14 must be configured to enforce an application installation policy by specifying one or more authorized application repositories, including [selection: DOD-approved commercial app repository, MDM server, mobile application store].
V-258382 Medium Google Android 14 must be configured to not allow more than 10 consecutive failed authentication attempts.
V-258381 Medium Google Android 14 must be configured to lock the display after 15 minutes (or less) of inactivity.
V-258387 Medium Google Android 14 must be configured to disable trust agents.
V-258386 Medium Google Android 14 must be configured to not display the following (work profile) notifications when the device is locked: [selection: a. email notifications b. calendar appointments c. contact associated with phone call notification d. text message notification e. other application-based notifications f. all notifications].
V-258385 Medium Google Android 14 allowlist must be configured to not include applications with the following characteristics: - Back up mobile device (MD) data to non-DOD cloud servers (including user and application access to cloud backup services); - Transmit MD diagnostic data to non-DOD servers; - Voice assistant application if available when MD is locked; - Voice dialing application if available when MD is locked; - Allows synchronization of data or applications between devices associated with user; and - Allows unencrypted (or encrypted but not FIPS 140-2/140-3 validated) data sharing with other MDs or printers.
V-258384 Medium Google Android 14 must be configured to enforce an application installation policy by specifying an application allowlist that restricts applications by the following characteristics: [selection: list of digital signatures, cryptographic hash values, names, application version].
V-258395 Low Google Android 14 must be configured to disable all Bluetooth profiles except for HSP (Headset Profile), HFP (Hands-Free Profile), SPP (Serial Port Profile), A2DP (Advanced Audio Distribution Profile), AVRCP (Audio/Video Remote Control Profile), and PBAP (Phone Book Access Profile).
V-258404 Low Android 14 devices must be configured to enable Common Criteria Mode (CC Mode).
V-258407 Low Google Android 14 must allow only the administrator (MDM) to perform the following management function: Disable Phone Hub.
V-258403 Low Android 14 devices must be configured to disable the use of third-party keyboards.
V-258389 Low Google Android 14 must be configured to display the DOD advisory warning message at startup or each time the user unlocks the device.