UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Google Android 14 MDFPP 3.3 BYOAD Security Technical Implementation Guide


Overview

Date Finding Count (23)
2024-02-20 CAT I (High): 0 CAT II (Med): 23 CAT III (Low): 0
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Available Profiles



Findings (MAC III - Administrative Sensitive)

Finding ID Severity Title
V-260128 Medium Google Android 14 must be configured to lock the display after 15 minutes (or less) of inactivity.
V-260129 Medium Google Android 14 must be configured to not allow more than 10 consecutive failed authentication attempts.
V-260126 Medium Google Android 14 must be configured to enforce a minimum password length of six characters and not allow passwords that include more than four repeating or sequential characters.
V-260127 Medium Google Android 14 must be configured to enable a screen-lock policy that will lock the display after a period of inactivity.
V-260149 Medium Google Android 14 must be configured to not allow backup of all work profile applications to remote systems.
V-260160 Medium Google Android 14 users must complete required training.
V-260082 Medium Google Android 14 must prohibit DOD VPN profiles in the Personal Profile.
V-260162 Medium Google Android 14 must have the DOD root and intermediate PKI certificates installed (work profile only).
V-260163 Medium The Google Android 14 work profile must be configured to prevent users from adding personal email accounts to the work email app.
V-260164 Medium The Google Android 14 work profile must be configured to enforce the system application disable list (work profile only).
V-260165 Medium Google Android 14 must be provisioned as a BYOAD device (Android work profile for employee-owned devices [BYOD]).
V-260166 Medium The Google Android 14 work profile must be configured to disable automatic completion of workspace internet browser text input.
V-260167 Medium The Google Android 14 work profile must be configured to disable the autofill services.
V-260137 Medium Google Android 14 must be configured to disable trust agents.
V-260152 Medium Google Android 14 must be configured to disable exceptions to the access control policy that prevent [selection: application processes, groups of application processes] from accessing [selection: all, private] data stored by other [selection: application processes, groups of application processes].
V-260133 Medium Google Android 14 must be configured to not display the following (work profile) notifications when the device is locked: [selection: a. email notifications b. calendar appointments c. contact associated with phone call notification d. text message notification e. other application-based notifications f. all notifications].
V-260132 Medium Google Android 14 allowlist must be configured to not include applications with the following characteristics (work profile only): 1. Back up mobile device (MD) data to non-DOD cloud servers (including user and application access to cloud backup services); 2. Transmit MD diagnostic data to non-DOD servers; 3. Voice assistant application if available when MD is locked; 4. Voice dialing application if available when MD is locked; 5. Allows synchronization of data or applications between devices associated with user; and 6. Allows unencrypted (or encrypted but not FIPS 140-3 validated) data sharing with other MDs or printers. 7. Apps which backup their own data to a remote system.
V-260131 Medium Google Android 14 must be configured to enforce an application installation policy by specifying an application allowlist that restricts applications by the following characteristics: [selection: list of digital signatures, cryptographic hash values, names, application version].
V-260130 Medium Google Android 14 must be configured to enforce an application installation policy by specifying one or more authorized application repositories.
V-260171 Medium Android 14 devices must be configured to disable the use of third-party keyboards (work profile only).
V-260170 Medium Android 14 devices must have the latest available Google Android 14 operating system installed.
V-260174 Medium The Google Android 14 must allow only the administrator (EMM) to install/remove DOD root and intermediate PKI certificates (work profile).
V-260142 Medium Google Android 14 must be configured to display the DOD advisory warning message at startup or each time the user unlocks the Work Profile.