{
"stig": {
"date": "2019-08-28",
"description": "This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.",
"findings": {
"V-97305": {
"checkid": "C-96141r1_chk",
"checktext": "Review Google Android device configuration settings to determine if the mobile device is enforcing a minimum password length of six characters.\n\nThis validation procedure is performed on both the MDM Administration Console and the Android Pie device. \n\nOn the MDM console:\n1. Open password requirements\n2. Open device password section\n3. Ensure the minimum password length is set to \"6\" characters\n\nOn the Android Pie device, do the following:\n\n1. Open Settings > Security & location > Screen lock\n2. Enter current password\n3. Tap on \"Password\"\n4. Verify Password length listed is at least 6\n\nIf the device password length is not set to six characters or more on MDM console or on the Android Pie device, this is a finding.",
"description": "Password strength is a measure of the effectiveness of a password in resisting guessing and brute force attacks. The ability to crack a password is a function of how many attempts an adversary is permitted, how quickly an adversary can do each attempt, and the size of the password space. The longer the minimum length of the password is, the larger the password space. Having a too-short minimum password length significantly reduces password strength, increasing the chance of password compromise and resulting device and data compromise.\n\nSFR ID: FMT_SMF_EXT.1.1 #1a",
"fixid": "F-102985r1_fix",
"fixtext": "Configure the Google Android device to enforce a minimum password length of six characters.\n\nOn the MDM console:\n1. Open password requirements.\n2. Open device password section.\n3. Enter in the number of characters as \"6\".",
"iacontrols": null,
"id": "V-97305",
"ruleID": "SV-106409r1_rule",
"severity": "medium",
"title": "The Google Android Pie must be configured to enforce a minimum password length of six characters.",
"version": "GOOG-09-000100"
},
"V-97307": {
"checkid": "C-96143r2_chk",
"checktext": "Review Google Android device configuration settings to determine if the mobile device is prohibiting passwords with more than two repeating or sequential characters. \n\nThis validation procedure is performed on both the MDM Administration Console and the Android Pie device. \n\nOn the MDM console, do the following:\n\nOn the MDM console:\n1. Open password requirements\n2. Open device password section\n3. Ensure the password quality is set to \"Numeric (Complex)\"\n\nOn the Android Pie device, do the following:\n\n1. Open Settings >> Security & location >> Screen lock\n2. Enter current password\n3. Tap on \"Password\"\n4. Verify Password complexity requirements are listed: Ascending, descending, or repeated sequence of digits isn't allowed\n\nIf the MDM console device policy is set to a password with more than two repeating or sequential characters or, on the Android Pie device, the device policy is set to a password with more than two repeating or sequential characters, this is a finding.\n\nNote: Alphabetic, Alphanumeric, and Complex are also acceptable selections but these selections will cause the user to select a complex password, which is not required by the STIG.",
"description": "Password strength is a measure of the effectiveness of a password in resisting guessing and brute force attacks. Passwords that contain repeating or sequential characters are significantly easier to guess than those that do not contain repeating or sequential characters. Therefore, disallowing repeating or sequential characters increases password strength and decreases risk.\n\nSFR ID: FMT_SMF_EXT.1.1 #1b",
"fixid": "F-102987r2_fix",
"fixtext": "Configure the Google Android device to prevent passwords from containing more than two repeating or sequential characters.\n\nOn the MDM console:\n1. Open password requirements\n2. Open device password section\n3. Set password quality to \"Numeric (Complex)\"\n\nNote: Alphabetic, Alphanumeric, and Complex are also acceptable selections but these selections will cause the user to select a complex password, which is not required by the STIG.",
"iacontrols": null,
"id": "V-97307",
"ruleID": "SV-106411r1_rule",
"severity": "medium",
"title": "The Google Android Pie must be configured to not allow passwords that include more than two repeating or sequential characters.",
"version": "GOOG-09-000200"
},
"V-97309": {
"checkid": "C-96145r1_chk",
"checktext": "Review Google Android device configuration settings to determine if the mobile device is enforcing a screen-lock policy that will lock the display after a period of inactivity.\n\nThis validation procedure is performed on both the MDM Administration Console and the Android Pie device. \n\nOn the MDM console, do the following:\n1. Open password requirements\n2. Open device password section\n3. Ensure \"Device Lock Timeout\" is set to any number desired. Units are in Minutes.\n\nOn the Android Pie device, do the following:\n1. Open settings >> Security & location \n2. Click the \"gear\" icon next to \"Screen lock\"\n3. Ensure \"Automatically lock\" is set at a required time\n\nIf the MDM console device policy is not set to enable a screen-lock policy that will lock the display after a period of inactivity or on the Android Pie device, the device policy is not set to enable a screen-lock policy that will lock the display after a period of inactivity, this is a finding.",
"description": "The screen-lock timeout helps protect the device from unauthorized access. Devices without a screen-lock timeout provide an opportunity for adversaries who gain physical access to the mobile device through loss, theft, etc. Such devices are much more likely to be in an unlocked state when acquired by an adversary, thus granting immediate access to the data on the mobile device and possibly access to DoD networks.\n\nSFR ID: FMT_SMF_EXT.1.1 #2a",
"fixid": "F-102989r1_fix",
"fixtext": "Configure the Google Android device to enable a screen-lock policy that will lock the display after a period of inactivity.\n\nOn the MDM Console:\n1. Open password requirements.\n2. Open device password section.\n3. Set \"Device Lock Timeout\" to any number desired. Units are in Minutes.",
"iacontrols": null,
"id": "V-97309",
"ruleID": "SV-106413r1_rule",
"severity": "medium",
"title": "The Google Android Pie must be configured to enable a screen-lock policy that will lock the display after a period of inactivity.",
"version": "GOOG-09-000300"
},
"V-97311": {
"checkid": "C-96147r1_chk",
"checktext": "Review Google Android device configuration settings to determine if the mobile device has the screen lock timeout set to 15 minutes or less.\n\nThis validation procedure is performed on both the MDM Administration Console and the Android Pie device. \n\nOn the MDM console, do the following:\n\n1. Open passcode requirements\n2. Open device passcode section\n3. Ensure \"Device Lock Timeout\" to any number between 1 and 15\n\nOn the Android Pie device, do the following:\n1. Open settings >> Security & location \n2. Click the \"gear\" icon next to \"Screen lock\"\n3. Ensure \"Automatically lock\" is set to between 0 and 15 minutes\n\nIf the MDM console device policy is not set to 15 minutes or less for the screen lock timeout or on the Android Pie device, the device policy is not set to 15 minutes or less for the screen lock timeout, this is a finding.",
"description": "The screen lock timeout must be set to a value that helps protect the device from unauthorized access. Having a too-long timeout would increase the window of opportunity for adversaries who gain physical access to the mobile device through loss, theft, etc. Such devices are much more likely to be in an unlocked state when acquired by an adversary, thus granting immediate access to the data on the mobile device. The maximum timeout period of 15 minutes has been selected to balance functionality and security; shorter timeout periods may be appropriate depending on the risks posed to the mobile device.\n\nSFR ID: FMT_SMF_EXT.1.1 #2b",
"fixid": "F-102991r1_fix",
"fixtext": "Configure the Google Android device to lock the device display after 15 minutes (or less) of inactivity.\n\nOn the MDM Console:\n1. Open password requirements.\n2. Open device password section.\n3. Set \"Device Lock Timeout\" to any number between 1 and 15.",
"iacontrols": null,
"id": "V-97311",
"ruleID": "SV-106415r1_rule",
"severity": "medium",
"title": "The Google Android Pie must be configured to lock the display after 15 minutes (or less) of inactivity.",
"version": "GOOG-09-000400"
},
"V-97313": {
"checkid": "C-96149r1_chk",
"checktext": "Review Google Android device configuration settings to determine if the mobile device has the maximum number of consecutive failed authentication attempts set at 10 or fewer. \n\nThis validation procedure is performed on both the MDM Administration Console and the Android Pie device. \nOn the MDM console, do the following:\n\n1. Open password requirements.\n2. Open device password section.\n3. Review the policy configuration that was pushed down to the device and ensure the \"Maximum Number of Failed Attempts\" is set between 1 and 10.\n\nOn the Android Pie device, do the following:\n1. Open Setting >> Security & location >> Managed device info \n2. Verify \"Failed password attempts before deleting all device data\" is set to 10 or fewer attempts .\n\nIf the MDM console device policy is not set to the maximum number of consecutive failed authentication attempts at 10 or fewer or on the Android Pie device, the device policy is not set to the maximum number of consecutive failed authentication attempts at 10 or fewer, this is a finding.",
"description": "The more attempts an adversary has to guess a password, the more likely the adversary will enter the correct password and gain access to resources on the device. Setting a limit on the number of attempts mitigates this risk. Setting the limit at 10 or less gives authorized users the ability to make a few mistakes when entering the password but still provides adequate protection against dictionary or brute force attacks on the password.\n\nSFR ID: FMT_SMF_EXT.1.1 #2c, FIA_AFL_EXT.1.5",
"fixid": "F-102993r1_fix",
"fixtext": "Configure the Google Android device to allow only 10 or fewer consecutive failed authentication attempts.\n\nOn the MDM Console:\n1. Open password requirements.\n2. Open device password section.\n3. Set \"Maximum Number of Failed Attempts\" to a number between 1 and 10.",
"iacontrols": null,
"id": "V-97313",
"ruleID": "SV-106417r1_rule",
"severity": "low",
"title": "The Google Android Pie must be configured to not allow more than 10 consecutive failed authentication attempts.",
"version": "GOOG-09-000500"
},
"V-97315": {
"checkid": "C-96151r1_chk",
"checktext": "Review Google Android device configuration settings to determine if the mobile device has only approved application repositories (DoD-approved commercial app repository, MDM server, and/or mobile application store).\n\nThis validation procedure is performed on both the MDM Administration Console and the Android Pie device. \n\nOn the MDM console, do the following:\n1. Open restrictions section.\n2. Open Restrictions Section.\n3. Set Allow \"Google Play\" (Uses only Managed Google Play).\n4. Ensure that Disallow is set for \"Install unknown sources\".\n\nOn the Google device, do the following:\n1. Open Settings >> Apps and notifications >> Advanced >> Special app access\n2. Open Install unknown apps .\n3. Ensure the list of apps is blank or if an app is on the list, \"Disabled by admin\" is listed under the app name.\n\nIf the MDM console device policy is not set to allow connections to only approved application repositories or on the Android Pie device, the device policy is not set to allow connections to only approved application repositories, this is a finding.",
"description": "Forcing all applications to be installed from authorized application repositories can prevent unauthorized and malicious applications from being installed and executed on mobile devices. Allowing such installations and executions could cause a compromise of DoD data accessible by these unauthorized/malicious applications.\n\nSFR ID: FMT_SMF_EXT.1.1 #8a",
"fixid": "F-102995r1_fix",
"fixtext": "Configure the Google Android device to disable unauthorized application repositories.\n\nOn the MDM Console:\n1. Open restrictions section.\n2. Open Restrictions Section.\n3. Set Allow \"Google Play\" (Uses only Managed Google Play).\n4. Set Disallow \"Install unknown sources\".",
"iacontrols": null,
"id": "V-97315",
"ruleID": "SV-106419r1_rule",
"severity": "medium",
"title": "The Google Android Pie must be configured to enforce an application installation policy by specifying one or more authorized application repositories, including [selection: DoD-approved commercial app repository, MDM server, mobile application store].",
"version": "GOOG-09-000800"
},
"V-97317": {
"checkid": "C-96153r1_chk",
"checktext": "Review Google Android device configuration settings to determine if the mobile device has an application whitelist configured. Verify all applications listed on the whitelist have been approved by the Approving Official (AO).\n\nThis validation procedure is performed only on the MDM Administration Console.\n\nOn the MDM console, do the following:\n1. Go to the Android app catalog for managed Google Play.\n2. Verify all selected apps are AO approved.\n\nNOTE: Managed Google Play is always a Whitelisted App Store.\n\nIf on the MDM console the list of selected Managed Google Play apps included non-approved apps, this is a finding.\n\n(Note: The application whitelist will include approved core applications (included in the OS by the OS vendor) and pre-installed applications (provided by the MD vendor and wireless carrier), or the MD must provide an alternate method of restricting user access/execution to core and pre-installed applications.) For Google Android, there are no pre-installed applications.",
"description": "The application whitelist, in addition to controlling the installation of applications on the MD, must control user access/execution of all core and preinstalled applications, or the MD must provide an alternate method of restricting user access/execution to core and pre-installed applications. \n\nCore application: Any application integrated into the OS by the OS or MD vendors.\n\nPre-installed application: Additional non-core applications included in the OS build by the OS vendor, MD vendor, or wireless carrier.\n\nRequiring all authorized applications to be in an application whitelist prevents the execution of any applications (e.g., unauthorized, malicious) that are not part of the whitelist. Failure to configure an application whitelist properly could allow unauthorized and malicious applications to be downloaded, installed, and executed on the mobile device, causing a compromise of DoD data accessible by these applications.\n\nThe application whitelist, in addition to controlling the installation of applications on the MD, must control user access/execution of all core applications (included in the OS by the OS vendor) and pre-installed applications (provided by the MD vendor and wireless carrier), or the MD must provide an alternate method of restricting user access/execution to core and pre-installed applications.\n\nSFR ID: FMT_SMF_EXT.1.1 #8b",
"fixid": "F-102997r1_fix",
"fixtext": "Configure the Google Android device to use an application whitelist.\n\nOn the MDM Console:\n1. Go to the Android app catalog for managed Google Play.\n2. Select apps to be available (only approved apps).\n3. Push updated policy to the device.\n\nNOTE: Managed Google Play is always a Whitelisted App Store.",
"iacontrols": null,
"id": "V-97317",
"ruleID": "SV-106421r1_rule",
"severity": "medium",
"title": "The Google Android Pie must be configured to enforce an application installation policy by specifying an application whitelist that restricts applications by the following characteristics: [selection: list of digital signatures, cryptographic hash values, names, application version].",
"version": "GOOG-09-001000"
},
"V-97319": {
"checkid": "C-96155r1_chk",
"checktext": "Review Google Android device configuration settings to determine if the mobile device has an application whitelist configured and that the application whitelist does not include applications with the following characteristics:\n\n- back up MD data to non-DoD cloud servers (including user and application access to cloud backup services);\n- transmit MD diagnostic data to non-DoD servers;\n- voice assistant application if available when MD is locked;\n- voice dialing application if available when MD is locked;\n- allows synchronization of data or applications between devices associated with user;\n- payment processing; and\n- allows unencrypted (or encrypted but not FIPS 140-2 validated) data sharing with other MDs, display screens (screen mirroring), or printers.\n\nThis validation procedure is performed only on the MDM Administration Console.\n\nOn the MDM console, do the following:\n\n1. Review the list of selected Managed Google Play apps.\n2. Review the details and privacy policy of each selected app to ensure the app does not include prohibited characteristics.\n\nIf the MDM console device policy includes applications with unauthorized characteristics, this is a finding.",
"description": "Requiring all authorized applications to be in an application whitelist prevents the execution of any applications (e.g., unauthorized, malicious) that are not part of the whitelist. Failure to configure an application whitelist properly could allow unauthorized and malicious applications to be downloaded, installed, and executed on the mobile device, causing a compromise of DoD data accessible by these applications. Applications with the listed characteristics have features that can cause the compromise of sensitive DoD data or have features with no known application in the DoD environment.\n\nApplication note: The application whitelist, in addition to controlling the installation of applications on the MD, must control user access/execution of all core and preinstalled applications, or the MD must provide an alternate method of restricting user access/execution to core and pre-installed applications.\n\nCore application: Any application integrated into the OS by the OS or MD vendors.\n\nPre-installed application: Additional non-core applications included in the OS build by the OS vendor, MD vendor, or wireless carrier.\n\nSFR ID: FMT_SMF_EXT.1.1 #8b",
"fixid": "F-102999r1_fix",
"fixtext": "Configure the Google Android device application whitelist to exclude applications with the following characteristics:\n\n- back up MD data to non-DoD cloud servers (including user and application access to cloud backup services);\n- transmit MD diagnostic data to non-DoD servers;\n- voice assistant application if available when MD is locked;\n- voice dialing application if available when MD is locked;\n- allows synchronization of data or applications between devices associated with user;\n- payment processing; and\n- allows unencrypted (or encrypted but not FIPS 140-2 validated) data sharing with other MDs, display screens (screen mirroring), or printers.\n\nOn the MDM Console:\n1. Go to the Android app catalog for managed Google Play.\n2. Before selecting an app, review the app details and privacy policy to ensure the app does not include prohibited characteristics.",
"iacontrols": null,
"id": "V-97319",
"ruleID": "SV-106423r1_rule",
"severity": "medium",
"title": "The Google Android Pie whitelist must be configured to not include applications with the following characteristics: - back up MD data to non-DoD cloud servers (including user and application access to cloud backup services); - transmit MD diagnostic data to non-DoD servers; - voice assistant application if available when MD is locked; - voice dialing application if available when MD is locked; - allows synchronization of data or applications between devices associated with user; and - allows unencrypted (or encrypted but not FIPS 140-2 validated) data sharing with other MDs or printers.",
"version": "GOOG-09-001100"
},
"V-97321": {
"checkid": "C-96157r1_chk",
"checktext": "Determine if the AO has approved the use of Bluetooth at the site.\n\nIf the AO has not approved the use of Bluetooth, verify Bluetooth has been disabled:\nOn the MDM console, do the following:\n\n1. Open restrictions Section.\n2. Ensure \"Disallow Bluetooth\" is set.\n\nOn the Android Pie device, do the following:\n\n1. Go to Settings >> Connected Devices >> Connection Preferences >> Bluetooth\n2. Ensure that it's set to Off and you cannot toggle it to On.\n\nIf the AO has approved the use of Bluetooth, on the Google Android Pie device do the following:\n\n1. Go to Settings >> Connected Devices\n2. Verify only approved Bluetooth connected devices using approved profiles are listed.\n\nIf the AO has not approved the use of Bluetooth, and Bluetooth use is not disabled via an MDM managed device policy, this is a finding.\nIf the AO has approved the use of Bluetooth, and Bluetooth devices using unauthorized Bluetooth profiles are listed on the device under \"Connected devices\", this is a finding.",
"description": "Some Bluetooth profiles provide the capability for remote transfer of sensitive DoD data without encryption or otherwise do not meet DoD IT security policies and therefore should be disabled.\n\nSFR ID: FMT_SMF_EXT.1.1 #18h",
"fixid": "F-103001r1_fix",
"fixtext": "Configure the Google Android device to disable Bluetooth or if the AO has approved the use of Bluetooth (for example, for car handsfree use), train the user to connect to only authorized Bluetooth devices using only HSP, HFP, or SPP Bluetooth capable devices (User Based Enforcement (UBE)).\n\nTo disable Bluetooth use the following procedure:\nOn the MDM Console: \n1. Open restrictions section.\n2. Toggle \"Disallow Bluetooth\" to on.\n\nThe user training requirement is satisfied in requirement GOOG-09-008700.",
"iacontrols": null,
"id": "V-97321",
"ruleID": "SV-106425r1_rule",
"severity": "low",
"title": "The Google Android Pie must be configured to disable Bluetooth or configured via User Based Enforcement (UBE) to allow Bluetooth for only HSP (Headset Profile), HFP (HandsFree Profile), or SPP (Serial Port Profile) capable devices.",
"version": "GOOG-09-001400"
},
"V-97323": {
"checkid": "C-96159r1_chk",
"checktext": "Review Google Android device settings to determine if the Google Android device displays (work container) notifications on the lock screen. Notifications of incoming phone calls are acceptable even when the device is locked. \n\nThis validation procedure is performed on both the MDM Administration Console and the Android Pie device. \n\nOn the MDM console, do the following:\n\n1. Open restrictions Section.\n2. Open Work Managed Section.\n3. Ensure \"Unredacted Notifications\" is set to Disallow.\n\nOn the Android Pie device, do the following:\n\n1. Go to Settings >> Security & location\n2. Tap on Lock screen preferences.\n3. Ensure \"Hide sensitive work content\" is listed under \"When work profile is locked\".\n\nIf the MDM console device policy allows work notifications on the lock screen or the Android Pie device allows work notifications on the lock screen, this is a finding.",
"description": "Many mobile devices display notifications on the lock screen so that users can obtain relevant information in a timely manner without having to frequently unlock the phone to determine if there are new notifications. However, in many cases, these notifications can contain sensitive information. When they are available on the lock screen, an adversary can see them merely by being in close physical proximity to the device. Configuring the Google Android device to not send notifications to the lock screen mitigates this risk.\n\nSFR ID: FMT_SMF_EXT.1.1 #19",
"fixid": "F-103003r1_fix",
"fixtext": "Configure the Google Android device to not display (work profile) notifications when the device is locked.\n\nOn the MDM console:\n\n1. Open restrictions section.\n2. Open Work Managed Section.\n3. Set \"Unredacted Notifications\" to Disallow.",
"iacontrols": null,
"id": "V-97323",
"ruleID": "SV-106427r1_rule",
"severity": "medium",
"title": "The Google Android Pie must be configured to not display the following (work profile) notifications when the device is locked: [selection: - email notifications - calendar appointments - contact associated with phone call notification - text message notification - other application-based notifications - all notifications].",
"version": "GOOG-09-001600"
},
"V-97325": {
"checkid": "C-96161r1_chk",
"checktext": "Review device configuration settings to confirm that trust agents are disabled. \n\nThis procedure is performed on both the MDM Administration console and the Google Android Pie device. \n\nOn the MDM console:\n1. Open restrictions section.\n2. Set \"Disable trust agents\" to on.\n\nOn the Google Android Pie device: \n1. Open Settings. \n2. Tap \"Security & location\". \n3. Tap \"Advanced\". \n4. Tap \"Trust agents\". \n5. Verify that all listed trust agents are disabled and cannot be enabled. \n\nIf on the MDM console \"disable trust agents\" is not selected, or on the Android Pie device a trust agent can be enabled, this is a finding.",
"description": "Trust agents allow a user to unlock a mobile device without entering a passcode when the mobile device is, for example, connected to a user-selected Bluetooth device or in a user-selected location. This technology would allow unauthorized users to have access to DoD sensitive data if compromised. By not permitting the use of non-password authentication mechanisms, users are forced to use passcodes that meet DoD passcode requirements.\n\nSFR ID: FMT_SMF_EXT.1.1 #23, FIA_UAU.5.1",
"fixid": "F-103005r1_fix",
"fixtext": "Configure Google Android Pie to disable trust agents. \n\nOn the MDM console:\n1. Open Lock screen restrictions section.\n2. Set \"Disable trust agents\" to on.",
"iacontrols": null,
"id": "V-97325",
"ruleID": "SV-106429r1_rule",
"severity": "medium",
"title": "Google Android Pie must be configured to disable trust agents. Note: This requirement is not applicable (NA) for specific biometric authentication factors included in the products Common Criteria evaluation.",
"version": "GOOG-09-002300"
},
"V-97327": {
"checkid": "C-96163r1_chk",
"checktext": "Review Google Android device configuration settings to determine whether a developer mode is enabled.\n\nThis validation procedure is performed on both the MDM Administration Console and the Android Pie device. \n\nOn the MDM console, do the following:\n\n1. Open restrictions section.\n2. Open Restrictions section.\n3. Confirm that \"Debugging Features\" is set to Disallow.\n\nOn the Android Pie device, do the following:\n\n1. Go to Settings >> System\n2. Ensure Developer Options is not listed.\n\nIf the MDM console device policy is not set to disable developer mode or on the Android Pie device, the device policy is not set to disable developer mode, this is a finding.",
"description": "Developer modes expose features of the Google Android device that are not available during standard operation. An adversary may leverage a vulnerability inherent in a developer mode to compromise the confidentiality, integrity, and availability of DoD sensitive information. Disabling developer modes mitigates this risk.\n\nSFR ID: FMT_SMF_EXT.1.1 #26",
"fixid": "F-103007r1_fix",
"fixtext": "Configure the Google Android device to disable developer modes.\n\nOn the MDM Console:\n1. Open restrictions section.\n2. Open Restrictions section.\n3. Set \"Debugging Features\" to Disallow.",
"iacontrols": null,
"id": "V-97327",
"ruleID": "SV-106431r1_rule",
"severity": "medium",
"title": "The Google Android Pie must be configured to disable developer modes.",
"version": "GOOG-09-002800"
},
"V-97329": {
"checkid": "C-96165r3_chk",
"checktext": "The DoD warning banner can be displayed by either of the following methods (required text is found in the Vulnerability Description):\n\n1. By placing the DoD warning banner text in the user agreement signed by each Google Android device device user (preferred method).\n2. By configuring the warning banner text on the MDM console and installing the banner on each managed mobile device.\n\nDetermine which method is used at the Google Android device device site and follow the appropriate validation procedure below.\n\nValidation Procedure for Method #1:\nReview the signed user agreements for several Google Android device device users and verify the agreement includes the required DoD warning banner text.\n\nValidation Procedure for Method #2:\nOn the MDM console, do the following:\nEnsure \"Lock Screen Message\" and the appropriate banner text is included.\n\nIf, for Method #1, the required warning banner text is not on all signed user agreements reviewed, or for Method #2, the MDM console device policy is not set to display a warning banner with the appropriate designated wording or on the Android Pie device, the device policy is not set to display a warning banner with the appropriate designated wording, this is a finding.",
"description": "The Google Android Pie is required to display the DoD-approved system use notification message or banner before granting access to the system that provides privacy and security notices consistent with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance. Required banners help ensure that DoD can audit and monitor the activities of mobile device users without legal restriction.\n\nSystem use notification messages can be displayed when individuals first access or unlock the mobile device. The banner must be implemented as a \"click-through\" banner at device unlock (to the extent permitted by the operating system). A \"click-through\" banner prevents further activity on the information system unless and until the user executes a positive action to manifest agreement by clicking on a box indicating \"OK.\"\n\nThe approved DoD text must be used exactly as required in the KS referenced in DoDI 8500.01. For devices accommodating banners of 1300 characters, the banner text is: \n\nYou are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. \nBy using this IS (which includes any device attached to this IS), you consent to the following conditions: \n-The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. \n-At any time, the USG may inspect and seize data stored on this IS. \n-Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. \n-This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. \n-Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details.\n\nFor devices with severe character limitations, the banner text is: \n\nI've read & consent to terms in IS user agreem't.\n\nThe administrator must configure the banner text exactly as written without any changes.\n\nSFR ID: FMT_SMF_EXT.1.1 #36",
"fixid": "F-103009r1_fix",
"fixtext": "Configure the DoD warning banner by either of the following methods (required text is found in the Vulnerability Description):\n\n1. By placing the DoD warning banner text in the user agreement signed by each Google Android device device user (preferred method).\n2. By configuring the warning banner text on the MDM console and installing the banner on each managed mobile device.\n\nOn the MDM Console:\nEnable \"Lock Screen Message\" and enter the banner text.",
"iacontrols": null,
"id": "V-97329",
"ruleID": "SV-106433r1_rule",
"severity": "low",
"title": "The Google Android Pie must be configured to display the DoD advisory warning message at start-up or each time the user unlocks the device.",
"version": "GOOG-09-003400"
},
"V-97331": {
"checkid": "C-96167r1_chk",
"checktext": "Review Google Android device configuration settings to determine if the mobile device has a USB mass storage mode and whether it has been disabled. \n\nThis validation procedure is performed on both the MDM Administration Console and the Android Pie device. \n\nOn the MDM console, do the following:\n\n1. Open Device Restrictions.\n2. Open Restrictions Settings.\n3. Ensure \"Disallow usb file transfer\" is selected.\n\nOn the Android Pie device, do the following:\n\n1. Plug in USB cable into Android Pie device and connect to a non-DoD network-managed PC. \n2. Go to Settings >> Connected devices >> USB\n3. Ensure No data transfer is selected.\n\nIf the MDM console device policy is not set to disable USB mass storage mode or on the Android Pie device, the device policy is not set to disable USB mass storage mode, this is a finding.",
"description": "USB mass storage mode enables the transfer of data and software from one device to another. This software can include malware. When USB mass storage is enabled on a mobile device, it becomes a potential vector for malware and unauthorized data exfiltration. Prohibiting USB mass storage mode mitigates this risk.\n\nSFR ID: FMT_SMF_EXT.1.1 #39a",
"fixid": "F-103011r1_fix",
"fixtext": "Configure the Google Android device to disable USB mass storage mode.\n\nOn the MDM console:\n\n1. Open Device Restrictions.\n2. Open Restrictions Settings.\n3. Select \"Disallow usb file transfer\".",
"iacontrols": null,
"id": "V-97331",
"ruleID": "SV-106435r1_rule",
"severity": "medium",
"title": "The Google Android Pie must be configured to disable USB mass storage mode.",
"version": "GOOG-09-003500"
},
"V-97333": {
"checkid": "C-96169r2_chk",
"checktext": "Review Google Android device configuration settings to determine if the capability to back up to a locally connected system has been disabled. \n\nThis validation procedure is performed on both the MDM Administration Console and the Android Pie device. \n\nOn the MDM console, do the following:\n\n1. Open Device Restrictions.\n2. Open Restrictions Settings.\n3. Ensure \"Disallow usb file transfer\" is selected.\n\nOn the Android Pie device, do the following:\n\n1. Plug in USB cable into Android Pie device and connect to a non-DoD network-managed PC. \n2. Go to Settings >> Connected devices >> USB\n3. Ensure No data transfer is selected.\n\nIf the MDM console device policy is not set to disable the capability to back up to a locally connected system or on the Android Pie device, the device policy is not set to disable the capability to back up to a locally connected system, this is a finding.",
"description": "Data on mobile devices is protected by numerous mechanisms, including user authentication, access control, and cryptography. When the data is backed up to an external system (either locally connected or cloud-based), many if not all of these mechanisms are no longer present. This leaves the backed-up data vulnerable to attack. Disabling backup to external systems mitigates this risk.\n\nSFR ID: FMT_SMF_EXT.1.1 #40",
"fixid": "F-103013r1_fix",
"fixtext": "Configure the Google Android device to disable backup to locally connected systems.\n\nNOTE: On Restrictions, the backup features for Google are not in the framework.\n\nOn the MDM console:\n\n1. Open Device Restrictions.\n2. Open Restrictions Settings.\n3. Select \"Disallow usb file transfer\".",
"iacontrols": null,
"id": "V-97333",
"ruleID": "SV-106437r1_rule",
"severity": "medium",
"title": "The Google Android Pie must be configured to not allow backup of [all applications, configuration data] to locally connected systems.",
"version": "GOOG-09-003700"
},
"V-97335": {
"checkid": "C-96171r1_chk",
"checktext": "Review Google Android device configuration settings to determine if the capability to back up to a remote system has been disabled. \n\nThis validation procedure is performed on both the MDM Administration Console and the Android Pie device. \n\nOn the MDM console, do the following:\n\n1. Open Device Restrictions.\n2. Open Restrictions Settings.\n3. Ensure \"Disallow backup servicer\" is not selected.\n\nOn the Android Pie device, do the following:\n\n1. Go to Settings >> System.\n2. Ensure Backup is set to \"Off\".\n\nIf the MDM console device policy is not set to disable the capability to back up to a remote system or on the Android Pie device, the device policy is not set to disable the capability to back up to a remote system, this is a finding.",
"description": "Backups to remote systems (including cloud backup) can leave data vulnerable to breach on the external systems, which often offer less protection than the Google Android device. Where the remote backup involves a cloud-based solution, the backup capability is often used to synchronize data across multiple devices. In this case, DoD devices may synchronize DoD sensitive information to a user's personal device or other unauthorized computers that are vulnerable to breach. Disallowing remote backup mitigates this risk.\n\nSFR ID: FMT_SMF_EXT.1.1 #40",
"fixid": "F-103015r1_fix",
"fixtext": "Configure the Google Android device to disable backup to remote systems (including commercial clouds).\n\nNOTE: On a Restrictions, data in the work profile cannot be backed up by default.\n\nOn the MDM console:\n\n1. Open Device Restrictions.\n2. Open Restrictions Settings.\n3. Ensure \"Enable backup service\" is not selected.",
"iacontrols": null,
"id": "V-97335",
"ruleID": "SV-106439r1_rule",
"severity": "medium",
"title": "The Google Android Pie must be configured to not allow backup of all applications and configuration data to remote systems.",
"version": "GOOG-09-003900"
},
"V-97337": {
"checkid": "C-96173r1_chk",
"checktext": "Review documentation on the Google Android device and inspect the configuration on the Google Android device to verify the access control policy that prevents [selection: application processes] from accessing [selection: all] data stored by other [selection: application processes] is enabled.\n\nThis validation procedure is performed only on the MDM Administration Console. \n\nOn the MDM console, do the following:\n\n1. Open restrictions settings.\n2. Open user restrictions.\n3. Ensure \"Disallow cross profile copy/paste\" is selected.\n4. Ensure \"Disallow sharing data into the profile\" is selected.\n\nIf the MDM console device policy is not set to disable data sharing between profiles, this is a finding.",
"description": "App data sharing gives apps the ability to access the data of other apps for enhanced user functionality. However, sharing also poses a significant risk that unauthorized users or apps will obtain access to DoD sensitive information. To mitigate this risk, there are data sharing restrictions. If a user is allowed to make exceptions to the data sharing restriction policy, the user could enable unauthorized sharing of data, leaving it vulnerable to breach. Limiting the granting of exceptions to either the Administrator or common application developer mitigates this risk.\n\nCopy/paste of data between applications in different application processes or groups of application processes is considered an exception to the access control policy and therefore, the Administrator must be able to enable/disable the feature. Other exceptions include allowing any data or application sharing between process groups.\n\nSFR ID: FMT_SMF_EXT.1.1 #42, FDP_ACF_EXT.1.2",
"fixid": "F-103017r1_fix",
"fixtext": "Configure the Google Android Pie to enable the access control policy that prevents [selection: application processes, groups of application processes] from accessing [selection: all, private] data stored by other [selection: application processes, groups of application processes].\n\nNOTE: All application data is inherently sandboxed and isolated from other applications. In order to disable copy/paste on the MDM Console:\n\n1. Open restrictions settings.\n2. Open user restrictions.\n3. Select \"Disallow cross profile copy/paste\".\n4. Select \"Disallow sharing data into the profile\".",
"iacontrols": null,
"id": "V-97337",
"ruleID": "SV-106441r1_rule",
"severity": "medium",
"title": "The Google Android Pie must be configured to disable exceptions to the access control policy that prevents application processes from accessing all data stored by other application processes.",
"version": "GOOG-09-004500"
},
"V-97339": {
"checkid": "C-96175r1_chk",
"checktext": "Review documentation on the Google Android device and inspect the configuration on the Google Android device to disable multi-user modes.\n\nThis validation procedure is performed on both the MDM Administration Console and the Android Pie device. \n\nOn the MDM console, do the following:\n\n1. Open the restrictions settings.\n2. Open user settings.\n3. Confirm \"Disallow Add User\" is selected.\n\nOn the Android Pie device, do the following:\n\n1. Go to Settings >> System >> Advanced >> Multiple users\n2. Ensure that there is no option to add a user.\n\nIf the MDM console device policy is not set to disable multi-user modes or on the Android Pie device, the device policy is not set to disable multi-user modes, this is a finding.",
"description": "Multi-user mode allows multiple users to share a mobile device by providing a degree of separation between user data. To date, no mobile device with multi-user mode features meets DoD requirements for access control, data separation, and non-repudiation for user accounts. In addition, the MDFPP does not include design requirements for multi-user account services. Disabling multi-user mode mitigates the risk of not meeting DoD multi-user account security policies.\n\nSFR ID: FMT_SMF_EXT.1.1 #47b",
"fixid": "F-103019r1_fix",
"fixtext": "Configure the Google Android Pie to disable multi-user modes.\n\nOn the MDM console:\n\n1. Open the restrictions settings.\n2. Open user settings.\n3. Select \"Disallow Add User\".",
"iacontrols": null,
"id": "V-97339",
"ruleID": "SV-106443r1_rule",
"severity": "medium",
"title": "The Google Android Pie must be configured to disable multi-user modes.",
"version": "GOOG-09-004700"
},
"V-97341": {
"checkid": "C-96177r1_chk",
"checktext": "Review documentation on the Google Android device and inspect the configuration on the Google Android device to enable audit logging.\n\nThis validation procedure is performed on only on the MDM Administration Console. \n\nOn the MDM console, do the following:\n\n1. Open the restrictions settings.\n2. Open user settings.\n3. Select \"Enable security logging\".\n4. Select \"Enable network logging\".\n\nIf the MDM console device policy is not set to enable audit logging, this is a finding.",
"description": "Audit logs enable monitoring of security-relevant events and subsequent forensics when breaches occur. To be useful, Administrators must have the ability to view the audit logs.\n\nSFR ID: FMT_SMF_EXT.1.1 #32",
"fixid": "F-103021r1_fix",
"fixtext": "Configure the Google Android Pie to enable audit logging.\n\nOn the MDM console:\n\n1. Open the restrictions settings.\n2. Open user settings.\n3. Select \"Enable security logging\".\n4. Select \"Enable network logging\".",
"iacontrols": null,
"id": "V-97341",
"ruleID": "SV-106445r1_rule",
"severity": "medium",
"title": "The Google Android Pie must be configured to enable audit logging.",
"version": "GOOG-09-005505"
},
"V-97343": {
"checkid": "C-96179r1_chk",
"checktext": "Review Google Android device configuration settings to determine if the mobile device is configured to generate audit records for the following auditable events: detected integrity violations.\n\nThis validation procedure is performed only on the MDM Administration Console. \n\nOn the MDM console, do the following:\n1. Go to Policy management.\n2. Confirm Security Logging is enabled.\n\nIf the MDM console device policy is not set to enable security logging, this is a finding.",
"description": "Audit logs enable monitoring of security-relevant events and subsequent forensics when breaches occur. They help identify attacks so that breaches can either be prevented or limited in their scope. They facilitate analysis to improve performance and security. The Requirement Statement lists key events that the system must generate an audit record for.\n\nApplication note: Requirement applies only to integrity violation detections that can be logged by the audit logging component.\n\nSFR ID: FMT_SMF_EXT.1.1 #37",
"fixid": "F-103023r1_fix",
"fixtext": "Configure the Google Android device to generate audit records for the following auditable events: detected integrity violations.\n\nOn the MDM console, do the following:\n\nOn the MDM Console:\n1. Go to Policy management.\n2. Enable Security Logging.",
"iacontrols": null,
"id": "V-97343",
"ruleID": "SV-106447r1_rule",
"severity": "low",
"title": "The Google Android Pie must be configured to generate audit records for the following auditable events: detected integrity violations.",
"version": "GOOG-09-006100"
},
"V-97345": {
"checkid": "C-96181r1_chk",
"checktext": "Review a sample of site User Agreements for Google device users or similar training records and training course content. \n\nVerify that Google device users have completed the required training. The intent is that required training is renewed on a periodic basis in a time period determined by the AO. \n\nIf any Google device user has not completed the required training, this is a finding.",
"description": "The security posture of Google devices requires the device user to configure several required policy rules on their device. User-Based Enforcement (UBE) is required for these controls. In addition, if the Authorizing Official (AO) has approved the use of an unmanaged personal space, the user must receive training on risks. If a user is not aware of their responsibilities and does not comply with UBE requirements, the security posture of the Google mobile device may become compromised and DoD sensitive data may become compromised.\n\nSFR ID: NA",
"fixid": "F-103025r1_fix",
"fixtext": "Have all Google device users complete training on the following topics. Users should acknowledge that they have reviewed training via a signed User Agreement or similar written record. \n\nTraining topics: \n\n- Operational security concerns introduced by unmanaged applications/unmanaged personal space, including applications using global positioning system (GPS) tracking. \n- Need to ensure no DoD data is saved to the personal space or transmitted from a personal app (for example, from personal email). \n- If the Purebred key management app is used, users are responsible for maintaining positive control of their credentialed device at all times. The DoD PKI certificate policy requires subscribers to maintain positive control of the devices that contain private keys and to report any loss of control so the credentials can be revoked. Upon device retirement, turn-in, or reassignment, ensure that a factory data reset is performed prior to device hand-off. Follow mobility service provider decommissioning procedures as applicable. \n- How to configure the following UBE controls (users must configure the control) on the Google device: \n **Secure use of Calendar Alarm \n **Local screen mirroring and Mirroring procedures (authorized/not authorized for use) \n **Do not upload DoD contacts via smart call and caller ID services \n **Do not remove DoD intermediate and root PKI digital certificates \n **Disable Wi-Fi Sharing \n **Do not configure a DoD network (work) VPN profile on any third-party VPN client installed in the personal space \n **If Bluetooth connections are approved for mobile device, types of allowed connections (for example car handsfree, but not Bluetooth wireless keyboard)\n- AO guidance on acceptable use and restrictions, if any, on downloading and installing personal apps and data (music, photos, etc.) in the Google device personal space.",
"iacontrols": null,
"id": "V-97345",
"ruleID": "SV-106449r1_rule",
"severity": "medium",
"title": "Google Android Pie users must complete required training.",
"version": "GOOG-09-008700"
},
"V-97347": {
"checkid": "C-96183r1_chk",
"checktext": "Review device configuration settings to confirm Wi-Fi Sharing is disabled. \n\nMobile Hotspot must be enabled in order to enable Wi-Fi Sharing. If the Authorizing Official (AO) has not approved Mobile Hotspot, and it has been verified as disabled on the MDM console, no further action is needed. If Mobile Hotspot is being used, use the following procedure to verify Wi-Fi Sharing is disabled: \n\nOn the MDM console:\n1. Open the User restrictions setting.\n2. Verify \"Disallow config tethering\" to on.\n\nOn the Google Android Pie device, do the following: \n1. Open Settings. \n2. Tap \"Networks & internet\". \n3. Verify that \"Hotspots & tethering\" is disabled. \n\nIf on the Google Android Pie device \"Wi-Fi sharing\" is enabled, this is a finding.",
"description": "Wi-Fi Sharing is an optional configuration of Wi-Fi Tethering/Mobile Hotspot, which allows the device to share its Wi-Fi connection with other wirelessly connected devices instead of its mobile (cellular) connection. \n\nWi-Fi Sharing grants the \"other\" device access to a corporate Wi-Fi network and may possibly bypass the network access control mechanisms. This risk can be partially mitigated by requiring the use of a preshared key for personal hotspots.\n\nSFR ID: FMT_SMF_EXT.1.1 #47",
"fixid": "F-103027r1_fix",
"fixtext": "Configure Google Android Pie to disable Wi-Fi Sharing. \n\nMobile Hotspot must be enabled in order to enable Wi-Fi Sharing. If the AO has not approved Mobile Hotspot, and it has been disabled on the MDM console, no further action is needed. If Mobile Hotspot is being used, use the following procedure to disable Wi-Fi Sharing: \n\nOn the MDM console:\n1. Open the User restrictions setting.\n2. Set \"Disallow config tethering\" to on.",
"iacontrols": null,
"id": "V-97347",
"ruleID": "SV-106451r1_rule",
"severity": "medium",
"title": "Google Android Pie must be configured to enforce that Wi-Fi Sharing is disabled.",
"version": "GOOG-09-008800"
},
"V-97349": {
"checkid": "C-96185r1_chk",
"checktext": "Review device configuration settings to confirm that the DoD root and intermediate PKI certificates are installed. \n\nThis procedure is performed on both the MDM Administration console and the Google Android Pie device. \n\nThe current DoD root and intermediate PKI certificates may be obtained in self-extracting zip files at http://cyber.mil/pki-pke (for NIPRNet). \n\nOn the MDM console verify that the DoD root and intermediate certificates are part of a device and/or work profile that is being pushed down to the devices.\n\nOn the Google Android Pie device, do the following: \n1. Open Settings. \n2. Tap \"Security & Location\". \n3. Tap on \"Advanced\".\n4. Tap on \"Encryption & credentials\".\n5. Tap on \"Trusted credentials\".\n6. Verify that DoD root and intermediate PKI certificates are listed under the user tab.\n\nIf on the MDM console the DoD root and intermediate certificates are not listed in a profile, or on the Google Android Pie device does not list the DoD root and intermediate certificates under the user tab, this is a finding.",
"description": "DoD root and intermediate PKI certificates are used to verify the authenticity of PKI certificates of users and web services. If the root and intermediate certificates are not available, an adversary could falsely sign a certificate in such a way that it could not be detected. Providing access to the DoD root and intermediate PKI certificates greatly diminishes the risk of this attack.\n\nSFR ID: FMT_SMF_EXT.1.1 #47",
"fixid": "F-103029r1_fix",
"fixtext": "Configure Google Android Pie to install DoD root and intermediate certificates. \n\nOn the MDM console upload DoD root and intermediate certificates as part of a device and/or work profile\n\nThe current DoD root and intermediate PKI certificates may be obtained in self-extracting zip files at http://cyber.mil/pki-pke (for NIPRNet).",
"iacontrols": null,
"id": "V-97349",
"ruleID": "SV-106453r1_rule",
"severity": "medium",
"title": "Google Android Pie must have the DoD root and intermediate PKI certificates installed.",
"version": "GOOG-09-009000"
},
"V-97351": {
"checkid": "C-96187r1_chk",
"checktext": "Review the device configuration to confirm that the user is unable to remove DoD root and intermediate PKI certificates.\n\nOn the MDM console:\n1. Open the User restrictions setting.\n2. Verify that \"Disallow config credentials\" to on for the work profile.\n\nOn the Google Android Pie device, do the following: \n1. Open Settings. \n2. Tap \"Security & Location\". \n3. Tap on \"Advanced\".\n4. Tap on \"Encryption & credentials\".\n5. Tap on \"Trusted credentials\".\n6. Verify that the user is unable to untrust or remove any work certificates.\n\nIf on the Google Android Pie device the user is able to remove certificates, this is a finding.",
"description": "DoD root and intermediate PKI certificates are used to verify the authenticity of PKI certificates of users and web services. If the user is allowed to remove root and intermediate certificates, the user could allow an adversary to falsely sign a certificate in such a way that it could not be detected. Restricting the ability to remove DoD root and intermediate PKI certificates to the Administrator mitigates this risk.\n\nSFR ID: FMT_MOF_EXT.1.2 #47",
"fixid": "F-103031r1_fix",
"fixtext": "Configure Google Android Pie to prevent a user from removing DoD root and intermediate PKI certificates.\n\nOn the MDM console:\n1. Open the User restrictions setting.\n2. Set \"Disallow config credentials\" to on for the work profile.",
"iacontrols": null,
"id": "V-97351",
"ruleID": "SV-106455r1_rule",
"severity": "medium",
"title": "Google Android Pie must allow only the administrator (MDM) to install/remove DoD root and intermediate PKI certificates.",
"version": "GOOG-09-009100"
},
"V-97353": {
"checkid": "C-96189r1_chk",
"checktext": "Review the Google Android Pie Work Profile configuration settings to confirm that users are prevented from adding personal email accounts to the work email app. \n\nThis procedure is performed on both the MDM Administrator console and the Google Android Pie device. \n\nOn the MDM console:\n1. Open the User restrictions setting.\n2. Verify that \"Disallow add accounts\" is set to on.\n\nOn the Google Android Pie device, do the following: \n1. Open Settings. \n2. Tap \"Accounts\". \n3. Verify that \"Add account\" is grayed out under the Work section.\n\nIf on the MDM console the restriction to \"Disallow add accounts\" is not set or on the Google Android Pie device the user is able to add an account, this is a finding.",
"description": "If the user is able to add a personal email account (POP3, IMAP, EAS) to the work email app, it could be used to forward sensitive DoD data to unauthorized recipients. Restricting email account addition to the administrator or restricting email account addition to whitelisted accounts mitigates this vulnerability.\n\nSFR ID: FMT_SMF_EXT.1.1 #47",
"fixid": "F-103033r1_fix",
"fixtext": "Configure Google Android Pie Work Profile to prevent users from adding personal email accounts to the work email app. \n\nOn the MDM console, for the Work Profile, do the following: \n1. Open the User restrictions setting.\n2. Set \"Disallow modify accounts\" to on.\n\nRefer to the MDM documentation to determine how to provision users' work email accounts for the work email app.",
"iacontrols": null,
"id": "V-97353",
"ruleID": "SV-106457r1_rule",
"severity": "medium",
"title": "The Google Android Pie Work Profile must be configured to prevent users from adding personal email accounts to the work email app.",
"version": "GOOG-09-009200"
},
"V-97355": {
"checkid": "C-96191r1_chk",
"checktext": "Review the Google Android Pie Work Profile configuration settings to confirm the system application disable list is enforced. This setting is enforced by default. What needs to happen is to verify only approved system apps have been placed on the core whitelist.\n\nThis procedure is performed on the MDM Administrator console. \n\nReview the system app white list and verify only approved apps are on the list.\n\nIf on the MDM console the system app white list contains unapproved core apps, this is a finding.",
"description": "The system application disable list controls user access to/execution of all core and preinstalled applications. \n\nCore application: Any application integrated into Google Android Pie by Google. \n\nPreinstalled application: Additional noncore applications included in the Google Android Pie build by Google or the wireless carrier. \n\nSome system applications can compromise DoD data or upload users' information to non-DoD-approved servers. A user must be blocked from using such applications that exhibit behavior that can result in compromise of DoD data or DoD user information. \n\nThe site administrator must analyze all preinstalled applications on the device and disable all applications not approved for DoD use by configuring the system application disable list.\n\nSFR ID: FMT_SMF_EXT.1.1 #47",
"fixid": "F-103035r1_fix",
"fixtext": "Configure Google Android Pie Work Profile to enforce the system application disable list. \n\nThe required configuration is the default configuration when the device is enrolled. If the device configuration is changed, use the following procedure to bring the device back into compliance:\n\nOn the MDM, configure a list of approved Google core and preinstalled apps in the core app white list.",
"iacontrols": null,
"id": "V-97355",
"ruleID": "SV-106459r1_rule",
"severity": "medium",
"title": "Google Android Pie work profile must be configured to enforce the system application disable list.",
"version": "GOOG-09-009400"
},
"V-97357": {
"checkid": "C-96193r1_chk",
"checktext": "Review that Google Android Pie is configured as Corporate Owned Work Managed.\n\nThis procedure is performed on both the MDM Administrator console and the Google Android Pie device. \n\nOn the MDM console, verify that the default enrollment is set to Corporate Owned Work Managed.\n\nOn the Google Android Pie device, do the following: \n1. Go to the application drawer.\n2. Ensure that you see a Personal and a Work Tab.\n\nIf on the MDM console the account the default enrollment is set to Corporate Owned Work Managed or on the Google Android Pie device the user does not see a Work tab, this is a finding.",
"description": "The Android Enterprise Work Profile is the designated application group for the COPE use case.\n\nSFR ID: FMT_SMF_EXT.1.1 #47",
"fixid": "F-103037r1_fix",
"fixtext": "Configure Google Android Pie in a Corporate Owned Work Managed configuration.\n\nOn the MDM console, configure the default enrollment as Corporate Owned Work Managed.\n\nRefer to the MDM documentation to determine how to configure the device to enroll as Corporate Owned Work Managed.",
"iacontrols": null,
"id": "V-97357",
"ruleID": "SV-106461r1_rule",
"severity": "medium",
"title": "Google Android Pie must be provisioned as a fully managed device and configured to create a work profile.",
"version": "GOOG-09-009600"
},
"V-97359": {
"checkid": "C-96195r1_chk",
"checktext": "Review Chrome Browser in Google Android Pie Work Profile autofill setting.\n\nThis procedure is performed only on the MDM Administrator console. \n\nOn the MDM console, for the Work Profile, do the following: \n1. Open the Chrome Browser Settings.\n2. Verify \"Enable autofill\" is set to off.\n\nIf on the MDM console autofill is set to on in the Chrome Browser Settings, this is a finding.",
"description": "The autofill functionality in the web browser allows the user to complete a form that contains sensitive information, such as personally identifiable information (PII), without previous knowledge of the information. By allowing the use of autofill functionality, an adversary who learns a user's Google Android Pie device password, or who otherwise is able to unlock the device, may be able to further breach other systems by relying on the autofill feature to provide information unknown to the adversary. By disabling the autofill functionality, the risk of an adversary gaining further information about the device's user or compromising other systems is significantly mitigated.\n\nSFR ID: FMT_SMF_EXT.1.1 #47",
"fixid": "F-103039r1_fix",
"fixtext": "Configure Chrome Browser in Google Android Pie Work Profile to disable autofill.\n\nOn the MDM console, for the Work Profile, do the following: \n1. Open the Chrome Browser Settings.\n2. Set \"Enable autofill\" to off.\n\nRefer to the MDM documentation to determine how to configure Chrome Browser Settings.",
"iacontrols": null,
"id": "V-97359",
"ruleID": "SV-106463r1_rule",
"severity": "medium",
"title": "Google Android Pie work profile must be configured to disable automatic completion of work space Internet browser text input.",
"version": "GOOG-09-009800"
},
"V-97361": {
"checkid": "C-96197r1_chk",
"checktext": "Review the Google Android Pie Workspace configuration settings to confirm that autofill services are disabled. \n\nThis procedure is performed only on the MDM Administration console. \n\nOn the MDM console, for the Workspace, in the \"Android user restrictions\" group, under the work profile, verify that \"disallow autofill\" is selected. \n\nIf on the MDM console \"disallow autofill\" is selected, this is a finding.",
"description": "The autofill services allow the user to complete text inputs that could contain sensitive information, such as personally identifiable information (PII), without previous knowledge of the information. By allowing the use of autofill services, an adversary who learns a user's Google Android Pie device password, or who otherwise is able to unlock the device, may be able to further breach other systems by relying on the autofill services to provide information unknown to the adversary. By disabling the autofill services, the risk of an adversary gaining further information about the device's user or compromising other systems is significantly mitigated. \n\nExamples of apps that offer autofill services include Samsung Pass, Google, Dashlane, LastPass, and 1Password.\n\nSFR ID: FMT_SMF_EXT.1.1 #47",
"fixid": "F-103041r1_fix",
"fixtext": "Configure Google Android Pie Workspace to disable the autofill services. \n\nOn the MDM console, in the Android work profile restrictions, select \"disallow autofill\".",
"iacontrols": null,
"id": "V-97361",
"ruleID": "SV-106465r1_rule",
"severity": "medium",
"title": "Google Android Pie Work Profile must be configured to disable the autofill services.",
"version": "GOOG-09-010000"
},
"V-97363": {
"checkid": "C-96199r1_chk",
"checktext": "Review the Google Android Pie Work Profile configuration settings to confirm that autofill services are disabled. \n\nThis procedure is performed on both the MDM Administration console and the Google Android Pie device. \n\nOn the MDM console, verify that \"Set auto (network) time required\" to on\".\n\nOn the Google Android Pie device, do the following: \n1. Open Settings. \n2. Tap \"System\". \n3. Tap \"Date & times\". \n4. Verify that \"Automatic date & time\" is grayed out.\n\nIf on the MDM console \"Set auto (network) time required\" to on\", or on the Google Android Pie device \"Automatic date & time\" is grayed out, this is a finding.",
"description": "Determining the correct time a particular application event occurred on a system is critical when conducting forensic analysis and investigating system events. \n\nPeriodically synchronizing internal clocks with an authoritative time source is necessary to correctly correlate the timing of events that occur across the enterprise. The three authoritative time sources for Google Android Pie are an authoritative time server that is synchronized with redundant United States Naval Observatory (USNO) time servers as designated for the appropriate DoD network (NIPRNet or SIPRNet), or the Global Positioning System (GPS), or the wireless carrier. \n\nTime stamps generated by the audit system in Google Android Pie must include both date and time. The time may be expressed in Coordinated Universal Time (UTC), a modern continuation of Greenwich Mean Time (GMT), or local time with an offset from UTC.\n\nSFR ID: FMT_SMF_EXT.1.1 #47",
"fixid": "F-103043r1_fix",
"fixtext": "Configure Google Android Pie Work Profile to set auto network time.\n\nOn the MDM console, in the Android user restrictions section, select \"Set auto (network) time required\" to on\".",
"iacontrols": null,
"id": "V-97363",
"ruleID": "SV-106467r1_rule",
"severity": "medium",
"title": "Google Android Pie must be configured to disallow configuration of date and time.",
"version": "GOOG-09-010200"
},
"V-97365": {
"checkid": "C-96201r1_chk",
"checktext": "Review the Google Android Pie device configuration settings to confirm that outgoing beam is disallowed. \n\nThis procedure is performed on both the MDM Administration console and the Google Android Pie device. \n\nOn the MDM console, in the Android user restrictions section, select \"Disallow outgoing beam\" to on\".\n\nOn the Google Android Pie device, do the following: \n1. Open Settings. \n2. Tap \"Connected devices\". \n3. Tap \"Connection preferences\". \n4. Verify that \"Android Beam\" is off and grayed out.\n\nIf on the MDM console \"Disallow outgoing beam\" is not set to on, or on the Google Android Pie device \"Android Beam\" is not off and grayed out, this is a finding.",
"description": "Outgoing beam allows transfer of data through near field communication (NFC) and Bluetooth by touching two unlocked devices together. If it were enabled, sensitive DoD data could be transmitted. \n\nBecause of the security risks of sharing sensitive DoD data, users must not be able to allow outgoing beam.\n\nSFR ID: FMT_MOF_EXT.1.2 #47",
"fixid": "F-103045r1_fix",
"fixtext": "Configure Google Android Pie device to disallow outgoing beam. \n\nOn the MDM console, in the Android user restrictions section, select \"Disallow outgoing beam\" to on.",
"iacontrols": null,
"id": "V-97365",
"ruleID": "SV-106469r1_rule",
"severity": "medium",
"title": "Google Android Pie must configured to disallow outgoing beam.",
"version": "GOOG-09-010400"
},
"V-97367": {
"checkid": "C-96203r1_chk",
"checktext": "Review device configuration settings to confirm that the Google Android devicet recently released version of Google Android Pie is installed. For Google Android Pie, version PQ3A.190605.003.A3 must be installed (it is the NIAP approved version). Note: This version of Android can only be installed on Pixel 3 devices purchased directly from Google. \n\nThis procedure is performed on both the MDM console and the Google Android Pie device. \n\nIn the MDM management console, review the version of Google Android Pie installed on a sample of managed devices. This procedure will vary depending on the MDM product. \n\nOn the Google Android Pie device, to see the installed operating system version: \n1. Open Settings. \n2. Tap \"About phone\". \n3. Verify \"Build number\". \n\nIf the installed version of the Android operating system on any reviewed Samsung devices is not the latest released by the wireless carrier, this is a finding. \n\nGoogle's Android operating system patch website: https://source.android.com/security/bulletin/",
"description": "Required security features are not available in earlier operating system versions. In addition, there may be known vulnerabilities in earlier versions.\n\nSFR ID: FMT_SMF_EXT.1.1 #47",
"fixid": "F-103047r1_fix",
"fixtext": "Install the latest released version of the Google Android Pie operating system on all managed Google devices. For Google Android Pie, version PQ3A.190605.003.A3 must be installed (it is the NIAP approved version) Note: This version of Android can only be installed on Pixel 3 devices purchased directly from Google. \n\nNote: In Google Android devicet cases, operating system updates are released by the wireless carrier (for example, Sprint, T-Mobile, Verizon Wireless, and ATT).",
"iacontrols": null,
"id": "V-97367",
"ruleID": "SV-106471r1_rule",
"severity": "high",
"title": "Google Android Pie devices must have the latest available Google Android Pie operating system installed.",
"version": "GOOG-09-010800"
},
"V-97369": {
"checkid": "C-96205r1_chk",
"checktext": "Review device configuration settings to confirm that version PQ3A.190605.003.A3is installed (it is the NIAP approved version). Note: This version of Android can only be installed on Pixel 3 devices purchased directly from Google. \n\nThis procedure is performed on both the MDM console and the Google Android Pie device. \n\nIn the MDM management console, review the version of Google Android Pie installed on a sample of managed devices. \n\nOn the Google Android Pie device, to see the installed operating system version: \n1. Open Settings. \n2. Tap \"About phone\". \n3. Verify \"Build number\". \n\nIf the installed version of the Android operating system on any reviewed Samsung devices is not the latest released by the wireless carrier, this is a finding. \n\nGoogle's Android operating system patch website: https://source.android.com/security/bulletin/ \n\nIf the installed version of the Android Pie operating system is not the NIAP approved version, this is a finding.",
"description": "Required security features are not available in earlier operating system versions. In addition, there may be known vulnerabilities in earlier versions.\n\nSFR ID: FMT_SMF_EXT.1.1 #47",
"fixid": "F-103049r1_fix",
"fixtext": "Install the latest released version of the Google Android Pie operating system on all managed Google devices. For Google Android Pie, version PQ3A.190605.003.A3 must be installed (it is the NIAP approved version). Note: This version of Android can only be installed on Pixel 3 devices purchased directly from Google. \n\nNote: In Google Android devicet cases, operating system updates are released by the wireless carrier (for example, Sprint, T-Mobile, Verizon Wireless, and ATT).",
"iacontrols": null,
"id": "V-97369",
"ruleID": "SV-106473r1_rule",
"severity": "high",
"title": "Google Android Pie devices must have a NIAP validated Google Android Pie operating system installed.",
"version": "GOOG-09-010900"
}
},
"profiles": {
"MAC-1_Classified": {
"description": "",
"findings": {
"V-97305": "true",
"V-97307": "true",
"V-97309": "true",
"V-97311": "true",
"V-97313": "true",
"V-97315": "true",
"V-97317": "true",
"V-97319": "true",
"V-97321": "true",
"V-97323": "true",
"V-97325": "true",
"V-97327": "true",
"V-97329": "true",
"V-97331": "true",
"V-97333": "true",
"V-97335": "true",
"V-97337": "true",
"V-97339": "true",
"V-97341": "true",
"V-97343": "true",
"V-97345": "true",
"V-97347": "true",
"V-97349": "true",
"V-97351": "true",
"V-97353": "true",
"V-97355": "true",
"V-97357": "true",
"V-97359": "true",
"V-97361": "true",
"V-97363": "true",
"V-97365": "true",
"V-97367": "true",
"V-97369": "true"
},
"id": "MAC-1_Classified",
"title": "I - Mission Critical Classified"
},
"MAC-1_Public": {
"description": "",
"findings": {
"V-97305": "true",
"V-97307": "true",
"V-97309": "true",
"V-97311": "true",
"V-97313": "true",
"V-97315": "true",
"V-97317": "true",
"V-97319": "true",
"V-97321": "true",
"V-97323": "true",
"V-97325": "true",
"V-97327": "true",
"V-97329": "true",
"V-97331": "true",
"V-97333": "true",
"V-97335": "true",
"V-97337": "true",
"V-97339": "true",
"V-97341": "true",
"V-97343": "true",
"V-97345": "true",
"V-97347": "true",
"V-97349": "true",
"V-97351": "true",
"V-97353": "true",
"V-97355": "true",
"V-97357": "true",
"V-97359": "true",
"V-97361": "true",
"V-97363": "true",
"V-97365": "true",
"V-97367": "true",
"V-97369": "true"
},
"id": "MAC-1_Public",
"title": "I - Mission Critical Public"
},
"MAC-1_Sensitive": {
"description": "",
"findings": {
"V-97305": "true",
"V-97307": "true",
"V-97309": "true",
"V-97311": "true",
"V-97313": "true",
"V-97315": "true",
"V-97317": "true",
"V-97319": "true",
"V-97321": "true",
"V-97323": "true",
"V-97325": "true",
"V-97327": "true",
"V-97329": "true",
"V-97331": "true",
"V-97333": "true",
"V-97335": "true",
"V-97337": "true",
"V-97339": "true",
"V-97341": "true",
"V-97343": "true",
"V-97345": "true",
"V-97347": "true",
"V-97349": "true",
"V-97351": "true",
"V-97353": "true",
"V-97355": "true",
"V-97357": "true",
"V-97359": "true",
"V-97361": "true",
"V-97363": "true",
"V-97365": "true",
"V-97367": "true",
"V-97369": "true"
},
"id": "MAC-1_Sensitive",
"title": "I - Mission Critical Sensitive"
},
"MAC-2_Classified": {
"description": "",
"findings": {
"V-97305": "true",
"V-97307": "true",
"V-97309": "true",
"V-97311": "true",
"V-97313": "true",
"V-97315": "true",
"V-97317": "true",
"V-97319": "true",
"V-97321": "true",
"V-97323": "true",
"V-97325": "true",
"V-97327": "true",
"V-97329": "true",
"V-97331": "true",
"V-97333": "true",
"V-97335": "true",
"V-97337": "true",
"V-97339": "true",
"V-97341": "true",
"V-97343": "true",
"V-97345": "true",
"V-97347": "true",
"V-97349": "true",
"V-97351": "true",
"V-97353": "true",
"V-97355": "true",
"V-97357": "true",
"V-97359": "true",
"V-97361": "true",
"V-97363": "true",
"V-97365": "true",
"V-97367": "true",
"V-97369": "true"
},
"id": "MAC-2_Classified",
"title": "II - Mission Support Classified"
},
"MAC-2_Public": {
"description": "",
"findings": {
"V-97305": "true",
"V-97307": "true",
"V-97309": "true",
"V-97311": "true",
"V-97313": "true",
"V-97315": "true",
"V-97317": "true",
"V-97319": "true",
"V-97321": "true",
"V-97323": "true",
"V-97325": "true",
"V-97327": "true",
"V-97329": "true",
"V-97331": "true",
"V-97333": "true",
"V-97335": "true",
"V-97337": "true",
"V-97339": "true",
"V-97341": "true",
"V-97343": "true",
"V-97345": "true",
"V-97347": "true",
"V-97349": "true",
"V-97351": "true",
"V-97353": "true",
"V-97355": "true",
"V-97357": "true",
"V-97359": "true",
"V-97361": "true",
"V-97363": "true",
"V-97365": "true",
"V-97367": "true",
"V-97369": "true"
},
"id": "MAC-2_Public",
"title": "II - Mission Support Public"
},
"MAC-2_Sensitive": {
"description": "",
"findings": {
"V-97305": "true",
"V-97307": "true",
"V-97309": "true",
"V-97311": "true",
"V-97313": "true",
"V-97315": "true",
"V-97317": "true",
"V-97319": "true",
"V-97321": "true",
"V-97323": "true",
"V-97325": "true",
"V-97327": "true",
"V-97329": "true",
"V-97331": "true",
"V-97333": "true",
"V-97335": "true",
"V-97337": "true",
"V-97339": "true",
"V-97341": "true",
"V-97343": "true",
"V-97345": "true",
"V-97347": "true",
"V-97349": "true",
"V-97351": "true",
"V-97353": "true",
"V-97355": "true",
"V-97357": "true",
"V-97359": "true",
"V-97361": "true",
"V-97363": "true",
"V-97365": "true",
"V-97367": "true",
"V-97369": "true"
},
"id": "MAC-2_Sensitive",
"title": "II - Mission Support Sensitive"
},
"MAC-3_Classified": {
"description": "",
"findings": {
"V-97305": "true",
"V-97307": "true",
"V-97309": "true",
"V-97311": "true",
"V-97313": "true",
"V-97315": "true",
"V-97317": "true",
"V-97319": "true",
"V-97321": "true",
"V-97323": "true",
"V-97325": "true",
"V-97327": "true",
"V-97329": "true",
"V-97331": "true",
"V-97333": "true",
"V-97335": "true",
"V-97337": "true",
"V-97339": "true",
"V-97341": "true",
"V-97343": "true",
"V-97345": "true",
"V-97347": "true",
"V-97349": "true",
"V-97351": "true",
"V-97353": "true",
"V-97355": "true",
"V-97357": "true",
"V-97359": "true",
"V-97361": "true",
"V-97363": "true",
"V-97365": "true",
"V-97367": "true",
"V-97369": "true"
},
"id": "MAC-3_Classified",
"title": "III - Administrative Classified"
},
"MAC-3_Public": {
"description": "",
"findings": {
"V-97305": "true",
"V-97307": "true",
"V-97309": "true",
"V-97311": "true",
"V-97313": "true",
"V-97315": "true",
"V-97317": "true",
"V-97319": "true",
"V-97321": "true",
"V-97323": "true",
"V-97325": "true",
"V-97327": "true",
"V-97329": "true",
"V-97331": "true",
"V-97333": "true",
"V-97335": "true",
"V-97337": "true",
"V-97339": "true",
"V-97341": "true",
"V-97343": "true",
"V-97345": "true",
"V-97347": "true",
"V-97349": "true",
"V-97351": "true",
"V-97353": "true",
"V-97355": "true",
"V-97357": "true",
"V-97359": "true",
"V-97361": "true",
"V-97363": "true",
"V-97365": "true",
"V-97367": "true",
"V-97369": "true"
},
"id": "MAC-3_Public",
"title": "III - Administrative Public"
},
"MAC-3_Sensitive": {
"description": "",
"findings": {
"V-97305": "true",
"V-97307": "true",
"V-97309": "true",
"V-97311": "true",
"V-97313": "true",
"V-97315": "true",
"V-97317": "true",
"V-97319": "true",
"V-97321": "true",
"V-97323": "true",
"V-97325": "true",
"V-97327": "true",
"V-97329": "true",
"V-97331": "true",
"V-97333": "true",
"V-97335": "true",
"V-97337": "true",
"V-97339": "true",
"V-97341": "true",
"V-97343": "true",
"V-97345": "true",
"V-97347": "true",
"V-97349": "true",
"V-97351": "true",
"V-97353": "true",
"V-97355": "true",
"V-97357": "true",
"V-97359": "true",
"V-97361": "true",
"V-97363": "true",
"V-97365": "true",
"V-97367": "true",
"V-97369": "true"
},
"id": "MAC-3_Sensitive",
"title": "III - Administrative Sensitive"
}
},
"slug": "google_android_9.x",
"title": "Google Android 9.x Security Technical Implementation Guide",
"version": "1"
}
}