UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The LG Android 5.0 platform must be configured to enforce an application installation policy by specifying one or more authorized application repositories: disable Google Play.


Overview

Finding ID Version Rule ID IA Controls Severity
V-58775 LGA5-10-000401 SV-73205r1_rule Medium
Description
Forcing all applications to be installed from authorized application repositories can prevent unauthorized and malicious applications from being installed and executed on mobile devices. Allowing such installations and executions could cause a compromise of DoD data accessible by these unauthorized/malicious applications. SFR ID: FMT_SMF.1.1 #10
STIG Date
LG Android 5.x Interim Security Configuration Guide 2015-09-22

Details

Check Text ( C-59619r2_chk )
This validation procedure is performed on both the MDM Administration Console and the LG Android device.

Check whether the appropriate setting is configured on the MDM Administration Console:
1. Ask the MDM administrator to display the "Allow Google Play Store" setting in the MDM console.
2. Verify the setting is disabled.

On the LG Android device:
1. Unlock the device
2. Navigate to the Play Store: Apps >> Play Store
3. Verify Google Play Store application does not run.

If the "Allow Google Play Store" setting is enabled, or if the user is able to run the Google Play Store on the device, this is a finding.
Fix Text (F-64159r1_fix)
Configure the mobile device to use one or more authorized application repositories.

On the MDM Administration Console, disable "Google Play Store".