UCF STIG Viewer Logo

LG Android 6.x must enforce an application installation policy by specifying one or more authorized application repositories by disabling Google Play.


Overview

Finding ID Version Rule ID IA Controls Severity
V-66815 LGA6-20-100601 SV-81305r2_rule Medium
Description
Forcing all applications to be installed from authorized application repositories can prevent unauthorized and malicious applications from being installed and executed on mobile devices. Allowing such installations and executions could cause a compromise of DoD data accessible by these unauthorized/malicious applications. SFR ID: FMT_SMF_EXT.1.1 #10a
STIG Date
LG Android 6.x Security Technical Implementation Guide 2019-02-21

Details

Check Text ( C-67465r3_chk )
This validation procedure is performed on both the MDM Administration Console and the LG Android device.

On the MDM console, do the following:

1. Ask the MDM administrator to display the "Allow Google Play Store" setting in the MDM console.
2. Verify the setting is disabled.
3. Verify the policy has been assigned to all groups.

On the LG Android device:

1. Unlock the device.
2. Navigate to the Play Store on the device home screen.
3. Verify Google Play Store application does not run.

If on the MDM console the "Allow Google Play Store" setting is enabled or if the user is able to run the Google Play Store on the LG Android device, this is a finding.
Fix Text (F-72915r3_fix)
Configure the mobile operating system to disable unauthorized application repositories.

On the MDM Administration Console, disable "Google Play Store".