Review the mobile operating system configuration to determine how the operating system responds in the event of a failed automated security test and tampering of the OS files. If the device is integrated with mobile device management (MDM) able to access device logs, then review system logs to determine if the operating system has provided notification of a failed automated security test. Otherwise, determine if there is some form of beaconing or alerting that could be detectable by an MDM or other network management system, or if the OS will terminate the boot cycle should the integrity of the OS files be compromised. If higher assurance is required, perform an action that would cause the device to fail an automated security test (e.g., insert unknown removable media), and verify the operating system provides notification of the failure. If there are any known security tests for which notification does not occur, this is a finding. |