Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-231038 | KNOX-11-017800 | SV-231038r608683_rule | Medium |
Description |
---|
The system application disable list controls user access/execution of all core and pre-installed applications. Core application: Any application integrated into Samsung Android by Google or Samsung. Pre-installed application: Additional non-core applications included in the Samsung Android build by Google, Samsung, or the wireless carrier. Some system applications can compromise DoD data or upload users' information to non-DoD-approved servers. A user must be blocked from using applications that exhibit behavior that can result in compromise of DoD data or DoD user information. The site Administrator must analyze all pre-installed applications on the device and disable all applications not approved for DoD use by configuring the system application disable list. SFR ID: FMT_SMF_EXT.1.1 #47 |
STIG | Date |
---|---|
Samsung Android 11 with Knox 3.x Legacy Security Technical Implementation Guide | 2020-12-08 |
Check Text ( C-33968r592728_chk ) |
---|
Review Samsung Android Personal Environment configuration settings to determine if the system application disable list is enforced. This procedure is only for the Personal Environment of a COPE deployment. This validation procedure is performed on both the management tool Administration Console and the Samsung Android device. On the management tool, in the device application section, verify that the "system app disable list" contains all apps that have not been approved for DoD use by the Authorizing Official (AO). On the Samsung Android device, review the Personal Environment apps and confirm that only approved core and preinstalled app are listed. If on the management tool the "system app disable list" contains non-approved core and preinstalled apps, or on the Samsung Android device non-approved apps are listed, this is a finding. |
Fix Text (F-33941r592729_fix) |
---|
Configure the Samsung Android device to enforce the system application disable list. This guidance is only for the Personal Environment of a COPE deployment. On the management tool, in the device application section, add all non-AO-approved system app packages to the "system app disable list". |