UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Samsung Android OS 10 with Knox 3.x Security Technical Implementation Guide


Overview

Date Finding Count (43)
2020-03-24 CAT I (High): 3 CAT II (Med): 37 CAT III (Low): 3
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Available Profiles



Findings (MAC II - Mission Support Classified)

Finding ID Severity Title
V-99995 High The Samsung Android device must have the latest available Samsung Android operating system (OS) installed.
V-99933 High Samsung Android must be configured to enable encryption for data at rest on removable storage media or alternatively, the use of removable storage media must be disabled.
V-99977 High Samsung Android must be configured to enable Knox CC Mode.
V-99915 Medium Samsung Android must be configured to not allow passwords that include more than two repeating or sequential characters.
V-99913 Medium Samsung Android must be configured to enforce a minimum password length of six characters.
V-99939 Medium Samsung Android must be configured to disable developer modes.
V-99945 Medium Samsung Android must be configured to not allow backup of all applications, configuration data to locally connected systems.
V-99947 Medium Samsung Android Work Environment must be configured to not allow backup of all applications, configuration data to remote systems (device management backup). - Disable Backup Services
V-99943 Medium Samsung Android must be configured to disable USB mass storage mode.
V-99981 Medium Samsung Android must be configured to enforce a USB host mode exception list. Note: This configuration allows DeX mode (with input devices), which is DoD-approved for use.
V-99983 Medium Samsung Android Work Environment must be configured to enforce that Share Via List is disabled.
V-99985 Medium Samsung Android must be configured to disallow outgoing beam.
V-99987 Medium Samsung Android Work Environment must be configured to enforce that Wi-Fi Sharing is disabled.
V-99927 Medium The Samsung Android Work Environment whitelist must be configured to not include applications with the following characteristics: - back up MD data to non-DoD cloud servers (including user and application access to cloud backup services); - transmit MD diagnostic data to non-DoD servers; - voice assistant application if available when MD is locked; - voice dialing application if available when MD is locked; - allows synchronization of data or applications between devices associated with user; and - allows unencrypted (or encrypted but not FIPS 140-2 validated) data sharing with other MDs or printers.
V-99925 Medium Samsung Android Work Environment must be configured to enforce an application installation policy by specifying an application whitelist that restricts applications by the following characteristics: names.
V-99923 Medium Samsung Android must be configured to enforce an application installation policy by specifying one or more authorized application repositories, including DoD-approved commercial app repository, management tool server, or mobile application store.
V-99921 Medium Samsung Android must be configured to not allow more than 10 consecutive failed authentication attempts.
V-99963 Medium The Samsung Android Work Environment must be configured to prevent users from adding personal email accounts to the work email app.
V-99949 Medium Samsung Android Work Environment must be configured to not allow backup of all applications, configuration data to remote systems (account management backup). - Disable Data Sync
V-99967 Medium Samsung Android Work Environment must be configured to enforce the system application disable list.
V-99965 Medium Samsung Android Personal Environment must be configured to enforce the system application disable list.
V-99935 Medium Samsung Android must be configured to disable trust agents. Note: This requirement is not applicable (NA) for specific biometric authentication factors included in the product Common Criteria evaluation.
V-99919 Medium Samsung Android must be configured to lock the display after 15 minutes (or less) of inactivity.
V-99997 Medium Samsung Android must be configured to require the user to present the Password Authentication Factor prior to decryption of protected data, encrypted DEKs, KEKs, and [selection: long-term trusted channel key material, all software-based key storage, no other keys] at startup.
V-99993 Medium Samsung Android Work Environment must allow only the Administrator (management tool) to perform the following management function: install/remove DoD root and intermediate PKI certificates.
V-99991 Medium Samsung Android Work Environment must have the DoD root and intermediate PKI certificates installed.
V-99969 Medium Samsung Android must be configured to enable audit logging.
V-99953 Medium Samsung Android Work Environment must be configured to disable exceptions to the access control policy that prevents application processes, groups of application processes from accessing all, private data stored by other application processes, groups of application processes. - Disable Move files to personal
V-99951 Medium Samsung Android must be configured to enable authentication of personal hotspot connections to the device using a pre-shared key.
V-99957 Medium Samsung Android Work Environment must be configured to disable exceptions to the access control policy that prevents application processes, groups of application processes from accessing all, private data stored by other application processes, groups of application processes. - Disable Sync Calendar to personal
V-99955 Medium Samsung Android Work Environment must be configured to disable exceptions to the access control policy that prevents application processes, groups of application processes from accessing all, private data stored by other application processes, groups of application processes. - Disable Copy and Paste data
V-99959 Medium Samsung Android must be configured to disable multi-user modes (tablets only).
V-99979 Medium Samsung Android must be configured to disallow configuration of Date Time.
V-99937 Medium Samsung Android must be configured to disable Face Recognition. Note: This requirement is not applicable (NA) for specific biometric authentication factors included in the product Common Criteria evaluation.
V-99931 Medium Samsung Android must be configured to not display the following (Work Environment) notifications when the device is locked: all notifications.
V-99917 Medium Samsung Android must be configured to enable a screen-lock policy that will lock the display after a period of inactivity.
V-99973 Medium Samsung Android device users must complete required training.
V-99975 Medium Samsung Android Work Environment must be configured to disable the Auto Fill services.
V-99971 Medium Samsung Android must be enrolled as a COPE/COBO device.
V-99989 Medium Samsung Android Work Environment must be configured to enable Certificate Revocation checking.
V-99941 Low Samsung Android must be configured to display the DoD advisory warning message at start-up or each time the user unlocks the device.
V-99929 Low Samsung Android must be configured to disable all Bluetooth profiles except for HSP (Headset Profile), HFP (HandsFree Profile), SPP (Serial Port Profile), A2DP (Advanced Audio Distribution Profile), AVRCP (Audio/Video Remote Control Profile), and PBAP (Phone Book Access Profile).
V-99961 Low Samsung Android must [not accept the certificate] when it cannot establish a connection to determine the validity of a certificate.