UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Samsung Android Work Environment must allow only the Administrator (management tool) to perform the following management function: install/remove DoD root and intermediate PKI certificates.


Overview

Finding ID Version Rule ID IA Controls Severity
V-99993 KNOX-10-012400 SV-109097r1_rule Medium
Description
DoD root and intermediate PKI certificates are used to verify the authenticity of PKI certificates of users and web services. If the user is allowed to remove root and intermediate certificates, the user could allow an adversary to falsely sign a certificate in such a way that it could not be detected. Restricting the ability to remove DoD root and intermediate PKI certificates to the Administrator mitigates this risk. SFR ID: FMT_MOF_EXT.1.2 #47
STIG Date
Samsung Android OS 10 with Knox 3.x Security Technical Implementation Guide 2020-03-24

Details

Check Text ( C-98843r1_chk )
Review Samsung Android Work Environment configuration settings to determine if the user is unable to remove DoD root and intermediate PKI certificates.

Confirm if Method #1 or #2 is used at the Samsung device site and follow the appropriate procedure.

This validation procedure is performed on both the management tool Administration Console and the Samsung Android device.

****

Method #1: Disallow user from configuring any credential.

On the management tool, in the Work Environment restrictions section, verify that "Config credentials" is set to "Disallow".

On the Samsung Android device, do the following:
1. Open Settings >> Biometrics and security >> Other security settings >> View security certificates.
2. In the System tab, verify that no listed certificate in the Work Environment can be untrusted.
3. In the User tab, verify that no listed certificate in the Work Environment can be removed.

If on the management tool the device "Config credentials" is not set to "Disallow", or on the Samsung Android device a certificate can be untrusted or removed, this is a finding.

****

Method #2: Disallow user from removing certificates.

On the management tool, in the device KPE restrictions section, verify "User Remove Certificates" is set to "Disallow".

On the Samsung Android device, do the following:
1. Open Settings >> Biometrics and security >> Other security settings >> View security certificates.
2. In the System tab, verify that no listed certificate in the Work Environment can be untrusted.
3. In the User tab, verify that no listed certificate in the Work Environment can be removed.

If on the management tool the device "User Remove Certificates" is not set to "Disallow", or on the Samsung Android device a certificate can be untrusted or removed, this is a finding.
Fix Text (F-105677r1_fix)
Configure Samsung Android Work Environment to prevent a user from removing DoD root and intermediate PKI certificates.

Do one of the following:
- Method #1: Disallow user from configuring any credential.
- Method #2: Disallow user from removing certificates.

****

Method #1: Disallow user from configuring any credential.

On the management tool, in the Work Environment restrictions section, set "Config credentials" to "Disallow".

****

Method #2: Disallow user from removing certificates.

On the management tool, in the Work Environment KPE restrictions section, set "User Remove Certificates" to "Disallow".