UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Samsung Android must be configured to disable developer modes.


Overview

Finding ID Version Rule ID IA Controls Severity
V-258636 KNOX-14-110110 SV-258636r931108_rule Medium
Description
Developer modes expose features of the MOS that are not available during standard operation. An adversary may leverage a vulnerability inherent in a developer mode to compromise the confidentiality, integrity, and availability of DOD sensitive information. Disabling developer modes mitigates this risk. SFR ID: FMT_SMF_EXT.1.1 #26
STIG Date
Samsung Android OS 14 with Knox 3.x COBO Security Technical Implementation Guide 2023-10-18

Details

Check Text ( C-62376r931106_chk )
Review the configure to determine if the Samsung Android devices are disabling developer modes.

This validation procedure is performed on both the management tool and the Samsung Android device.

On the management tool, in the device restrictions, verify "Debugging Features" is set to "Disallow".

On the Samsung Android device:
1. Open Settings >> About phone >> Software information.
2. Tap on the Build Number to try to enable Developer Options and validate that action is blocked.

If on the management tool "Debugging Features" is not set to "Disallow" or on the Samsung Android device "Developer options" action is not blocked, this is a finding.
Fix Text (F-62285r931107_fix)
Configure the Samsung Android devices to disable developer modes.

On the management tool, in the device restrictions, set "Debugging Features" to "Disallow".