UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Samsung Android must allow only the Administrator (management tool) to perform the following management function: Install/remove DOD root and intermediate PKI certificates.


Overview

Finding ID Version Rule ID IA Controls Severity
V-258650 KNOX-14-110260 SV-258650r931150_rule Medium
Description
DOD root and intermediate PKI certificates are used to verify the authenticity of PKI certificates of users and web services. If the user is allowed to remove root and intermediate certificates, the user could allow an adversary to falsely sign a certificate in such a way that it could not be detected. Restricting the ability to remove DOD root and intermediate PKI certificates to the Administrator mitigates this risk. SFR ID: FMT_MOF_EXT.1.2 #47
STIG Date
Samsung Android OS 14 with Knox 3.x COBO Security Technical Implementation Guide 2023-10-18

Details

Check Text ( C-62390r931148_chk )
Review the configuration to determine if the Samsung Android devices are preventing users from removing DOD root and intermediate PKI certificates.

This validation procedure is performed on both the management tool and the Samsung Android device.

On the management tool, in the device restrictions, verify "Configure credentials" is set to "Disallow".

On the Samsung Android device:
1. Open Settings >> Security and privacy >> More security settings >> View security certificates.
2. In the System tab, verify no listed certificate in the device can be untrusted.
3. In the User tab, verify no listed certificate in the device can be removed.

If on the management tool in the device restrictions "Configure credentials" is not set to "Disallow", or on the Samsung Android device a certificate can be untrusted or removed, this is a finding.
Fix Text (F-62299r931149_fix)
Configure the Samsung Android devices to prevent users from removing DOD root and intermediate PKI certificates.

On the management tool, in the device restrictions, set "Configure credentials" to "Disallow".