UCF STIG Viewer Logo

The Samsung Knox for Android platform must enforce an application installation policy by specifying one or more authorized application repositories: Disable Google Play.


Overview

Finding ID Version Rule ID IA Controls Severity
V-61169 KNOX-35-009000 SV-75649r1_rule Medium
Description
Forcing all applications to be installed from authorized application repositories can prevent unauthorized and malicious applications from being installed and executed on mobile devices. Allowing such installations and executions could cause a compromise of DoD data accessible by these unauthorized/malicious applications. SFR ID: FMT_SMF_EXT.1.1 #10a
STIG Date
Samsung Android OS 5 with Knox 2.0 Security Technical Implementation Guide 2016-02-24

Details

Check Text ( C-62125r1_chk )
Configuring an application installation policy on Samsung Knox for Android by specifying an application repository involves two steps: (1) Disabling Google Play, (2) Disabling unknown application sources. This validation procedure covers the first of these steps. It is performed on both the MDM Administration Console and the Samsung Knox for Android device.

On the MDM Administration Console:
1. Ask the MDM administrator to display the "Enable Google Play" setting in the "Android Restrictions" rule.
2. Verify it is disabled.

On the Samsung Knox for Android device:
1. Attempt to locate the "Google Play" application.
2. Verify it is not present on the device.

If the "Enable Google Play" is not disabled, or if a user can successfully launch Google Play on the device, this is a finding.
Fix Text (F-67029r1_fix)
Configure the MOS to disable unauthorized application repositories.

Configure the OS to disable Google Play.
On the MDM Administration Console, disable "Enable Google Play" in the "Android Restrictions" rule.