UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The Samsung KNOX for Android platform must be configured to disable authentication mechanisms providing user access to protected data other than a Password Authentication Factor (e.g., using a fingerprint), unless the mechanism is DoD-approved.


Overview

Finding ID Version Rule ID IA Controls Severity
V-69651 KNOX-35-024600 SV-84273r1_rule Medium
Description
The fingerprint reader can be used to authenticate the user in order to unlock the mobile device. At this time, no biometric reader has been approved for DoD use on mobile devices. This technology would allow unauthorized users to have access to DoD sensitive data if compromised. By not permitting the use of non-password authentication mechanisms, users are forced to use passcodes that meet DoD passcode requirements. SFR ID: FMT_SMF_EXT.1.1 #45
STIG Date
Samsung Android OS 6 (with KNOX 2.x) Security Technical Implementation Guide 2016-11-14

Details

Check Text ( C-70087r1_chk )
This validation procedure is performed on both the MDM Administration Console and the Samsung KNOX for Android device.

Check whether the appropriate setting is configured on the MDM Administration Console:
1. Ask the MDM administrator to display the "Minimum Password Complexity" setting in the "Android Restrictions" rule.
2. Verify the settings are "Alphanumeric".
3. Ask the MDM administrator to display the "Enable Fingerprint for Lock screen authentication" setting in the "Android Restrictions" rule.
4. Verify the setting is disabled.

On the Samsung KNOX for Android device:
1. Open the device settings.
2. Select "Lock screen and security".
3. Select "Lock screen type".
4. Verify "Swipe", "Pattern", "PIN", "Fingerprints", and "None" are disabled (grayed out) and cannot be enabled.

If "Fingerprint for Lock screen authentications" is enabled, or if "Minimum Password Complexity" is not configured to "Alphanumeric", or if the user can enable the settings on the device, this is a finding.
Fix Text (F-75841r1_fix)
Configure the mobile operating system to not allow authentication mechanisms other than a Password Authentication Factor, where the authentication provides user access to protected data.

Configure the mobile operating system to configure Minimum Password Complexity and disable fingerprint for the lock screen password.

On the MDM Administration Console, configure "Minimum Password Complexity" to Alphanumeric and disable "Enable Fingerprint for Lock screen authentication" setting in the "Android Restrictions" rule.