UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The Samsung Android 8 with Knox CONTAINER whitelist must be configured to not include applications with the following characteristics: Back up mobile device (MD) data to non-DoD cloud servers (including user and application access to cloud backup services).


Overview

Finding ID Version Rule ID IA Controls Severity
V-80281 KNOX-08-002200 SV-94985r1_rule Medium
Description
Requiring all authorized applications to be in an application whitelist prevents the execution of any applications (e.g., unauthorized, malicious) that are not part of the whitelist. Failure to configure an application whitelist properly could allow unauthorized and malicious applications to be downloaded, installed, and executed on the MD, causing a compromise of DoD data accessible by these applications. Applications with the listed characteristics have features that can cause the compromise of sensitive DoD data or have features with no known application in the DoD environment. Application note: The application whitelist, in addition to controlling the installation of applications on the MD, must control user access/execution of all core and pre-installed applications, or the MD must provide an alternate method of restricting user access/execution to core and pre-installed applications. Core application: Any application integrated into the operating system (OS) by the OS or MD vendors. Pre-installed application: Additional non-core applications included in the OS build by the OS vendor, MD vendor, or wireless carrier. SFR ID: FMT_SMF_EXT.1.1 #8b
STIG Date
Samsung Android OS 8 with Knox 3.x COPE Use Case Security Technical Implementation Guide 2018-05-14

Details

Check Text ( C-79953r1_chk )
Review Samsung Android 8 with Knox configuration settings to determine if the mobile device CONTAINER has an application disable list configured to include applications with the following characteristics:

- back up MD data to non-DoD cloud servers (including user and application access to cloud backup services).

This validation procedure is performed on both the MDM Administration Console and the Samsung Android 8 with Knox device CONTAINER.

On the MDM CONTAINER console, do the following:
1. Ask the MDM Administrator to display the "Application disable list" setting in the "Android Application" rule.
2. Verify the list contains all applications that back up MD data to non-DoD cloud servers (including user and application access to cloud backup services).

If the MDM CONTAINER console "Application disable list" is not properly configured or on the Samsung Android 8 with Knox device CONTAINER, the user is able to launch the applications on the list, this is a finding.

Note: The following applications are known to be pre-installed public cloud applications, but other applications can be found on other devices: Google Drive, Dropbox, Verizon Cloud, AT&T Locker, Microsoft OneDrive, and Microsoft OneNote.

Note: The following application allows a user to configure a Samsung account on the device, which allows the user to back up files (including S Health data) to Samsung servers and download applications from the Samsung Apps (Galaxy Apps) store: Samsung Account application.

Note: Refer to the Supplemental document for additional information.
Fix Text (F-87087r1_fix)
Configure the Samsung Android 8 with Knox CONTAINER application disable list to include applications with the following characteristics:

- back up MD data to non-DoD cloud servers (including user and application access to cloud backup services).

On the MDM CONTAINER console, add all applications that back up MD data to non-DoD cloud servers (including user and application access to cloud backup services) to the "Application disable list" setting in the "Android Applications" rule.

Note: Refer to the Supplemental document for additional information.

Note: Include Samsung Accounts on the list.