UCF STIG Viewer Logo

The administrator/MDM must disable USB debugging.


Overview

Finding ID Version Rule ID IA Controls Severity
V-48293 KNOX-25-015800 SV-61165r1_rule Medium
Description
USB debugging mode provides access to developer mode features. Developer modes circumvent certain security measures, so their use for standard operation is not recommended. Developer modes may increase the likelihood of compromise of confidentiality, integrity, and availability. Because of the security risks of developer modes, users must not be able to enable them. SFR ID: FMT_SMF.1.1 #21
STIG Date
Samsung Android (with Knox 1.x) STIG 2014-04-22

Details

Check Text ( C-50725r3_chk )
This validation procedure is performed on both the MDM Administration Console and the Samsung Knox Android device.

Note: KNOX-23-13700 also verifies that USB Debugging has been disabled.

Check whether the appropriate setting is configured on the MDM Administration Console:
1. Ask the MDM administrator to display the "Disable USB Debugging" settings in the "Android Restrictions" rule.
2. Verify this setting is enabled.

On the Samsung Knox Android device:
1. Open the device settings.
2. Select "Developer options". (**)
3. Attempt to enable "USB Debugging".
4. Verify "USB Debugging" is disabled and cannot be enabled.

If the "Disable USB Debugging" setting in the MDM console is not enabled, or if the user is able to enable "USB Debugging" on the device, this is a finding.

(**) "Developer options" is initially hidden to users. To unhide this menu item:
1. Open the device settings.
2. Select "About phone".
3. Rapidly tap on "Build number" multiple times until the device displays that "Developer options" has been turned on.
Fix Text (F-51901r1_fix)
Configure the operating system to disable USB debugging.

On the MDM Administration Console, enable the "Disable USB Debugging" setting in the "Android Restrictions" rule.