UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The Samsung Knox for Android platform must be configured to enforce an application installation policy by specifying one or more authorized application repositories: disable Google Play.


Overview

Finding ID Version Rule ID IA Controls Severity
V-56049 KNOX-35-009000 SV-70303r1_rule Medium
Description
Forcing all applications to be installed from authorized application repositories can prevent unauthorized and malicious applications from being installed and executed on mobile devices. Allowing such installations and executions could cause a compromise of DoD data accessible by these unauthorized/malicious applications. SFR ID: FMT_SMF.1.1 #10
STIG Date
Samsung Android (with Knox 2.x) STIG 2015-01-05

Details

Check Text ( C-56619r1_chk )
Configuring an application installation policy on Samsung Knox for Android by specifying an application repository involves three steps: (1) Disabling Google Play, (2) Disabling unknown application sources, and (3) Enrolling in an MDM (which designates the repository). This validation procedure covers the first of these steps. It is performed on both the MDM Administration Console and the Samsung Knox for Android device.

On the MDM Administration Console:
1. Ask the MDM administrator to display the "Enable Google Play" setting in the "Android Restrictions" rule.
2. Verify it is disabled.

On the Samsung Knox for Android device:
1. Attempt to locate the "Google Play" application.
2. Verify it is not present on the device.

If the "Enable Google Play" is not disabled, or if a user can successfully launch Google Play on the device, this is a finding.
Fix Text (F-60927r1_fix)
Configure the mobile device to use one or more authorized application repositories.

Configure the OS to disable Google Play.
On the MDM Administration Console, disable "Enable Google Play" in the "Android Restrictions" rule.