Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-56073 | KNOX-35-021000 | SV-70327r1_rule | Medium |
Description |
---|
An application with administrator permissions (e.g., MDM agent) is allowed to configure policies on the device. If a user is allowed to install another MDM agent on the device, then this will allow another MDM administrator (assuming it has the proper Knox licenses) the ability to configure potentially conflicting policies on the device that may not meet DoD security requirements. Although an MDM cannot disable another MDM's policies or remove another MDM from the device, there is the potential of creating policies that could conflict with enterprise policies. Therefore, other applications requesting administrator permissions should be blocked from installation. SFR ID: FMT_SMF.1.1 #42 |
STIG | Date |
---|---|
Samsung Android (with Knox 2.x) STIG | 2015-05-20 |
Check Text ( C-56643r2_chk ) |
---|
This validation procedure is performed on both the MDM Administration Console and the Samsung Knox for Android device. Check whether the appropriate setting is configured on the MDM Administration Console: 1. Ask the MDM administrator to display the "Allow New Admin Install" setting in the "Android Restrictions" rule. 2. Verify the setting is disabled. (Note: With some MDM consoles, this policy is automatically configured when the user enrolls with the MDM.) On the Samsung Knox for Android device: 1. Attempt to install an application that requires admin permissions. 2. Verify that the application is blocked from being installed. If the "Allow New Admin Install" setting in the MDM console is enabled, or if the user is able to install another application requiring admin permissions on the device, this is a finding. |
Fix Text (F-60951r1_fix) |
---|
Configure the mobile operating system to disallow new admin installations. On the MDM Administration Console, disable the "Allow New Admin Install" setting in the "Android Restrictions" rule. |