UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The Samsung Knox for Android platform must be configured to implement the user-based enforcement setting: disable Samsung Account.


Overview

Finding ID Version Rule ID IA Controls Severity
V-56109 KNOX-35-023300 SV-70363r1_rule Medium
Description
Configuring a Samsung Account on the device allows the user to backup files (including S Health data) to Samsung servers, as well as download applications from Samsung Apps (Galaxy Apps) store. This data is stored at a location that has unauthorized employees accessing this data. This data is stored on a server that has a location unknown to the DoD. Disabling this feature mitigates the risk of a backup feature that stores sensitive data on a server that has the potential to be located in a country other than the United States. SFR ID: FMT_SMF.1.1 #42
STIG Date
Samsung Android (with Knox 2.x) STIG 2015-05-20

Details

Check Text ( C-56679r1_chk )
This validation procedure is performed on both the MDM Administration Console and the Samsung Knox for Android device.

Check whether the appropriate setting is configured on the MDM Administration Console:
1. Ask the MDM administrator to display the "Application disable list" setting in the "Android Application" rule.
2. Verify the setting includes the Samsung Account application.

On the Samsung Knox for Android device:
1. Open device settings.
2. Select "Accounts".
3. Attempt to add a Samsung Account.

If the "Application disable list" configuration in the MDM console does not contain the Samsung Account application, or if the user is able to successfully add a Samsung account, this is a finding.
Fix Text (F-60987r1_fix)
Configure the mobile operating system to disable Samsung Account.

On the MDM Administration Console, add the Samsung Account application to the "Application disable list" setting in the "Android Application" rule.