UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The Samsung Knox for Android container must be configured to implement the management setting: configure application disable list.


Overview

Finding ID Version Rule ID IA Controls Severity
V-56143 KNOX-39-020700 SV-70397r1_rule Medium
Description
Applications from various sources (including the vendor, the carrier, and Google) are installed on the device at the time of manufacture. Core apps are apps preinstalled by Google. Third-party preinstalled apps included apps from the vendor and carrier. Some of the applications can compromise DoD data or upload user's information to non-DoD approved servers. A user must be blocked from using such applications that exhibit behavior that can result in compromise of DoD data or DoD user information. The site administrator must analyze all pre-installed applications on the device and block all applications not approved for DoD use by configuring the application disable list. SFR ID: FMT_SMF.1.1 #42
STIG Date
Samsung Android (with Knox 2.x) STIG 2015-05-20

Details

Check Text ( C-56713r4_chk )
This validation procedure is performed on both the MDM Administration Console and the Samsung Knox for Android device.

Check whether the appropriate setting is configured on the MDM Administration Console:
1. Ask the MDM administrator to display the "Application disable list" setting in the "Android Knox Container -> Container Application" rule.
2. Verify the list contains all core and pre-installed applications not approved for DoD use by the Approving Official (AO).
(Note: Refer to the Supplemental document for additional information.)

On the Samsung Knox for Android device:
1. Open the Knox container.
2. Attempt to launch an application that is included on the disable list. (Note: This application should not be visible.)

If the "Application disable list" configuration in the MDM console does not contain all core and pre-installed applications not approved by DoD, or if the user is able to successfully launch an application on this list, this is a finding.

Note: Core applications are apps installed in the operating system by the OS developer. In addition, third-party pre-installed apps are included in the OS build by the device vendor or wireless carrier.
Fix Text (F-61019r2_fix)
Configure the mobile operating system to disable all pre-installed container applications that are not DoD-approved.

On the MDM Administration Console, add all pre-installed container applications that are not DoD-approved to the "Application disable list" setting in the "Android Knox Container -> Container Application" rule.

(Note: Refer to the Supplemental document for additional information.)