UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Samsung OS 9 with Knox 3.x COBO Use Case KPE(AE) Deployment Security Technical Implementation Guide


Overview

Date Finding Count (40)
2020-02-24 CAT I (High): 3 CAT II (Med): 32 CAT III (Low): 5
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Available Profiles



Findings (MAC III - Administrative Sensitive)

Finding ID Severity Title
V-92895 High Samsung Android must be configured to enable Knox Common Criteria (CC) Mode.
V-92915 High Samsung Android must be configured to enable encryption for data at rest on removable storage media or alternately, the use of removable storage media must be disabled.
V-92923 High Samsung Android devices must have the latest available Samsung Android operating system installed.
V-92909 Medium Samsung Android must be configured to not allow backup of [all applications, configuration data] to remote systems.
V-92905 Medium Samsung Android must be configured to enforce that Wi-Fi Sharing is disabled.
V-92907 Medium Samsung Android must be configured to not allow backup of [all applications, configuration data] to locally connected systems.
V-92901 Medium Samsung Android must be configured to disallow the Share Via List feature.
V-92903 Medium Samsung Android must be configured to disallow outgoing beam.
V-92867 Medium Samsung Android must be configured to enable the Knox audit log.
V-92865 Medium Samsung Android must be configured to enforce an application installation policy by specifying one or more authorized application repositories, including [DoD-approved commercial app repository, MDM server, mobile application store]: - disallow unknown app installation sources.
V-92863 Medium The Samsung Android whitelist must be configured to not include applications with the following characteristics: - back up mobile device data to non-DoD cloud servers (including user and application access to cloud backup services); - transmit mobile device diagnostic data to non-DoD servers; - voice assistant application if available when the mobile device is locked; - voice dialing application if available when the mobile device is locked; - allows synchronization of data or applications between devices associated with the user; and - allows unencrypted (or encrypted but not FIPS 140-2 validated) data sharing with other mobile devices or printers.
V-92861 Medium Samsung Android must be configured to enforce an application installation policy by specifying an application whitelist that restricts applications by the following characteristics: list of digital signatures, list of package names.
V-92869 Medium Samsung Android must be configured to not display the following notifications when the device is locked: all notifications.
V-92917 Medium Samsung Android must be configured to enable Certificate Revocation List (CRL) status checking.
V-92899 Medium Samsung Android must be configured to enforce a USB host mode exception list. Note: This configuration allows DeX mode (with input devices), which is DoD-approved for use.
V-92893 Medium Samsung Android must be configured to disable USB mass storage mode.
V-92897 Medium Samsung Android must be configured to disallow configuration of date and time.
V-92873 Medium Any accessory that provides wired networking capabilities to a Samsung Android device must not be connected to a DoD network (for example: DeX Station [LAN port], USB to Ethernet adapter, etc.).
V-92919 Medium Samsung Android must have the DoD root and intermediate PKI certificates installed.
V-92931 Medium Samsung Android must be configured to enforce that Secure Startup is enabled. This requirement is Not Applicable (NA) to Galaxy S10 (or newer) devices.
V-92935 Medium Samsung Android must be configured to enforce that Strong Protection is enabled. This requirement is Not Applicable (NA) for devices older than Galaxy S10.
V-92913 Medium Samsung Android must be configured to enable authentication of personal hotspot connections to the device using a preshared key.
V-92911 Medium Samsung Android must be configured to disable developer modes.
V-92871 Medium Samsung Android device users must complete required training.
V-92859 Medium Samsung Android must be configured to enforce the system application disable list.
V-92857 Medium Samsung Android must be configured to prevent users from adding personal email accounts to the work email app.
V-92879 Medium Samsung Android must be configured to lock the display after 15 minutes (or less) of inactivity.
V-92933 Medium Samsung Android must be configured to enable a screen-lock policy that will lock the display after a period of inactivity.
V-92927 Medium Samsung Android must be configured to not enable Microsoft Exchange ActiveSync (EAS) password recovery. This requirement is not applicable if not using Microsoft EAS.
V-92925 Medium Samsung Android must be configured to enable the Online Certificate Status Protocol (OCSP).
V-92889 Medium Samsung Android must be configured to disable the autofill services.
V-92885 Medium Samsung Android must be configured to disable Face Recognition. Note: This requirement is not applicable (NA) for specific biometric authentication factors included in the products Common Criteria evaluation.
V-92887 Medium Samsung Android must be configured to disable automatic completion of Samsung Internet browser text input.
V-92883 Medium Samsung Android must be configured to disable trust agents. Note: This requirement is not applicable (NA) for specific biometric authentication factors included in the products Common Criteria evaluation.
V-92929 Medium Samsung Android must be configured to set the password history with a length of 0.
V-92891 Low Samsung Android must be configured to disable all Bluetooth profiles except HSP (Headset Profile), HFP (HandsFree Profile), SPP (Serial Port Profile), A2DP (Advanced Audio Distribution Profile), AVRCP (Audio/Video Remote Control Profile), and PBAP (Phone Book Access Profile).
V-92875 Low Samsung Android must be configured to enforce a minimum password length of six characters.
V-92877 Low Samsung Android must be configured to not allow passwords that include more than two repeating or sequential characters.
V-92921 Low Samsung Android must be configured to display the DoD advisory warning message at startup or each time the user unlocks the device.
V-92881 Low Samsung Android must be configured to not allow more than 10 consecutive failed authentication attempts.