UCF STIG Viewer Logo

Google Android 14 COPE Security Technical Implementation Guide


Overview

Date Finding Count (36)
2023-10-04 CAT I (High): 1 CAT II (Med): 30 CAT III (Low): 5
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Available Profiles



Findings (MAC III - Administrative Sensitive)

Finding ID Severity Title
V-258438 High Android 14 devices must have the latest available Google Android 14 operating system installed.
V-258433 Medium The Google Android 14 work profile must be configured to enforce the system application disable list.
V-258432 Medium The Google Android 14 work profile must be configured to prevent users from adding personal email accounts to the work email app.
V-258435 Medium The Google Android 14 work profile must be configured to disable automatic completion of workspace internet browser text input.
V-258434 Medium Google Android 14 must be provisioned as a fully managed device and configured to create a work profile.
V-258437 Medium Google Android 14 must be configured to disallow configuration of date and time.
V-258436 Medium The Google Android 14 work profile must be configured to disable the autofill services.
V-258431 Medium Google Android 14 must have the DOD root and intermediate PKI certificates installed.
V-258430 Medium Google Android 14 must be configured to enforce that Wi-Fi Sharing is disabled.
V-258419 Medium Google Android 14 must be configured to disable developer modes.
V-258418 Medium Google Android 14 must be configured to disable trust agents.
V-258417 Medium Google Android 14 must be configured to not display the following (work profile) notifications when the device is locked: [selection: a. email notifications b. calendar appointments c. contact associated with phone call notification d. text message notification e. other application-based notifications f. all notifications].
V-258416 Medium Google Android 14 allowlist must be configured to not include applications with the following characteristics: - Back up mobile device (MD) data to non-DOD cloud servers (including user and application access to cloud backup services); - Transmit MD diagnostic data to non-DOD servers; - Voice assistant application if available when MD is locked; - Voice dialing application if available when MD is locked; - Allows synchronization of data or applications between devices associated with user; and - Allows unencrypted (or encrypted but not FIPS 140-2/140-3 validated) data sharing with other MDs or printers.
V-258415 Medium Google Android 14 must be configured to enforce an application installation policy by specifying an application allowlist that restricts applications by the following characteristics: [selection: list of digital signatures, cryptographic hash values, names, application version].
V-258414 Medium Google Android 14 must be configured to enforce an application installation policy by specifying one or more authorized application repositories, including [selection: DOD-approved commercial app repository, MDM server, mobile application store].
V-258411 Medium Google Android 14 must be configured to enable a screen-lock policy that will lock the display after a period of inactivity.
V-258410 Medium Google Android 14 must be configured to not allow passwords that include more than four repeating or sequential characters.
V-258413 Medium Google Android 14 must be configured to not allow more than 10 consecutive failed authentication attempts.
V-258412 Medium Google Android 14 must be configured to lock the display after 15 minutes (or less) of inactivity.
V-258422 Medium Google Android 14 must be configured to disable USB mass storage mode.
V-258423 Medium Google Android 14 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.
V-258421 Medium Google Android 14 must be configured to generate audit records for the following auditable events: Detected integrity violations.
V-258426 Medium Google Android 14 must be configured to disable multiuser modes.
V-258424 Medium Google Android 14 must be configured to not allow backup of [all applications, configuration data] to remote systems.
V-258425 Medium Google Android 14 must be configured to disable exceptions to the access control policy that prevent [selection: application processes, groups of application processes] from accessing [selection: all, private] data stored by other [selection: application processes, groups of application processes].
V-258428 Medium Google Android 14 must be configured to disable ad hoc wireless client-to-client connection capability.
V-258429 Medium Google Android 14 users must complete required training.
V-258441 Medium Google Android 14 must be configured to disable all data signaling over [assignment: list of externally accessible hardware ports (for example, USB)].
V-258442 Medium The Google Android 14 must allow only the administrator (EMM) to install/remove DOD root and intermediate PKI certificates.
V-258408 Medium Google Android 14 must be configured to enable audit logging.
V-258409 Medium Google Android 14 must be configured to enforce a minimum password length of six characters.
V-258439 Low Android 14 devices must be configured to disable the use of third-party keyboards.
V-258420 Low Google Android 14 must be configured to display the DOD advisory warning message at startup or each time the user unlocks the device.
V-258427 Low Google Android 14 must be configured to disable all Bluetooth profiles except for HSP (Headset Profile), HFP (Hands-Free Profile), SPP (Serial Port Profile), A2DP (Advanced Audio Distribution Profile), AVRCP (Audio/Video Remote Control Profile), and PBAP (Phone Book Access Profile).
V-258440 Low Android 14 devices must be configured to enable Common Criteria Mode (CC Mode).
V-258443 Low Google Android 14 must allow only the administrator (MDM) to perform the following management function: Disable Phone Hub.