UCF STIG Viewer Logo

Samsung Android OS 9 with Knox 3.x COPE Use Case KPE(AE) Deployment Security Technical Implementation Guide


Overview

Date Finding Count (49)
2020-02-24 CAT I (High): 3 CAT II (Med): 40 CAT III (Low): 6
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Available Profiles



Findings (MAC II - Mission Support Public)

Finding ID Severity Title
V-93825 High Samsung Android devices must have the latest available Samsung Android operating system installed.
V-93797 High Samsung Android must be configured to enable Knox Common Criteria (CC) Mode.
V-93813 High Samsung Android must be configured to enable encryption for data at rest on removable storage media or alternately, the use of removable storage media must be disabled.
V-93749 Medium Samsung Android must be configured to enforce the system application disable list.
V-93765 Medium Samsung Android must be configured to create a Knox Workspace.
V-93799 Medium Samsung Android must be configured to disallow configuration of date and time.
V-93757 Medium The Samsung Android Workspace whitelist must be configured to not include applications with the following characteristics: - back up MD data to non-DoD cloud servers (including user and application access to cloud backup services); - transmit MD diagnostic data to non-DoD servers; - voice assistant application if available when MD is locked; - voice dialing application if available when MD is locked; - allows synchronization of data or applications between devices associated with user; and - allows unencrypted (or encrypted but not FIPS 140-2 validated) data sharing with other MDs or printers.
V-93755 Medium The Samsung Android whitelist must be configured to not include applications with the following characteristic: - transmit MD diagnostic data to non-DoD servers.
V-93753 Medium Samsung Android Workspace must be configured to enforce an application installation policy by specifying an application whitelist that restricts applications by the following characteristics: list of digital signatures, list of package names.
V-93751 Medium Samsung Android Workspace must be configured to enforce the system application disable list.
V-93787 Medium Samsung Android must be configured to disable Face Recognition. Note: This requirement is not applicable (NA) for specific biometric authentication factors included in the products Common Criteria evaluation.
V-93759 Medium Samsung Android must be configured to enforce an application installation policy by specifying one or more authorized application repositories, including [DoD-approved commercial app repository, MDM server, mobile application store]: - disallow unknown app installation sources.
V-93779 Medium Samsung Android Workspace must be configured to lock after 15 minutes (or less) of inactivity.
V-93795 Medium Samsung Android must be configured to disable USB mass storage mode.
V-93785 Medium Samsung Android must be configured to disable trust agents. Note: This requirement is not applicable (NA) for specific biometric authentication factors included in the products Common Criteria evaluation.
V-93777 Medium Samsung Android must be configured to lock the display after 15 minutes (or less) of inactivity.
V-93771 Medium Any accessory that provides wired networking capabilities to a Samsung Android device must not be connected to a DoD network (for example: DeX Station [LAN port], USB to Ethernet adapter, etc.).
V-93835 Medium Samsung Android must be configured to set the password history with a length of 0.
V-93809 Medium Samsung Android must be configured to disable developer modes.
V-93827 Medium Samsung Android Workspace must be configured to enable the Online Certificate Status Protocol (OCSP).
V-93767 Medium Samsung Android Workspace must be configured to not display the following notifications when the device is locked: all notifications.
V-93819 Medium Samsung Android Workspace must have the DoD root and intermediate PKI certificates installed.
V-93829 Medium Samsung Android must be configured to enable the Online Certificate Status Protocol (OCSP).
V-93789 Medium Samsung Android Workspace must be configured to disable automatic completion of Samsung Internet browser text input.
V-93761 Medium Samsung Android must be configured to enable the Knox audit log.
V-93839 Medium Samsung Android must be configured to enforce that Secure Startup is enabled. This requirement is Not Applicable (NA) to Galaxy S10 (or newer) devices.
V-93801 Medium Samsung Android must be configured to enforce a USB host mode exception list. Note: This configuration allows DeX mode (with input devices), which is DoD-approved for use.
V-93843 Medium Samsung Android must be configured to enforce that Strong Protection is enabled. This requirement is Not Applicable (NA) for devices older than Galaxy S10.
V-93763 Medium Samsung Android must be configured to disable exceptions to the access control policy that prevents [application processes, groups of application processes] from accessing [all, private] data stored by other [application processes, groups of application processes].
V-93791 Medium Samsung Android Workspace must be configured to disable the autofill services.
V-93807 Medium Samsung Android Workspace must be configured to not allow backup of [all applications, configuration data] to remote systems.
V-93833 Medium Samsung Android must be configured to not enable Microsoft Exchange ActiveSync (EAS) password recovery. This requirement is not applicable if not using Microsoft EAS.
V-93831 Medium Samsung Android Workspace must be configured to not enable Microsoft Exchange ActiveSync (EAS) password recovery. This requirement is not applicable if not using Microsoft EAS.
V-93821 Medium Samsung Android must have the DoD root and intermediate PKI certificates installed.
V-93837 Medium Samsung Android Workspace must be configured to set the password history with a length of 0.
V-93747 Medium The Samsung Android Workspace must be configured to prevent users from adding personal email accounts to the work email app.
V-93769 Medium Samsung Android device users must complete required training.
V-93815 Medium Samsung Android Workspace must be configured to enable Certificate Revocation List (CRL) status checking.
V-93841 Medium Samsung Android must be configured to enable a screen-lock policy that will lock the display after a period of inactivity.
V-93817 Medium Samsung Android must be configured to enable Certificate Revocation List (CRL) status checking.
V-93805 Medium Samsung Android must be configured to not allow backup of [all applications, configuration data] to locally connected systems.
V-93811 Medium Samsung Android must be configured to enable authentication of personal hotspot connections to the device using a preshared key.
V-93803 Medium Samsung Android Workspace must be configured to disable the Share Via List feature.
V-93781 Low Samsung Android must be configured to not allow more than 10 consecutive failed authentication attempts.
V-93793 Low Samsung Android must be configured to disable all Bluetooth profiles except HSP (Headset Profile), HFP (HandsFree Profile), SPP (Serial Port Profile), A2DP (Advanced Audio Distribution Profile), AVRCP (Audio/Video Remote Control Profile), and PBAP (Phone Book Access Profile).
V-93823 Low Samsung Android must be configured to display the DoD advisory warning message at startup or each time the user unlocks the device.
V-93773 Low Samsung Android must be configured to enforce a minimum password length of six characters.
V-93775 Low Samsung Android must be configured to not allow passwords that include more than two repeating or sequential characters.
V-93783 Low Samsung Android Workspace must be configured to not allow more than 10 consecutive failed authentication attempts.