|Finding ID||Version||Rule ID||IA Controls||Severity|
|A CRL allows a certificate issuer to revoke a certificate for any reason, including improperly issued certificates and compromise of the private keys. Checking the revocation status of the certificate mitigates the risk associated with using a compromised certificate. SFR ID: FMT_SMF_EXT.1.1 #47|
|Samsung Android OS 9 with Knox 3.x COPE Use Case KPE(Legacy) Deployment Security Technical Implementation Guide||2020-05-15|
|Check Text ( C-93233r1_chk )|
| Review device configuration settings to confirm that CRL checking is enabled for all apps. |
This procedure is performed on the MDM Administration console only.
On the MDM console, for the device, in the "Knox certificate" group, verify that "revocation check" is configured to "enable for all apps".
If on the MDM console "revocation check" is not configured to "enable for all apps", this is a finding.
|Fix Text (F-100163r1_fix)|
| Configure Samsung Android to enable CRL checking for all apps. |
On the MDM console, for the device, in the "Knox certificate" group, configure "revocation check" to "enable for all apps".
Refer to the MDM documentation to determine how to configure revocation checking to "enable for all apps". Some may, for example, allow a wildcard string: "*" (asterisk).