Google Android 16 COPE Security Technical Implementation Guide

Overview

VersionDateFinding Count (45)Downloads
V1R22026-02-12CAT I (High): 2CAT II (Medium): 35CAT III (Low): 8
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.
ClassifiedPublicSensitive
I - Mission Critical ClassifiedI - Mission Critical PublicI - Mission Critical Sensitive
II - Mission Support ClassifiedII - Mission Support PublicII - Mission Support Sensitive
III - Administrative ClassifiedIII - Administrative PublicIII - Administrative Sensitive

Findings - MAC II - Mission Support Public

Finding IDSeverityTitleDescription
V-276850
LOWMEDIUMHIGH
Google Android 16 must be configured to enable audit logging.Audit logs enable monitoring of security-relevant events and subsequent forensics when breaches occur. For the audit logs to be useful, administrators...
V-276851
LOWMEDIUMHIGH
Google Android 16 must be configured to enforce a minimum password length of six characters.Password strength is a measure of the effectiveness of a password in resisting guessing and brute force attacks. The ability to crack a password is a ...
V-276852
LOWMEDIUMHIGH
Google Android 16 must be configured to not allow passwords that include more than four repeating or sequential characters.Password strength is a measure of the effectiveness of a password in resisting guessing and brute force attacks. Passwords that contain repeating or s...
V-276853
LOWMEDIUMHIGH
Google Android 16 must be configured to lock the display after 15 minutes (or less) of inactivity.The screen lock timeout must be set to a value that helps protect the device from unauthorized access. Having a too-long timeout would increase the wi...
V-276854
LOWMEDIUMHIGH
Google Android 16 must be configured to not allow more than 10 consecutive failed authentication attempts.The more attempts an adversary has to guess a password, the more likely the adversary will enter the correct password and gain access to resources on ...
V-276855
LOWMEDIUMHIGH
Google Android 16 must be configured to enforce an application installation policy by specifying one or more authorized application repositories, including [selection: DOD-approved commercial app repository, MDM server, mobile application store].Forcing all applications to be installed from authorized application repositories can prevent unauthorized and malicious applications from being insta...
V-276856
LOWMEDIUMHIGH
Google Android 16 must be configured to enforce an application installation policy by specifying an application allowlist that restricts applications by the following characteristics: [selection: list of digital signatures, cryptographic hash values, names, application version].The application allowlist, in addition to controlling the installation of applications on the MD, must control user access/execution of all core and p...
V-276857
LOWMEDIUMHIGH
Google Android 16 allowlist must be configured to not include applications with the following characteristics: - Backs up mobile device (MD) data to non-DOD cloud servers (including user and application access to cloud backup services); - Transmits MD diagnostic data to non-DOD servers; - Voice assistant application if available when MD is locked; - Voice dialing application if available when MD is locked; - Allows synchronization of data or applications between devices associated with user; - Payment processing; - Allows unencrypted (or encrypted but not FIPS 140-2/140-3 validated) data sharing with other MDs or printers; - Backs up own data to a remote system; - Renders TV shows and movies.Requiring all authorized applications to be in an application allowlist prevents the execution of any applications (e.g., unauthorized, malicious) tha...
V-276858
LOWMEDIUMHIGH
Google Android 16 allowlist must be configured to not include artificial intelligence (AI) applications that process device data in the cloud, including Google Gemini.Sensitive DOD data could be exposed when an AI app processes device data in the cloud. SFR ID: FMT_SMF.1.1 #8...
V-276859
LOWMEDIUMHIGH
Google Android 16 must be configured to not display the following (work profile) notifications when the device is locked: [selection: a. email notifications b. calendar appointments c. contact associated with phone call notification d. text message notification e. other application-based notifications f. all notifications].Many mobile devices display notifications on the lock screen so that users can obtain relevant information in a timely manner without having to freque...
V-276860
LOWMEDIUMHIGH
Google Android 16 must be configured to disable trust agents.Trust agents allow a user to unlock a mobile device without entering a passcode when the mobile device is, for example, connected to a user-selected B...
V-276861
LOWMEDIUMHIGH
Google Android 16 must be configured to disable developer modes.Developer modes expose features of the mobile operating system that are not available during standard operation. An adversary may leverage a vulnerabi...
V-276863
LOWMEDIUMHIGH
Google Android 16 must be configured to generate audit records for the following auditable events: Detected integrity violations.Audit logs enable monitoring of security-relevant events and subsequent forensics when breaches occur. They help identify attacks so that breaches can...
V-276864
LOWMEDIUMHIGH
Google Android 16 must be configured to disable USB mass storage mode.USB mass storage mode enables the transfer of data and software from one device to another. This software can include malware. When USB mass storage i...
V-276865
LOWMEDIUMHIGH
Google Android 16 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.Data on mobile devices is protected by numerous mechanisms, including user authentication, access control, and cryptography. When the data is backed u...
V-276866
LOWMEDIUMHIGH
Google Android 16 must be configured to not allow backup of [all applications, configuration data] to remote systems.Backups to remote systems (including cloud backup) can leave data vulnerable to breach on the external systems, which often offer less protection than...
V-276867
LOWMEDIUMHIGH
Google Android 16 must be configured to enable authentication of personal hotspot connections to the device using a preshared key.If no authentication is required to establish personal hotspot connections (Wi-Fi and Bluetooth), an adversary may be able to use that device to perfo...
V-276868
LOWMEDIUMHIGH
Google Android 16 must be configured to disable exceptions to the access control policy that prevent [selection: application processes, groups of application processes] from accessing [selection: all, private] data stored by other [selection: application processes, groups of application processes].App data sharing gives apps the ability to access the data of other apps for enhanced user functionality. However, sharing also poses a significant ri...
V-276869
LOWMEDIUMHIGH
Google Android 16 must be configured to disable multiuser modes.Multiuser mode allows multiple users to share a mobile device by providing a degree of separation between user data. To date, no mobile device with mu...
V-276871
LOWMEDIUMHIGH
Google Android 16 must be configured to disable ad hoc wireless client-to-client connection capability.Ad hoc wireless client-to-client connections allow mobile devices to communicate with each other directly, circumventing network security policies and...
V-276872
LOWMEDIUMHIGH
Google Android 16 users must complete required training.The security posture of Google devices requires the device user to configure several required policy rules on their device. User-Based Enforcement (UB...
V-276873
LOWMEDIUMHIGH
Google Android 16 must be configured to disable Wi-Fi Sharing.Wi-Fi Sharing is an optional configuration of Wi-Fi Tethering/Mobile Hotspot, which allows the device to share its Wi-Fi connection with other wireles...
V-276874
LOWMEDIUMHIGH
Google Android 16 must be configured to enforce a password for Wi-Fi and Bluetooth hotspot if approved for use by the authorizing official (AO). If not approved for use, Wi-Fi and Bluetooth hotspot must be disabled.Wi-Fi and Bluetooth hotspot use may increase the risk for exposing sensitive DOD data for some use cases; therefore, it should be disabled unless appr...
V-276875
LOWMEDIUMHIGH
Google Android 16 must have the DOD root and intermediate PKI certificates installed.DOD root and intermediate PKI certificates are used to verify the authenticity of PKI certificates of users and web services. If the root and intermed...
V-276876
LOWMEDIUMHIGH
The Google Android 16 work profile must be configured to prevent users from adding personal email accounts to the work email app.If the user is able to add a personal email account (POP3, IMAP, EAS) to the work email app, it could be used to forward sensitive DOD data to unautho...
V-276877
LOWMEDIUMHIGH
The Google Android 16 work profile must be configured to enforce the system application disable list.The system application disable list controls user access to/execution of all core and preinstalled applications. Core application: Any application ...
V-276878
LOWMEDIUMHIGH
Google Android 16 must be provisioned as a fully managed device and configured to create a work profile.The Android Enterprise work profile is the designated application group for the COPE use case. SFR ID: FMT_SMF.1.1 #47...
V-276879
LOWMEDIUMHIGH
The Google Android 16 work profile must be configured to disable automatic completion of workspace internet browser text input.The autofill functionality in the web browser allows the user to complete a form that contains sensitive information, such as personally identifiable ...
V-276880
LOWMEDIUMHIGH
The Google Android device must be configured to disable Wi-Fi Aware for Work Profile apps.Wi-Fi Aware allows direct connections between nearby devices for fast data transfer, video streaming, and multiplayer gaming. It allows full peer-to-p...
V-276881
LOWMEDIUMHIGH
Google Android 16 must implement the management setting: disable the Bluetooth radio.Authorizing official (AO) approval is required before the Google device Bluetooth radio can be enabled. All AO approvals must be documented and based ...
V-276885
LOWMEDIUMHIGH
Google Android 16 must be configured to disable all data signaling over [assignment: list of externally accessible hardware ports (for example, USB)].If a user is able to configure the security setting, the user could inadvertently or maliciously set it to a value that poses unacceptable risk to DOD...
V-276886
LOWMEDIUMHIGH
Google Android 16 must allow only the administrator (EMM) to install/remove DOD root and intermediate PKI certificates.DOD root and intermediate PKI certificates are used to verify the authenticity of PKI certificates of users and web services. If the user is allowed t...
V-276889
LOWMEDIUMHIGH
Google Android 16 must disable the user's ability to wipe the device.This feature must be disabled to comply with DOD electronic records retention requirements for mobile devices. Otherwise, mobile device users could wi...
V-276893
LOWMEDIUMHIGH
Google Android 16 devices must have a Mobile Threat Detection (MTD) app installed.DOD mobile devices are in constant risk of cyber threats. MTD apps mitigate these risks by providing real-time threat detection, malware prevention, a...
V-276894
LOWMEDIUMHIGH
Google Android 16 must implement the management setting: disable Camera.Authorizing official (AO) approval is required before the mobile device camera can be enabled for a specific user or group of users, based on a risk a...
V-276862
LOWMEDIUMHIGH
Google Android 16 must be configured to display the DOD advisory warning message at startup or each time the user unlocks the device.Before granting access to the system, the mobile operating system is required to display the DOD-approved system use notification message or banner th...
V-276870
LOWMEDIUMHIGH
Google Android 16 must be configured to disable Bluetooth or configured via User Based Enforcement (UBE) to allow Bluetooth for only Headset Profile (HSP), Hands-Free Profile (HFP), and Serial Port Profile (SPP).Some Bluetooth profiles provide the capability for remote transfer of sensitive DOD data without encryption or otherwise do not meet DOD IT security p...
V-276883
LOWMEDIUMHIGH
Android 16 devices must be configured to disable the use of third-party keyboards.Many third-party keyboard applications are known to contain malware. SFR ID: FMT_SMF.1.1 #47...
V-276884
LOWMEDIUMHIGH
Android 16 devices must be configured to enable Common Criteria (CC) Mode.The CC Mode feature is a superset of other features and behavioral changes that are mandatory MDFPP requirements. If CC Mode is not implemented, the d...
V-276887
LOWMEDIUMHIGH
Google Android 16 must allow only the administrator (MDM) to perform the following management function: Disable Phone Hub.It may be possible to transfer work profile data on a DOD Android device to an unauthorized Chromebook if the user has the same Google Account set up ...
V-276890
LOWMEDIUMHIGH
Google Android 16 must disable the use of assistants (including Google Assistant) unless required to meet Section 508 compliance requirements.The use of assistants could expose sensitive DOD data to cloud-based servers during the processing of assistant requests. SFR ID: FMT_MOF_EXT.1.2 #47...
V-276891
LOWMEDIUMHIGH
Google Android 16 must disable wireless printing.Wireless printing allows the printing of sensitive DOD documents to non-DOD controlled printers, which may lead to the exposure of sensitive DOD infor...
V-276892
LOWMEDIUMHIGH
Google Android 16 must disable screen capture.The screen capture feature could lead to the exposure of sensitive DOD information. SFR ID: FMT_MOF_EXT.1.2 #47...
V-276882
LOWMEDIUMHIGH
Android 16 devices must have the latest available Google Android 16 operating system installed.Required security features are not available in earlier operating system versions. In addition, there may be known vulnerabilities in earlier versions...
V-276888
LOWMEDIUMHIGH
Google Android 16 must be configured to disable "Private Space" use.Private Space is an Android feature that provides a separate encrypted container on the mobile device. Apps in Private Space show up in a separate con...