Check: GOOG-10-002800
Google Android 10.x STIG:
GOOG-10-002800
(in versions v2 r1 through v1 r2)
Title
Google Android 10 must be configured to disable developer modes. (Cat II impact)
Discussion
Developer modes expose features of the Google Android device that are not available during standard operation. An adversary may leverage a vulnerability inherent in a developer mode to compromise the confidentiality, integrity, and availability of DoD sensitive information. Disabling developer modes mitigates this risk. SFR ID: FMT_SMF_EXT.1.1 #26
Check Content
Review Google Android device configuration settings to determine whether a developer mode is enabled. This validation procedure is performed on both the MDM Administration Console and the Android 10 device. On the MDM console, do the following: 1. Open restrictions section. 2. Open Restrictions section. 3. Toggle "Disallow debugging Features" to on. On the Android 10 device, do the following: 1. Go to Settings >> System. 2. Ensure Developer Options is not listed. If the MDM console device policy is not set to disable developer mode or on the Android 10 device, the device policy is not set to disable developer mode, this is a finding.
Fix Text
Configure the Google Android device to disable developer modes. On the MDM Console: 1. Open restrictions section. 2. Open Restrictions section. 3. Toggle "Disallow debugging Features" to on.
Additional Identifiers
Rule ID: SV-237011r639179_rule
Vulnerability ID: V-237011
Group Title: PP-MDF-301170
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000381 |
The organization configures the information system to provide only essential capabilities. |
Controls
Number | Title |
---|---|
CM-7 |
Least Functionality |