Check: GOOG-10-003500
Google Android 10.x STIG:
GOOG-10-003500
(in versions v2 r1 through v1 r1)
Title
Google Android 10 must be configured to disable USB mass storage mode. (Cat II impact)
Discussion
USB mass storage mode enables the transfer of data and software from one device to another. This software can include malware. When USB mass storage is enabled on a mobile device, it becomes a potential vector for malware and unauthorized data exfiltration. Prohibiting USB mass storage mode mitigates this risk. SFR ID: FMT_SMF_EXT.1.1 #39a
Check Content
Review Google Android device configuration settings to determine if the mobile device has a USB mass storage mode and whether it has been disabled. This validation procedure is performed on both the MDM Administration Console and the Android 10 device. On the MDM console, do the following: 1. Open User restrictions. 2. Open User restrictions. 3. Ensure "Disallow usb file transfer" is selected. On the Android 10 device, do the following: 1. Plug a USB cable into Android 10 device and connect to a non-DoD network-managed PC. 2. Go to Settings >> Connected devices >> USB. 3. Ensure “No data transfer” is selected. If the MDM console device policy is not set to disable USB mass storage mode or on the Android 10 device, the device policy is not set to disable USB mass storage mode, this is a finding.
Fix Text
Configure the Google Android device to disable USB mass storage mode. On the MDM console: 1. Open User restrictions. 2. Open User restrictions. 3. Select "Disallow usb file transfer".
Additional Identifiers
Rule ID: SV-237013r639185_rule
Vulnerability ID: V-237013
Group Title: PP-MDF-301210
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000381 |
The organization configures the information system to provide only essential capabilities. |
Controls
Number | Title |
---|---|
CM-7 |
Least Functionality |