Check: GOOG-11-002800
Google Android 11 COPE STIG:
GOOG-11-002800
(in versions v2 r1 through v1 r1)
Title
Google Android 11 must be configured to disable developer modes. (Cat II impact)
Discussion
Developer modes expose features of the Google Android device that are not available during standard operation. An adversary may leverage a vulnerability inherent in a developer mode to compromise the confidentiality, integrity, and availability of DoD sensitive information. Disabling developer modes mitigates this risk. SFR ID: FMT_SMF_EXT.1.1 #26
Check Content
Review Google Android device configuration settings to determine whether a developer mode is enabled. This validation procedure is performed on both the EMM Administration Console and the Android 11 device. On the EMM Console: 1. Open "Set user restrictions" section. 2. Verify that "Disallow debugging features" is toggled to On. 3. Open "Set user restrictions on parent" section. 4. Verify that "Disallow debugging features" is toggled to On. On the Android 11 device, do the following: 1. Go to Settings >> System. 2. Ensure Developer Options is not listed. 3. Go to Settings >> About Phone. 4. Tap on the Build Number to try to enable Developer Options and validate that action is blocked. If the EMM console device policy is not set to disable developer mode or on the Android 11 device, the device policy is not set to disable developer mode, this is a finding.
Fix Text
Configure the Google Android 11 device to disable developer modes. On the EMM Console: 1. Open "Set user restrictions" section. 2. Toggle "Disallow debugging features" to On. 3. Open "Set user restrictions on parent" section. 4. Toggle "Disallow debugging features" to On.
Additional Identifiers
Rule ID: SV-228616r619923_rule
Vulnerability ID: V-228616
Group Title: PP-MDF-301170
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000381 |
The organization configures the information system to provide only essential capabilities. |
Controls
Number | Title |
---|---|
CM-7 |
Least Functionality |