Check: GOOG-11-003500
Google Android 11 COPE STIG:
GOOG-11-003500
(in versions v2 r1 through v1 r1)
Title
Google Android 11 must be configured to disable USB mass storage mode. (Cat II impact)
Discussion
USB mass storage mode enables the transfer of data and software from one device to another. This software can include malware. When USB mass storage is enabled on a mobile device, it becomes a potential vector for malware and unauthorized data exfiltration. Prohibiting USB mass storage mode mitigates this risk. SFR ID: FMT_SMF_EXT.1.1 #39a
Check Content
Review Google Android device configuration settings to determine if the mobile device has a USB mass storage mode and whether it has been disabled. This validation procedure is performed on both the EMM Administration Console and the Android 11 device. On the EMM console, do the following: 1. Open "User restrictions on parent". 2. Verify that "Disallow USB file transfer" is toggled to On. On the Android 11 device, do the following: 1. Plug a USB cable into Android 11 device and connect to a non-DoD network-managed PC. 2. Go to Settings >> Connected devices >> USB. 3. Ensure “No data transfer” is selected. If the EMM console device policy is not set to disable USB mass storage mode or on the Android 11 device, the device policy is not set to disable USB mass storage mode, this is a finding.
Fix Text
Configure the Google Android 11 device to disable USB mass storage mode. On the EMM console: 1. Open "User restrictions on parent". 2. Toggle "Disallow USB file transfer".
Additional Identifiers
Rule ID: SV-228618r619923_rule
Vulnerability ID: V-228618
Group Title: PP-MDF-301210
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000381 |
The organization configures the information system to provide only essential capabilities. |
Controls
Number | Title |
---|---|
CM-7 |
Least Functionality |