Check: GOOG-09-010400
Google Android 9.x STIG:
GOOG-09-010400
(in versions v2 r1 through v1 r1)
Title
Google Android Pie must configured to disallow outgoing beam. (Cat II impact)
Discussion
Outgoing beam allows transfer of data through near field communication (NFC) and Bluetooth by touching two unlocked devices together. If it were enabled, sensitive DoD data could be transmitted. Because of the security risks of sharing sensitive DoD data, users must not be able to allow outgoing beam. SFR ID: FMT_MOF_EXT.1.2 #47
Check Content
Review the Google Android Pie device configuration settings to confirm that outgoing beam is disallowed. This procedure is performed on both the MDM Administration console and the Google Android Pie device. On the MDM console, in the Android user restrictions section, select "Disallow outgoing beam" to on". On the Google Android Pie device, do the following: 1. Open Settings. 2. Tap "Connected devices". 3. Tap "Connection preferences". 4. Verify that "Android Beam" is off and grayed out. If on the MDM console "Disallow outgoing beam" is not set to on, or on the Google Android Pie device "Android Beam" is not off and grayed out, this is a finding.
Fix Text
Configure Google Android Pie device to disallow outgoing beam. On the MDM console, in the Android user restrictions section, select "Disallow outgoing beam" to on.
Additional Identifiers
Rule ID: SV-106469r1_rule
Vulnerability ID: V-97365
Group Title: PP-MDF-991000
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000366 |
The organization implements the security configuration settings. |
CCI-000370 |
The organization employs automated mechanisms to centrally manage configuration settings for organization-defined information system components. |