Check: LGA6-20-100601
LG Android 6-x STIG:
LGA6-20-100601
(in versions v1 r2 through v1 r1)
Title
LG Android 6.x must enforce an application installation policy by specifying one or more authorized application repositories by disabling Google Play. (Cat II impact)
Discussion
Forcing all applications to be installed from authorized application repositories can prevent unauthorized and malicious applications from being installed and executed on mobile devices. Allowing such installations and executions could cause a compromise of DoD data accessible by these unauthorized/malicious applications. SFR ID: FMT_SMF_EXT.1.1 #10a
Check Content
This validation procedure is performed on both the MDM Administration Console and the LG Android device. On the MDM console, do the following: 1. Ask the MDM administrator to display the "Allow Google Play Store" setting in the MDM console. 2. Verify the setting is disabled. 3. Verify the policy has been assigned to all groups. On the LG Android device: 1. Unlock the device. 2. Navigate to the Play Store on the device home screen. 3. Verify Google Play Store application does not run. If on the MDM console the "Allow Google Play Store" setting is enabled or if the user is able to run the Google Play Store on the LG Android device, this is a finding.
Fix Text
Configure the mobile operating system to disable unauthorized application repositories. On the MDM Administration Console, disable "Google Play Store".
Additional Identifiers
Rule ID: SV-81305r2_rule
Vulnerability ID: V-66815
Group Title:
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000366 |
The organization implements the security configuration settings. |
CCI-001806 |
The organization defines methods to be employed to enforce the software installation policies. |