Check: KNOX-09-000685
Samsung Android OS 9 with Knox 3.x COPE Use Case KPE(Legacy) Deployment STIG:
KNOX-09-000685
(in versions v1 r5 through v1 r1)
Title
Samsung Android must be configured to disable USB mass storage mode. (Cat II impact)
Discussion
USB mass storage mode enables the transfer of data and software from one device to another. This software can include malware. When USB mass storage is enabled on a mobile device, it becomes a potential vector for malware and unauthorized data exfiltration. Prohibiting USB mass storage mode mitigates this risk. SFR ID: FMT_SMF_EXT.1.1 #39a
Check Content
Review device configuration settings to confirm that USB mass storage mode has been disabled. This procedure is performed on both the MDM Administration console and the Samsung Android device. On the MDM console, for the device, in the "Knox restrictions" group, verify that "disable USB media player" is selected. Connect the Samsung Android device to a non-DoD network-managed PC with a USB cable. On the PC, browse the mounted Samsung Android device and verify that it does not display any folders or files. If on the MDM console "disable USB media player" is not selected, or the PC can mount and browse folders and files on the Samsung Android device, this is a finding.
Fix Text
Configure Samsung Android to disable USB mass storage mode. On the MDM console, for the device, in the "Knox restrictions" group, select "disable USB media player".
Additional Identifiers
Rule ID: SV-217816r617456_rule
Vulnerability ID: V-217816
Group Title: PP-MDF-301210
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000381 |
The organization configures the information system to provide only essential capabilities. |
Controls
Number | Title |
---|---|
CM-7 |
Least Functionality |