Check: KNOX-09-000040
Samsung OS 9 with Knox 3.x COBO Use Case KPE(AE) Deployment STIG:
KNOX-09-000040
(in versions v1 r4 through v1 r1)
Title
Samsung Android must be configured to enforce the system application disable list. (Cat II impact)
Discussion
The system application disable list controls user access to/execution of all core and preinstalled applications. Core application: Any application integrated into Samsung Android by Google or Samsung. Preinstalled application: Additional noncore applications included in the Samsung Android build by Google, Samsung, or the wireless carrier. Some system applications can compromise DoD data or upload users' information to non-DoD-approved servers. A user must be blocked from using such applications that exhibit behavior that can result in compromise of DoD data or DoD user information. The site administrator must analyze all preinstalled applications on the device and disable all applications not approved for DoD use by configuring the system application disable list. SFR ID: FMT_SMF_EXT.1.1 #47
Check Content
Review device configurations settings to confirm that the system application disable list has been configured. This procedure is performed on both the MDM Administration console and the Samsung Android device. Confirm if Method #1 or Method #2 is used at the Samsung device site and follow the appropriate procedure. **** Method #1: On the MDM console, for the device, in the "managed Google Play" group, verify that the system application disable list contains all apps that have not been approved for DoD use by the Authorizing Official (AO). On the Samsung Android device, review the apps on the "Personal" App screen and confirm that none of the apps listed in the system application disable list are present. If the system application disable list does not contain all the apps that have not been approved by the AO, or if an app listed can be found on the "Personal" App screen of the Samsung Android device, this is a finding. **** Method #2: On the MDM console, for the device, in the "Knox application" group, verify that the system application disable list contains all apps that have not been approved for DoD use by the AO. On the Samsung Android device, review the apps on the "Personal" App screen and confirm that none of the apps listed in the system application disable list are present. If the system application disable list does not contain all the apps that have not been approved by the AO, or if an app listed can be found on "Personal" App screen of the Samsung Android device, this is a finding.
Fix Text
Configure Samsung Android to enforce the system application disable list. Do one of the following: - Method # 1 (preferred): Use managed Google Play for the device (managed device). - Method #2: Use the Knox system application disable list. **** Method #1: On the MDM console, for the device, in the "managed Google Play" group, add all non-AO-approved system app packages to the system application disable list. **** Method #2: On the MDM console, for the device, in the "Knox application" group, add all non-AO-approved system app packages to the system application disable list. **** Note: Refer to the "System Apps for disablement (other characteristics)" and "System Apps That Must Not Be Disabled" tables in the Supplemental document for this STIG.
Additional Identifiers
Rule ID: SV-217661r388482_rule
Vulnerability ID: V-217661
Group Title: PP-MDF-991000
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000366 |
The organization implements the security configuration settings. |
Controls
Number | Title |
---|---|
CM-6 |
Configuration Settings |