Check: KNOX-09-000680
Samsung OS 9 with Knox 3.x COBO Use Case KPE(AE) Deployment STIG:
KNOX-09-000680
(in versions v1 r4 through v1 r1)
Title
Samsung Android must be configured to disable USB mass storage mode. (Cat II impact)
Discussion
USB mass storage mode enables the transfer of data and software from one device to another. This software can include malware. When USB mass storage is enabled on a mobile device, it becomes a potential vector for malware and unauthorized data exfiltration. Prohibiting USB mass storage mode mitigates this risk. SFR ID: FMT_SMF_EXT.1.1 #39a
Check Content
Review device configuration settings to confirm that USB file transfer has been disallowed. This procedure is performed on both the MDM Administration console and the Samsung Android device. On the MDM console, for the device, in the "Android user restrictions" group, verify that "disallow usb file transfer" is selected. Connect the Samsung Android device to a non-DoD network-managed PC with a USB cable. On the PC, browse the mounted Samsung Android device and verify that it does not display any folders or files. If on the MDM console "disallow USB file transfer" is not selected, or the PC can mount and browse folders and files on the Samsung Android device, this is a finding.
Fix Text
Configure Samsung Android to disallow USB file transfer. On the MDM console, for the device, in the "Android user restrictions" group, select "disallow USB file transfer".
Additional Identifiers
Rule ID: SV-217678r617456_rule
Vulnerability ID: V-217678
Group Title: PP-MDF-301210
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000381 |
The organization configures the information system to provide only essential capabilities. |
Controls
Number | Title |
---|---|
CM-7 |
Least Functionality |