STIGQter STIGQter: STIG Summary: Google Android 9.x Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 23 Aug 2019:

The Google Android Pie must be configured to disable Bluetooth or configured via User Based Enforcement (UBE) to allow Bluetooth for only HSP (Headset Profile), HFP (HandsFree Profile), or SPP (Serial Port Profile) capable devices.

DISA Rule

SV-106425r1_rule

Vulnerability Number

V-97321

Group Title

PP-MDF-301110

Rule Version

GOOG-09-001400

Severity

CAT III

CCI(s)

Weight

10

Fix Recommendation

Configure the Google Android device to disable Bluetooth or if the AO has approved the use of Bluetooth (for example, for car handsfree use), train the user to connect to only authorized Bluetooth devices using only HSP, HFP, or SPP Bluetooth capable devices (User Based Enforcement (UBE)).

To disable Bluetooth use the following procedure:
On the MDM Console:
1. Open restrictions section.
2. Toggle "Disallow Bluetooth" to on.

The user training requirement is satisfied in requirement GOOG-09-008700.

Check Contents

Determine if the AO has approved the use of Bluetooth at the site.

If the AO has not approved the use of Bluetooth, verify Bluetooth has been disabled:
On the MDM console, do the following:

1. Open restrictions Section.
2. Ensure "Disallow Bluetooth" is set.

On the Android Pie device, do the following:

1. Go to Settings >> Connected Devices >> Connection Preferences >> Bluetooth
2. Ensure that it's set to Off and you cannot toggle it to On.

If the AO has approved the use of Bluetooth, on the Google Android Pie device do the following:

1. Go to Settings >> Connected Devices
2. Verify only approved Bluetooth connected devices using approved profiles are listed.

If the AO has not approved the use of Bluetooth, and Bluetooth use is not disabled via an MDM managed device policy, this is a finding.
If the AO has approved the use of Bluetooth, and Bluetooth devices using unauthorized Bluetooth profiles are listed on the device under "Connected devices", this is a finding.

Vulnerability Number

V-97321

Documentable

False

Rule Version

GOOG-09-001400

Severity Override Guidance

Determine if the AO has approved the use of Bluetooth at the site.

If the AO has not approved the use of Bluetooth, verify Bluetooth has been disabled:
On the MDM console, do the following:

1. Open restrictions Section.
2. Ensure "Disallow Bluetooth" is set.

On the Android Pie device, do the following:

1. Go to Settings >> Connected Devices >> Connection Preferences >> Bluetooth
2. Ensure that it's set to Off and you cannot toggle it to On.

If the AO has approved the use of Bluetooth, on the Google Android Pie device do the following:

1. Go to Settings >> Connected Devices
2. Verify only approved Bluetooth connected devices using approved profiles are listed.

If the AO has not approved the use of Bluetooth, and Bluetooth use is not disabled via an MDM managed device policy, this is a finding.
If the AO has approved the use of Bluetooth, and Bluetooth devices using unauthorized Bluetooth profiles are listed on the device under "Connected devices", this is a finding.

Check Content Reference

M

Target Key

3499

Comments