STIGQter STIGQter: STIG Summary: Google Android 11 COPE Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 11 Sept 2020:

Google Android 11 must be configured to enforce an application installation policy by specifying an application allow list that restricts applications by the following characteristics: [selection: list of digital signatures, cryptographic hash values, names, application version].

DISA Rule

SV-228611r505832_rule

Vulnerability Number

V-228611

Group Title

PP-MDF-301090

Rule Version

GOOG-11-001000

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the Google Android 11 device to use an application allow list.

On the EMM Console:
1. Go to the Android app catalog for managed Google Play.
2. Select apps to be available (only approved apps).
3. Push updated policy to the device.

NOTE: Managed Google Play is an allowed App Store.

Check Contents

Review Google Android device configuration settings to determine if the mobile device has an application allow list configured. Verify all applications listed on the allow list have been approved by the Approving Official (AO).

On the EMM console, do the following:
1. Go to the Android app catalog for managed Google Play.
2. Verify all selected apps are AO approved.

On the Android 11 device, do the following:
1. Open the managed Google Play store.
2. Verify that only the approved apps are visible.

NOTE: Managed Google Play is an allowed App Store.

If the EMM console list of selected Managed Google Play apps includes non-approved apps, this is a finding.

NOTE: The application allow list will include approved core applications (included in the OS by the OS vendor) and pre-installed applications (provided by the MD vendor and wireless carrier), or the MD must provide an alternate method of restricting user access/execution to core and pre-installed applications. For Google Android, there are no pre-installed applications.

Vulnerability Number

V-228611

Documentable

False

Rule Version

GOOG-11-001000

Severity Override Guidance

Review Google Android device configuration settings to determine if the mobile device has an application allow list configured. Verify all applications listed on the allow list have been approved by the Approving Official (AO).

On the EMM console, do the following:
1. Go to the Android app catalog for managed Google Play.
2. Verify all selected apps are AO approved.

On the Android 11 device, do the following:
1. Open the managed Google Play store.
2. Verify that only the approved apps are visible.

NOTE: Managed Google Play is an allowed App Store.

If the EMM console list of selected Managed Google Play apps includes non-approved apps, this is a finding.

NOTE: The application allow list will include approved core applications (included in the OS by the OS vendor) and pre-installed applications (provided by the MD vendor and wireless carrier), or the MD must provide an alternate method of restricting user access/execution to core and pre-installed applications. For Google Android, there are no pre-installed applications.

Check Content Reference

M

Target Key

4229

Comments