STIGQter STIGQter: STIG Summary: Samsung Android 11 with Knox 3.x AE Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 20 Nov 2020:

Samsung Android Work Environment must be configured to enforce an application installation policy by specifying an application allowlist that restricts applications by the following characteristics: names.

DISA Rule

SV-230978r607691_rule

Vulnerability Number

V-230978

Group Title

PP-MDF-301090

Rule Version

KNOX-11-001700

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure Samsung Android Work Environment to use an application allowlist.

The application allowlist does not control user access to/execution of all core and preinstalled applications, and guidance for doing so is covered in KNOX-10-009300.

On the management tool:
1. Open the device restrictions section.
2. Set "installs from unknown sources globally" to "Disallow".
3. In the Work Environment app catalog for managed Google Play, add each AO-approved app to be available.

NOTE: Managed Google Play is an allowed App Store.

Check Contents

Review the Samsung Android Work Environment configuration setting to determine if the mobile device has an application allowlist configured. Verify that all applications listed on the allowlist have been approved by the Approving Official (AO).

This validation procedure is performed only on the management tool Administration Console.

On the management tool:
1. Open the device restrictions section.
2. Verify "installed from unknown sources globally" is set to "Disallow".
3. In the Work Environment app catalog for managed Google Play, verify that only AO-approved apps are available.

If on the management tool the Work Environment app catalog for managed Google Play includes non-AO-approved apps, this is a finding.

Vulnerability Number

V-230978

Documentable

False

Rule Version

KNOX-11-001700

Severity Override Guidance

Review the Samsung Android Work Environment configuration setting to determine if the mobile device has an application allowlist configured. Verify that all applications listed on the allowlist have been approved by the Approving Official (AO).

This validation procedure is performed only on the management tool Administration Console.

On the management tool:
1. Open the device restrictions section.
2. Verify "installed from unknown sources globally" is set to "Disallow".
3. In the Work Environment app catalog for managed Google Play, verify that only AO-approved apps are available.

If on the management tool the Work Environment app catalog for managed Google Play includes non-AO-approved apps, this is a finding.

Check Content Reference

M

Target Key

5247

Comments