STIGQter STIGQter: STIG Summary: Samsung Android 11 with Knox 3.x AE Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 20 Nov 2020:

Samsung Android must be configured to disable developer modes.

DISA Rule

SV-230985r607691_rule

Vulnerability Number

V-230985

Group Title

PP-MDF-301170

Rule Version

KNOX-11-005100

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure Samsung Android to disable developer modes.

On the management tool, in the device restrictions section, set the "Debugging Features" to "Disallow".

Check Contents

Review Samsung Android configuration settings to determine whether a developer mode is enabled.

This validation procedure is performed on both the management tool Administration Console and the Samsung Android device.

On the management tool, in the device restrictions section, verify that "Debugging Features" is set to "Disallow".

On the Samsung Android device:
1. Open "Settings".
2. Verify "Developer options" is not listed.

If on the management tool "Debugging Features" is not set to "Disallow" or on the Samsung Android device "Developer options" is listed, this is a finding.

Vulnerability Number

V-230985

Documentable

False

Rule Version

KNOX-11-005100

Severity Override Guidance

Review Samsung Android configuration settings to determine whether a developer mode is enabled.

This validation procedure is performed on both the management tool Administration Console and the Samsung Android device.

On the management tool, in the device restrictions section, verify that "Debugging Features" is set to "Disallow".

On the Samsung Android device:
1. Open "Settings".
2. Verify "Developer options" is not listed.

If on the management tool "Debugging Features" is not set to "Disallow" or on the Samsung Android device "Developer options" is listed, this is a finding.

Check Content Reference

M

Target Key

5247

Comments