Samsung Android 12 with Knox 3.x COPE Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates ✎ 1
Comparison against the immediately-prior release (V1R1). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Content changes 1
- V-252414 Medium descriptioncheck Samsung Android must be configured to enable a screen-lock policy that will lock the display after a period of inactivity - Disable trust agents.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- KNOX-12-210010
- Vuln IDs
-
- V-252406
- Rule IDs
-
- SV-252406r815431_rule
Checks: C-55862r815429_chk
Review the configuration to determine if the Samsung Android devices are enrolled in a DoD-approved use case. This validation procedure is performed on both the management tool Administration Console and the Samsung Android device. On the management tool, verify that the default enrollment is set to "Work profile for company-owned devices". On the Samsung Android device: 1. Open Settings >> Work profile >> Other security settings >> Device admin apps. 2. Verify that the management tool Agent is listed. 3. Go to the app drawer. 4. Verify that a "Personal" and "Work" tab are present. If on the management tool the default enrollment is not set as "Work profile for company-owned devices", or on the Samsung Android device the "Personal" and "Work" tabs are not present or the management tool Agent is not listed, this is a finding.
Fix: F-55812r815430_fix
Enroll the Samsung Android devices in a DoD-approved use case. On the management tool, configure the default enrollment as "Work profile for company-owned devices". Refer to the management tool documentation to determine how to configure the device enrollment.
- RMF Control
- AC-8
- Severity
- L
- CCI
- CCI-000048
- Version
- KNOX-12-210020
- Vuln IDs
-
- V-252407
- Rule IDs
-
- SV-252407r815434_rule
Checks: C-55863r815432_chk
Confirm if Method #1 or #2 is used at the Samsung device site and follow the appropriate procedure. This validation procedure is performed on both the management tool and the Samsung Android device. Validation Procedure for Method #1: Place the DoD warning banner in the user agreement signed by each Samsung Android device user (preferred method). Review the signed user agreements for several Samsung Android device users and verify that the agreement includes the required DoD warning banner text. Validation Procedure for Method #2: Configure the warning banner text in the Lock screen message on each managed mobile device. On the management tool, in the device restrictions section, verify that "Lock Screen Message" is set to the DoD-mandated warning banner text. On the Samsung Android device, verify that the required DoD warning banner text is displayed on the Lock screen. If the warning text has not been placed in the signed user agreement, or if on the management tool "Lock Screen Message" is not set to the DoD-mandated warning banner text, or on the Samsung Android device the required DoD warning banner text is not displayed on the Lock screen, this is a finding.
Fix: F-55813r816524_fix
Configure the DoD warning banner by either of the following methods (required text is found in the Vulnerability Discussion): Method #1: Place the DoD warning banner in the user agreement signed by each Samsung Android device user (preferred method). Method #2: Configure the warning banner text in the Lock screen message on each managed mobile device. On the management tool, in the device restrictions section, set "Lock Screen Message" to the DoD-mandated warning banner text.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- KNOX-12-210030
- Vuln IDs
-
- V-252408
- Rule IDs
-
- SV-252408r815437_rule
Checks: C-55864r815435_chk
Review the configuration to determine if the Samsung Android devices are disallowing passwords containing more than four repeating or sequential characters. This validation procedure is performed on both the management tool and the Samsung Android device. On the management tool, in the device password policies, verify "minimum password quality" is set to "Numeric(Complex)" or better. On the Samsung Android device: 1. Open Settings >> Lock screen >> Screen lock type. 2. Enter current password. 3. Tap "PIN". 4. Verify that PINS with more than four repeating or sequential numbers are not accepted. If on the management tool "minimum password quality" is not set to "Numeric(Complex)" or better, or on the Samsung Android device a password with more than four repeating or sequential numbers is accepted, this is a finding.
Fix: F-55814r815436_fix
Configure the Samsung Android devices to disallow passwords containing more than four repeating or sequential characters. On the management tool, in the device password policies, set "minimum password quality" to "Numeric(Complex)" or better. If your management tool does not support "Numeric(Complex)" but does support "Numeric", KPE can be used to achieve STIG compliance. In this case, configure this policy with value "Numeric" and use an additional KPE policy (innately by the management tool or via KSP) "Maximum Numeric Sequence Length" with value "4".
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000057
- Version
- KNOX-12-210040
- Vuln IDs
-
- V-252409
- Rule IDs
-
- SV-252409r815440_rule
Checks: C-55865r815438_chk
Verify requirement KNOX-12-210030 (minimum password quality) has been implemented. If a "minimum password quality" has not been implemented, this is a finding.
Fix: F-55815r815439_fix
Implement a "minimum password quality" (see requirement KNOX-12-210030).
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000205
- Version
- KNOX-12-210050
- Vuln IDs
-
- V-252410
- Rule IDs
-
- SV-252410r815443_rule
Checks: C-55866r815441_chk
Review the configuration to determine if the Samsung Android devices are enforcing a minimum password length of six characters. This validation procedure is performed on both the management tool and the Samsung Android device. On the management tool, in the device password policies, verify "minimum password length" is set to "6". On the Samsung Android device: 1. Open Settings >> Lock screen >> Screen lock type. 2. Enter current password. 3. Tap "PIN". 4. Verify the text "PIN must contain at least", followed by a value of at least "6 digits", appears above the PIN entry. If on the management tool "minimum password length" is not set to "6", or on the Samsung Android device the text "PIN must contain at least" is followed by a value of less than "6 digits", this is a finding.
Fix: F-55816r815442_fix
Configure the Samsung Android devices to enforce a minimum password length of six characters. On the management tool, in the device password policies, set "minimum password length" to "6".
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- KNOX-12-210060
- Vuln IDs
-
- V-252411
- Rule IDs
-
- SV-252411r815446_rule
Checks: C-55867r815444_chk
Review the configuration to determine if the Samsung Android devices are allowing only 10 or fewer consecutive failed authentication attempts. This validation procedure is performed on both the management tool and the Samsung Android device. On the management tool, in the device password policies, verify "max password failures for local wipe" is set to "10" attempts or less. On the Samsung Android device: 1. Open Settings >> Lock screen. 2. Verify "Secure lock settings" is present and tap it. 3. Enter current password. 4. Verify that "Auto factory reset" is greyed out, and cannot be configured. If on the management tool "max password failures for local wipe" is not set to "10" attempts or less, or on the Samsung Android device the "Auto factory reset" menu can be configured, this is a finding.
Fix: F-55817r815445_fix
Configure the Samsung Android devices to allow only 10 or fewer consecutive failed authentication attempts. On the management tool, in the device password policies, set "max password failures for local wipe" to "10" attempts or less. A device password must be set for "max password failures for local wipe" to become active.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000057
- Version
- KNOX-12-210070
- Vuln IDs
-
- V-252412
- Rule IDs
-
- SV-252412r815449_rule
Checks: C-55868r815447_chk
Review the configuration to determine if the Samsung Android devices are locking the device display after 15 minutes (or less) of inactivity. This validation procedure is performed on both the management tool and the Samsung Android device. On the management tool, in the device password policies, verify "max time to screen lock" is set to "15 minutes" or less. On the Samsung Android device: 1. Open Settings >> Lock screen. 2. Verify "Secure lock settings" is present and tap it. 3. Enter current password. 4. Tap "Auto lock when screen turns off". 5. Verify the listed timeout values are 15 minutes or less. If on the management tool "max time to screen lock" is not set to "15 minutes" or less, or on the Samsung Android device "Secure lock settings" is not present and the listed Screen timeout values include durations of more than 15 minutes, this is a finding.
Fix: F-55818r815448_fix
Configure the Samsung Android devices to lock the device display after 15 minutes (or less) of inactivity. On the management tool, in the device password policies, set "max time to screen lock" to "15 minutes" or less. A device password must be set for "max time to screen lock" to become active.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000767
- Version
- KNOX-12-210080
- Vuln IDs
-
- V-252413
- Rule IDs
-
- SV-252413r815452_rule
Checks: C-55869r815450_chk
Review the configuration to determine if the Samsung Android devices are disabling Face Recognition. This validation procedure is performed on both the management tool and the Samsung Android device. If a KPE premium license is activated, Facial Recognition will be automatically disabled Otherwise, On the management tool, in the device restrictions, verify that "Face" is set to "Disable". On the Samsung Android device: 1. Open Settings >> Lock screen >> Screen lock type. 2. Enter current password. 3. Verify that "Face" is disabled and cannot be enabled. If on the management tool a KPE premium license is not activated and "Face" is not set to "Disable", or on the Samsung Android device "Face" can be enabled, this is a finding.
Fix: F-55819r815451_fix
Configure the Samsung Android devices to disable Face Recognition. This policy is included to allow a Samsung Android device to be deployed without an activated KPE premium license. If a license is activated, Facial Recognition will be automatically disabled. In this case, this policy does not need to be configured for STIG compliance, as Face as a biometric will be disabled. On the management tool, in the device restrictions, set "Face" to "Disable".
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000767
- Version
- KNOX-12-210090
- Vuln IDs
-
- V-252414
- Rule IDs
-
- SV-252414r835025_rule
Checks: C-55870r835024_chk
Review the configuration to determine if the Samsung Android devices are disabling Trust Agents. This validation procedure is performed on both the management tool and the Samsung Android device. On the management tool, in the device restrictions, verify that "Trust Agents" are set to "Disable". -On the Samsung Android device: 1. Open Settings >> Biometrics and security >> Other security settings >> Trust agents. 2. Verify that all listed Trust Agents are disabled and cannot be enabled. If a Trust Agent is not disabled in the list, verify for that Trust Agent all of its listed Trustlets are disabled and cannot be enabled. If on the management tool "Trust Agents" are not set to "Disable", or on the Samsung Android device a "Trust Agent" or "Trustlet" can be enabled, this is a finding. Note: If the management tool has been correctly configured, but a Trust Agent is still enabled, configure the "List of approved apps listed in managed Google Play" to disable it; refer to KNOX-12-110190. Exception: Trust Agents may be used if the AO allows a screen lock timeout after four hours (or more) of inactivity. This may be applicable to tactical use case.
Fix: F-55820r815454_fix
Configure the Samsung Android devices to disable Trust Agents. On the management tool, in the device restrictions, set "Trust Agents" to "Disable".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- KNOX-12-210100
- Vuln IDs
-
- V-252415
- Rule IDs
-
- SV-252415r815458_rule
Checks: C-55871r815456_chk
Review the configure to determine if the Samsung Android devices are disabling developer modes. This validation procedure is performed on both the management tool and the Samsung Android device. On the management tool, in the device restrictions, verify that "Debugging Features" is set to "Disallow". On the Samsung Android device: 1. Open "Settings". 2. Verify "Developer options" is not listed. If on the management tool "Debugging Features" is not set to "Disallow" or on the Samsung Android device "Developer options" is listed, this is a finding.
Fix: F-55821r815457_fix
Configure the Samsung Android devices to disable developer modes. On the management tool, in the device restrictions, set "Debugging Features" to "Disallow".
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- KNOX-12-210110
- Vuln IDs
-
- V-252416
- Rule IDs
-
- SV-252416r816525_rule
Checks: C-55872r815459_chk
Review the Samsung documentation and inspect the configuration to verify the Samsung Android devices are paired only with devices which support HSP, HFP, SPP, A2DP, AVRCP, and PBAP Bluetooth profiles. This validation procedure is performed on both the management tool and the Samsung Android device. On the management tool, in the device restrictions section, verify "Bluetooth" is set to the AO-approved selection; "Allow" - if the AO has approved the use of Bluetooth - or "Disallow", if not. On the Samsung Android device: 1. Open Settings >> Connections >> Bluetooth 2. Verify that all listed paired Bluetooth devices use only authorized Bluetooth profiles. If on the management tool "Bluetooth" is not set to the AO-approved value, or the Samsung Android device is paired with a device which uses unauthorized Bluetooth profiles, this is a finding.
Fix: F-55822r815460_fix
Configure the Samsung Android devices to disable Bluetooth, or if the AO has approved the use of Bluetooth (for example, for hands-free use), train users to only pair devices which support HSP, HFP, SPP, A2DP, AVRCP, PBAP profiles. On the management tool, in the device restrictions section, set "Bluetooth" to the AO-approved selection; "Allow" - if the AO has approved the use of Bluetooth - or "Disallow", if not. The user training requirement is satisfied in requirement KNOX-12-210290.
- RMF Control
- SC-28
- Severity
- H
- CCI
- CCI-001199
- Version
- KNOX-12-210120
- Vuln IDs
-
- V-252417
- Rule IDs
-
- SV-252417r815464_rule
Checks: C-55873r815462_chk
Review the configuration to determine if the Samsung Android devices are either enabling data-at-rest protection for removable media, or are disabling their use. This requirement is not applicable for devices that do not support removable storage media. This validation procedure is performed on both the management tool and the Samsung Android device. On the management tool, in the device restrictions, verify that "Mount physical media" is set to "Disallow". On the Samsung Android device, verify that a microSD card cannot be mounted. The device should ignore the inserted SD card and no notifications for the transfer of media files should appear, nor should any files be listed using a file browser, such as Samsung My Files. If on the management tool "Mount physical media" is not set to "Disallow", or on the Samsung Android device a microSD card can be mounted, this is a finding.
Fix: F-55823r815463_fix
Configure the Samsung Android devices to enable data-at-rest protection for removable media, or alternatively, disable their use. This requirement is not applicable for devices that do not support removable storage media. On the management tool, in the device restrictions, set "Mount physical media" to "Disallow". This disables the use of all removable storage, e.g., micro SD cards, USB thumb drives, etc. If your deployment requires the use of micro SD cards, KPE can be used to allow its usage in a STIG approved configuration. In this case, do not configure this policy, and instead replace with KPE policy (innately by management tool or via KSP) "Enforce external storage encryption" with value "enable".
- RMF Control
- SC-41
- Severity
- M
- CCI
- CCI-002546
- Version
- KNOX-12-210130
- Vuln IDs
-
- V-252418
- Rule IDs
-
- SV-252418r815467_rule
Checks: C-55874r815465_chk
Review the configuration to determine if the Samsung Android devices are disabling USB mass storage mode. This validation procedure is performed on both the management tool and the Samsung Android device. On the management tool, in the device restrictions, verify that "USB file transfer" has been set to "Disallow". On the PC, browse the mounted Samsung Android device and verify that it does not display any folders or files. If on the management tool "USB file transfer" is not set to "Disallow", or the PC can mount and browse folders and files on the Samsung Android device, this is a finding.
Fix: F-55824r815466_fix
Configure the Samsung Android devices to disable USB mass storage mode. On the management tool, in the device restrictions, set "USB file transfer" to "Disallow". DeX drag & drop file transfer capabilities will be prohibited, but all other DeX capabilities remain useable.
- RMF Control
- SC-4
- Severity
- M
- CCI
- CCI-001090
- Version
- KNOX-12-210140
- Vuln IDs
-
- V-252419
- Rule IDs
-
- SV-252419r816526_rule
Checks: C-55875r815468_chk
Verify requirement KNOX-12-210130 (Disallow USB file transfer) has been implemented. If "Disallow USB file transfer" has not been implemented, this is a finding.
Fix: F-55825r815469_fix
Verify "USB file transfer" has been "Disallowed" (see requirement KNOX-12-210130).
- RMF Control
- AC-18
- Severity
- M
- CCI
- CCI-001443
- Version
- KNOX-12-210150
- Vuln IDs
-
- V-252420
- Rule IDs
-
- SV-252420r815473_rule
Checks: C-55876r815471_chk
Review the configuration to determine if the Samsung Android devices are enabling authentication of personal hotspot connections to the device using a preshared key. This validation procedure is performed on both the management tool and the Samsung Android device. On the management tool, in the device restrictions, verify "Config tethering" is set to "Disallow". On the Samsung Android device: 1. Open Settings >> Connections. 2. Verify that "Mobile Hotspot and Tethering" is greyed out. If on the management tool "Config tethering" is not set to "Disallow", or on the Samsung Android device "Mobile Hotspot and Tethering" is not greyed out, this is a finding.
Fix: F-55826r815472_fix
Configure the Samsung Android devices to enable authentication of personal hotspot connections to the device using a pre-shared key. On the management tool, in the device restrictions, set "Config tethering" to "Disallow". If your deployment requires the use of Mobile Hotspot & Tethering, KPE policy can be used to allow its usage in a STIG approved configuration. In this case, do not configure this policy, and instead replace with KPE policy (innately by management tool or via KSP) "Allow open Wi-Fi connection" with value "Disable" and add Training Topic "Don't use Wi-Fi Sharing" (see supplemental document for additional information)
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- KNOX-12-210160
- Vuln IDs
-
- V-252421
- Rule IDs
-
- SV-252421r815476_rule
Checks: C-55877r815474_chk
Review the configuration to determine if the Samsung Android devices are disallowing the users from changing the date and time. This validation procedure is performed on both the management tool and the Samsung Android device. On the management tool, in the device restrictions, verify that "Config Date/Time" is set to "Disallow". On the Samsung Android device: 1. Open Settings >> General management >> Date and time. 2. Verify that "Automatic data and time" is on and the user cannot disable it. If on the management tool "Config Date/Time" is not set to "Disallow", or on the Samsung Android device "Automatic date and time" is not set or the user can disable it, this is a finding.
Fix: F-55827r815475_fix
Configure the Samsung Android devices to disallow users from changing the date and time. On the management tool, in the device restrictions, set "Config Date/Time" to "Disallow".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- KNOX-12-210170
- Vuln IDs
-
- V-252422
- Rule IDs
-
- SV-252422r815479_rule
Checks: C-55878r815477_chk
Review the configuration to determine if the Samsung Android's Work profile has the DoD root and intermediate PKI certificates installed. This validation procedure is performed on both the management tool and the Samsung Android device. The current DoD root and intermediate PKI certificates may be obtained in self-extracting zip files at https://cyber.mil/pki-pke (for NIPRNet). On the management tool, in the Work profile policy management, verify that the DoD root and intermediate PKI certificates are installed. On the Samsung Android device: 1. Open Settings >> Biometrics and security >> Other security settings >> View security certificates. 2. In the User tab, verify that the DoD root and intermediate PKI certificates are listed in the Work profile. If on the management tool the DoD root and intermediate PKI certificates are not listed in the Work profile, or on the Samsung Android device the DoD root and intermediate PKI certificates are not listed in the Work profile, this is a finding.
Fix: F-55828r815478_fix
Install the DoD root and intermediate PKI certificates into the Samsung Android devices' Work profile. The current DoD root and intermediate PKI certificates may be obtained in self-extracting zip files at https://cyber.mil/pki-pke (for NIPRNet). On the management tool, in the Work profile policy management, install the DoD root and intermediate PKI certificates.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001764
- Version
- KNOX-12-210180
- Vuln IDs
-
- V-252423
- Rule IDs
-
- SV-252423r815482_rule
Checks: C-55879r815480_chk
Review the configuration to determine if the Samsung Android devices' Work profile is allowing users to install only applications that have been approved by the Authorizing Official (AO). This validation procedure is performed only on the management tool. On the management tool, in the app catalog for managed Google Play, verify that only AO-approved apps are available. If on the management tool the app catalog for managed Google Play includes non-AO-approved apps, this is a finding.
Fix: F-55829r815481_fix
Configure the Samsung Android devices' Work profile to allow users to install only applications that have been approved by the Authorizing Official (AO). In addition to any local policy, the AO must not approve applications which have certain prohibited characteristics, these are covered in KNOX-12-210190. On the management tool, in the app catalog for managed Google Play, add each AO-approved app to be available. NOTE: Managed Google Play is an allowed App Store.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- KNOX-12-210190
- Vuln IDs
-
- V-252424
- Rule IDs
-
- SV-252424r816527_rule
Checks: C-55880r816528_chk
Verify requirement KNOX-12-210180 (managed Google Play) has been implemented. If "managed Google Play" has not been implemented, this is a finding.
Fix: F-55830r816529_fix
The Authorizing Official (AO) must not approve applications with the following characteristics for installation by users in the Work profile: - back up MD data to non-DoD cloud servers (including user and application access to cloud backup services); - transmit MD diagnostic data to non-DoD servers; - voice assistant application if available when MD is locked; - voice dialing application if available when MD is locked; - allows synchronization of data or applications between devices associated with user; - payment processing; and - allows unencrypted (or encrypted but not FIPS 140-2 validated) data sharing with other MDs, display screens (screen mirroring), or printers. Implement "managed Google Play" (see requirement KNOX-12-210180).
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000060
- Version
- KNOX-12-210200
- Vuln IDs
-
- V-252425
- Rule IDs
-
- SV-252425r815488_rule
Checks: C-55881r815486_chk
Review the configuration to determine if the Samsung Android devices are not displaying (Work Environment) notifications when the device is locked. Notifications of incoming phone calls are acceptable even when the device is locked. This validation procedure is performed on both the management tool Administration Console and the Samsung Android device. On the management tool, in the Work profile restrictions section, verify that "Unredacted Notifications" is set to "Disallow". On the Samsung Android device: 1. Open Settings >> Work profile >> Notification and data. 2. Verify that "Show notification content" is disabled. If on the management tool "Unredacted Notifications" is not set to "Disallow", or on the Samsung Android device "Show notification content" is not disabled, this is a finding.
Fix: F-55831r815487_fix
Configure the Samsung Android devices to not display (Work Environment) notifications when the device is locked. On the management tool, in the Work profile restrictions section, set "Unredacted Notifications" to "Disallow".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- KNOX-12-210210
- Vuln IDs
-
- V-252426
- Rule IDs
-
- SV-252426r815491_rule
Checks: C-55882r815489_chk
Review the configuration to determine if the Samsung Android devices' Work profile is enabling audit logging. This validation procedure is performed on the management tool only. On the management tool, in the Work profile restrictions, verify that "Security logging" is set to "Enable". If on the management tool "Security logging" is not set to "Enable", this is a finding.
Fix: F-55832r815490_fix
Configure the Samsung Android devices' Work profile to enable audit logging. On the management tool, in the Work profile restrictions section, set "Security logging" to "Enable".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- KNOX-12-210220
- Vuln IDs
-
- V-252427
- Rule IDs
-
- SV-252427r815494_rule
Checks: C-55883r815492_chk
Review the configuration to determine if the Samsung Android devices are preventing users from adding personal email accounts to the work email app. On the management tool, in the device restrictions section, verify "Modify accounts" is set to "Disallow". On the Samsung Android device: 1. Open Settings >> Work profile >> Accounts. 2. Verify that no account can be added. If on the management tool "Modify accounts" is not set to "Disallow", or on the Samsung Android device an account can be added, this is a finding.
Fix: F-55833r815493_fix
Configure the Samsung Android devices to prevent users from adding personal email accounts to the work email app. On the management tool, in the Work profile restrictions, set "Modify accounts" to "Disallow".
- RMF Control
- SC-4
- Severity
- M
- CCI
- CCI-001090
- Version
- KNOX-12-210230
- Vuln IDs
-
- V-252428
- Rule IDs
-
- SV-252428r815497_rule
Checks: C-55884r815495_chk
Verify requirement KNOX-12-210220 (Disallow modify accounts) has been implemented. If "Disallow modify accounts" has not been implemented, this is a finding.
Fix: F-55834r815496_fix
Implement "Disallow modify accounts" (see requirement KNOX-12-210220)
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002233
- Version
- KNOX-12-210240
- Vuln IDs
-
- V-252429
- Rule IDs
-
- SV-252429r816530_rule
Checks: C-55885r815498_chk
Review the Samsung documentation and inspect the configuration to verify the Samsung Android devices are enabling an "access control policy" that prevents "application processes, and groups of application processes from accessing all data stored by other application processes, and groups of application processes". This validation procedure is performed on both the management tool and the Samsung Android device. On the management tool, in the Work profile restrictions, set "Cross profile copy/paste" to "Disallow". On the Samsung Android device: 1. Using any Work app, copy text to the clipboard. 2. Using any Personal app, verify that the clipboard text cannot be pasted. If on the management tool "Cross profile copy/paste" is not set to "Disallow", or on the Samsung Android device the clipboard text can be pasted into a Personal app, this is a finding.
Fix: F-55835r815499_fix
Configure the Samsung Android devices to enable an "access control policy" that prevents "application processes, and groups of application processes from accessing all data stored by other application processes, and groups of application processes". On the management tool, in the Work profile restrictions section, set "Cross profile copy/paste" to "Disallow".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- KNOX-12-210250
- Vuln IDs
-
- V-252430
- Rule IDs
-
- SV-252430r815503_rule
Checks: C-55886r815501_chk
Review the configuration to determine if the Samsung Android devices' Work profile is preventing users from removing DoD root and intermediate PKI certificates. This validation procedure is performed on both the management tool and the Samsung Android device. On the management tool, in the Work profile restrictions, verify that "Config credentials" is set to "Disallow". On the Samsung Android device: 1. Open Settings >> Biometrics and security >> Other security settings >> View security certificates. 2. In the System tab, verify that no listed certificate in the Work profile can be untrusted. 3. In the User tab, verify that no listed certificate in the Work profile can be removed. If on the management tool the device "Config credentials" is not set to "Disallow", or on the Samsung Android device a certificate can be untrusted or removed, this is a finding.
Fix: F-55836r815502_fix
Configure the Samsung Android devices' Work profile to prevent users from removing DoD root and intermediate PKI certificates. On the management tool, in the Work profile restrictions, set "Config credentials" to "Disallow".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- KNOX-12-210260
- Vuln IDs
-
- V-252431
- Rule IDs
-
- SV-252431r815506_rule
Checks: C-55887r815504_chk
Review the configuration to determine if the Samsung Android devices are disabling unauthorized application repositories. This validation procedure is performed on both the management tool and the Samsung Android device. On the management tool, in the Work profile restrictions, verify that "installs from unknown sources globally" is set to "Disallow". On the Samsung Android device: 1. Open Settings >> Biometric and security >> Install unknown apps. 2. In the "Personal" tab, ensure that each app listed has the status "Disabled" under the app name or that no apps are listed. 3. In the "Work" tab, ensure that each app listed has the status "Disabled" under the app name or that no apps are listed. If on the management tool "installs from unknown sources globally" is not set to "Disallow", or on the Samsung Android device an app is listed with a status other than "Disabled", this is a finding.
Fix: F-55837r815505_fix
Configure the Samsung Android devices to disable unauthorized application repositories. On the management tool, in the Work profile restrictions, set "installs from unknown sources globally" to "Disallow". NOTE: Google Play must not be disabled. Disabling Google Play will cause system instability and critical updates will not be received.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- KNOX-12-210270
- Vuln IDs
-
- V-252432
- Rule IDs
-
- SV-252432r815509_rule
Checks: C-55888r815507_chk
Review the configuration to determine if the Samsung Android devices are enabling Common Criteria (CC) mode. This validation procedure is performed on both the management tool and the Samsung Android device. On the management tool, in the Work profile restrictions, verify that "Common Criteria mode" is set to "Enable". On the Samsung Android device, put the device into "Download mode" and verify that the text "Blocked by CC Mode" is displayed on the screen. If on the management tool "Common Criteria mode" is not set to "Enable", or on the Samsung Android device the text "Blocked by CC Mode" is not displayed in "Download mode", this is a finding.
Fix: F-55838r815508_fix
Configure the Samsung Android devices to enable Common Criteria (CC) mode. On the management tool, in the Work profile restrictions, set "Common Criteria mode" to "Enable".
- RMF Control
- IA-5
- Severity
- L
- CCI
- CCI-000185
- Version
- KNOX-12-210280
- Vuln IDs
-
- V-252433
- Rule IDs
-
- SV-252433r815512_rule
Checks: C-55889r815510_chk
Verify requirement KNOX-12-210270 (CC Mode) has been implemented. If "CC Mode" has not been implemented, this is a finding.
Fix: F-55839r815511_fix
Implement CC Mode (see requirement KNOX-12-210270).
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- KNOX-12-210290
- Vuln IDs
-
- V-252434
- Rule IDs
-
- SV-252434r815515_rule
Checks: C-55890r815513_chk
Review a sample of site User Agreements of Samsung device users or similar training records and training course content. Verify that Samsung device users have completed required training. The intent is that required training is renewed on a periodic basis in a time period determined by the AO. If any Samsung device user has not completed required training, this is a finding.
Fix: F-55840r815514_fix
Have all Samsung device users’ complete training on the following topics. Users should acknowledge they have reviewed training via a signed User Agreement or similar written record. Training topics: - Operational security concerns introduced by unmanaged applications/unmanaged personal space including applications using global positioning system (GPS) tracking. - Need to ensure no DoD data is saved to the personal space or transmitted from a personal app (for example, from personal email). - If the Purebred key management app is used, users are responsible for maintaining positive control of their credentialed device at all times. The DoD PKI certificate policy requires subscribers to maintain positive control of the devices that contain private keys and to report any loss of control so the credentials can be revoked. Upon device retirement, turn-in, or reassignment, ensure a factory data reset is performed prior to device hand-off. Follow Mobility service provider decommissioning procedures as applicable. - How to configure the following UBE controls (users must configure the control) on the Samsung device: 1. Secure use of Calendar Alarm. 2. Local screen mirroring and MirrorLink procedures (authorized/not authorized for use). 3. Do not connect Samsung devices (via either DeX Station or dongle) to any DoD network via Ethernet connection. 4. Do not upload DoD contacts via smart call and caller ID services. 5. Disable Wi-Fi Sharing. 6. Do not configure a DoD network (work) VPN profile on any third-party VPN client installed in the personal space. - AO guidance on acceptable use and restrictions, if any, on downloading and installing personal apps and data (music, photos, etc.) in the Samsung device personal space.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- KNOX-12-210300
- Vuln IDs
-
- V-252435
- Rule IDs
-
- SV-252435r815518_rule
Checks: C-55891r816531_chk
Review the configuration to confirm if the Samsung Android devices have the most recently released version of Samsung Android is installed. This procedure is performed on both the management tool and the Samsung Android device. In the management tool management console, review the version of Samsung Android installed on a sample of managed devices. This procedure will vary depending on the management tool product. See the notes below to determine the latest available OS version. On the Samsung Android device, to see the installed OS version: 1. Open Settings. 2. Tap "About phone". 3. Tap "Software information". If the installed version of Android OS on any reviewed Samsung devices is not the latest released by the wireless carrier, this is a finding. NOTE: Some wireless carriers list the version of the latest Android OS release by mobile device model online: ATT: https://www.att.com/devicehowto/dsm.html#!/popular/make/Samsung T-Mobile: https://support.t-mobile.com/docs/DOC-34510 Verizon Wireless: https://www.verizonwireless.com/support/software-updates/ Google Android OS patch website: https://source.android.com/security/bulletin/ Samsung Android OS patch website: https://security.samsungmobile.com/securityUpdate.smsb
Fix: F-55841r815517_fix
Install the latest released version of Samsung Android OS on all managed Samsung devices. Note: In most cases, OS updates are released by the wireless carrier (for example, Sprint, T-Mobile, Verizon Wireless, and ATT).