The Samsung Android 8 with Knox whitelist must be configured to not include applications with the following characteristics: Back up mobile device (MD) data to non-DoD cloud servers (including user and application access to cloud backup services).

From Samsung Android OS 8 with Knox 3.x COBO Use Case Security Technical Implementation Guide

Part of PP-MDF-301100

Associated with: CCI-000366 CCI-001806

SV-94875r1_rule The Samsung Android 8 with Knox whitelist must be configured to not include applications with the following characteristics: Back up mobile device (MD) data to non-DoD cloud servers (including user and application access to cloud backup services).

Vulnerability discussion

Requiring all authorized applications to be in an application whitelist prevents the execution of any applications (e.g., unauthorized, malicious) that are not part of the whitelist. Failure to configure an application whitelist properly could allow unauthorized and malicious applications to be downloaded, installed, and executed on the MD, causing a compromise of DoD data accessible by these applications. Applications with the listed characteristics have features that can cause the compromise of sensitive DoD data or have features with no known application in the DoD environment.Application note: The application whitelist, in addition to controlling the installation of applications on the MD, must control user access/execution of all core and pre-installed applications, or the MD must provide an alternate method of restricting user access/execution to core and pre-installed applications.Core application: Any application integrated into the operating system (OS) by the OS or MD vendors.Pre-installed application: Additional non-core applications included in the OS build by the OS vendor, MD vendor, or wireless carrier.SFR ID: FMT_SMF_EXT.1.1 #8b

Check content

Review Samsung Android 8 with Knox configuration settings to determine if the mobile device has an application disable list configured to include applications with the following characteristics: - back up MD data to non-DoD cloud servers (including user and application access to cloud backup services). This validation procedure is performed on both the MDM Administration Console and the Samsung Android 8 with Knox device. On the MDM console, do the following: 1. Ask the MDM Administrator to display the "Application disable list" setting in the "Android Application" rule. 2. Verify the "Application disable list" contains all pre-installed applications that back up MD data to non-DoD cloud servers. If the MDM console "Application disable list" is not properly configured or on the Samsung Android 8 with Knox device, the user is able to launch the applications on the list, this is a finding. Note: The following applications are known to be pre-installed public cloud applications, but other applications can be found on other devices: Google Drive, Dropbox, Verizon Cloud, AT&T Locker, Microsoft OneDrive, and Microsoft OneNote. Note: The following application allows a user to configure a Samsung account on the device, which allows the user to back up files (including S Health data) to Samsung servers and download applications from the Samsung Apps (Galaxy Apps) store: Samsung Account application. Note: Refer to the Supplemental document for additional information.

Fix text

Configure the Samsung Android 8 with Knox application disable list to include applications with the following characteristics: - back up MD data to non-DoD cloud servers (including user and application access to cloud backup services). On the MDM console, add all applications that back up MD data to non-DoD cloud servers (including user and application access to cloud backup services) to the "Application disable list" setting in the "Android Applications" rule. Note: Refer to the Supplemental document for additional information. Note: Include Samsung accounts on the list.

Pro Tips

Lavender hyperlinks in small type off to the right (of CSS class id, if you view the page source) point to globally unique URIs for each document and item. Copy the link location and paste anywhere you need to talk unambiguously about these things.

You can obtain data about documents and items in other formats. Simply provide an HTTP header Accept: text/turtle or Accept: application/rdf+xml.

Powered by sagemincer