From Samsung Android OS 7 with Knox 2.x Security Technical Implementation Guide
Part of PP-MDF-301100
Associated with: CCI-000366 CCI-001806
Requiring all authorized applications to be in an application whitelist prevents the execution of any applications (e.g., unauthorized, malicious) that are not part of the whitelist. Failure to configure an application whitelist properly could allow unauthorized and malicious applications to be downloaded, installed, and executed on the mobile device, causing a compromise of DoD data accessible by these applications. Applications with the listed characteristics have features that can cause the compromise of sensitive DoD data or have features with no known application in the DoD environment.
This requirement is Not Applicable if the AO has approved unmanaged personal space/container (COPE use case). The site must have an AO signed document showing the AO has assumed the risk for using an unmanaged personal container. Review Samsung Android 7 with Knox configuration settings to determine if the mobile device has an application disable list configured to include applications with the following characteristics: - Voice dialing application if available when MD is locked. This validation procedure is performed only on the MDM Administration Console. On the MDM console, do the following: 1. Ask the MDM administrator to display the "Application disable list" setting in the "Android Application" rule. 2. Verify the list contains all applications which allow voice dialing when MD is locked. If the MDM console "Application disable list" is not properly configured or on the Samsung Android 7 with Knox device, the user is able to launch the applications on the list, this is a finding.
Configure the Samsung Android 7 with Knox application disable list to include applications with the following characteristics: - Voice dialing application if available when MD is locked. On the MDM console, add all applications which provide voice dialing when MD is locked to the "Application disable list" setting in the "Android Applications" rule. Note: Refer to the Supplemental document for additional information.
Lavender hyperlinks in small type off to the right (of CSS
class id
, if you view the page source) point to
globally unique URIs for each document and item. Copy the
link location and paste anywhere you need to talk
unambiguously about these things.
You can obtain data about documents and items in other
formats. Simply provide an HTTP header Accept:
text/turtle
or
Accept: application/rdf+xml
.
Powered by sagemincer