Free DISA STIG and SRG Library | Vaulted

V-98931

Google Android 10 must be configured to enforce an application installation policy by specifying one or more authorized application repositories, including [selection: DoD-approved commercial app repository, MDM server, mobile application store].

Finding ID
GOOG-10-000800
Rule ID
SV-108035r1_rule
Severity
Cat II
CCE
(None)
Group Title
PP-MDF-301080
CCI
CCI-001806
Target Key
(None)
Documentable
No
Discussion

Forcing all applications to be installed from authorized application repositories can prevent unauthorized and malicious applications from being installed and executed on mobile devices. Allowing such installations and executions could cause a compromise of DoD data accessible by these unauthorized/malicious applications. SFR ID: FMT_SMF_EXT.1.1 #8a

Fix Text

Configure the Google Android device to disable unauthorized application repositories. On the MDM Console: 1. Open Restrictions section. 2 Toggle "Disallow installs from unknown sources globally" to on.

Check Content

Review Google Android device configuration settings to determine if the mobile device has only approved application repositories (DoD-approved commercial app repository, MDM server, and/or mobile application store). This validation procedure is performed on both the MDM Administration Console and the Android 10 device. On the MDM console, do the following: 1. Open Restrictions Section. 2 Toggle "Disallow installs from unknown sources globally" to on. On the Google device, do the following: 1. Open Settings >> Apps and notifications >> Advanced >> Special app access. 2. Open Install unknown apps. 3. Ensure the list of apps is blank or if an app is on the list, "Disabled by admin" is listed under the app name. If the MDM console device policy is not set to allow connections to only approved application repositories or on the Android 10 device, the device policy is not set to allow connections to only approved application repositories, this is a finding.