Free DISA STIG and SRG Library | Vaulted

V-98971

Google Android 10 work profile must be configured to enforce the system application disable list.

Finding ID
GOOG-10-009400
Rule ID
SV-108075r1_rule
Severity
Cat II
CCE
(None)
Group Title
PP-MDF-991000
CCI
CCI-000366
Target Key
(None)
Documentable
No
Discussion

The system application disable list controls user access to/execution of all core and preinstalled applications. Core application: Any application integrated into Google Android 10 by Google. Preinstalled application: Additional noncore applications included in the Google Android 10 build by Google or the wireless carrier. Some system applications can compromise DoD data or upload users' information to non-DoD-approved servers. A user must be blocked from using such applications that exhibit behavior that can result in compromise of DoD data or DoD user information. The site administrator must analyze all preinstalled applications on the device and disable all applications not approved for DoD use by configuring the system application disable list. SFR ID: FMT_SMF_EXT.1.1 #47

Fix Text

Configure Google Android 10 Work Profile to enforce the system application disable list. The required configuration is the default configuration when the device is enrolled. If the device configuration is changed, use the following procedure to bring the device back into compliance: On the MDM, configure a list of approved Google core and preinstalled apps in the core app white list.

Check Content

Review the Google Android 10 Work Profile configuration settings to confirm the system application disable list is enforced. This setting is enforced by default. What needs to happen is to verify only approved system apps have been placed on the core whitelist. This procedure is performed on the MDM Administrator console. Review the system app white list and verify only approved apps are on the list. If on the MDM console the system app white list contains unapproved core apps, this is a finding.