Free DISA STIG and SRG Library | Vaulted

V-228597

Google Android 11 must allow only the administrator (EMM) to install/remove DoD root and intermediate PKI certificates.

Finding ID
GOOG-11-009100
Rule ID
SV-228597r510289_rule
Severity
Cat II
CCE
(None)
Group Title
PP-MDF-992000
CCI
CCI-000370
Target Key
(None)
Documentable
No
Discussion

DoD root and intermediate PKI certificates are used to verify the authenticity of PKI certificates of users and web services. If the user is allowed to remove root and intermediate certificates, the user could allow an adversary to falsely sign a certificate in such a way that it could not be detected. Restricting the ability to remove DoD root and intermediate PKI certificates to the Administrator mitigates this risk. SFR ID: FMT_MOF_EXT.1.2 #47

Fix Text

Configure Google Android 11 device to prevent a user from removing DoD root and intermediate PKI certificates. On the EMM console: 1. Open "Set user restrictions". 2. Toggle "Disallow config credentials" to On.

Check Content

Review the device configuration to confirm that the user is unable to remove DoD root and intermediate PKI certificates. On the EMM console: 1. Open "Set user restrictions". 2. Verify that "Disallow config credentials" is toggled to On. On the Google Android 11 device, do the following: 1. Open Settings. 2. Tap "Security". 3. Tap "Advanced". 4. Tap "Encryption & credentials". 5. Tap "Trusted credentials". 6. Verify that the user is unable to untrust or remove any work certificates. If on the Google Android 11 device the user is able to remove certificates, this is a finding.