{"stig":{"title":"Google Android 15 COBO Security Technical Implementation Guide","version":"1","release":"4"},"checks":[{"vulnId":"V-267430","ruleId":"SV-267430r1031475_rule","severity":"medium","ruleTitle":"Google Android 15 must be configured to enable audit logging.","description":"Audit logs enable monitoring of security-relevant events and subsequent forensics when breaches occur. To be useful, administrators must have the ability to view the audit logs.\n\nSFRID: FMT_SMF.1.1 #32","checkContent":"Inspect the configuration on the managed Google Android 15 device to enable audit logging.\n\nThis validation procedure is performed only on the EMM Administration Console.\n\nOn the EMM console:\n\nCOBO and COPE:\n\n1. Open \"Device owner management\" section.\n2. Verify that \"Enable security logging\" is toggled to \"ON\".\n\nIf the EMM console device policy is not set to enable audit logging, this is a finding.","fixText":"Configure the Google Android 15 device to enable audit logging.\n\nOn the EMM console:\n\nCOBO and COPE:\n\n1. Open \"Device owner management\" section.\n2. Toggle \"Enable security logging\" to \"ON\".","ccis":["CCI-000154"]},{"vulnId":"V-267431","ruleId":"SV-267431r1031478_rule","severity":"medium","ruleTitle":"Google Android 15 must be configured to enforce a minimum password length of six characters.","description":"Password strength is a measure of the effectiveness of a password in resisting guessing and brute force attacks. The ability to crack a password is a function of how many attempts an adversary is permitted, how quickly an adversary can do each attempt, and the size of the password space. The longer the minimum length of the password, the larger the password space. Having a too-short minimum password length significantly reduces password strength, increasing the chance of password compromise and resulting in device and data compromise.\n\nSFRID: FMT_SMF.1.1 #1","checkContent":"Review managed Google Android 15 device configuration settings to determine if the mobile device is enforcing a minimum password length of six characters.\n\nThis validation procedure is performed on both the EMM Administration Console and the managed Google Android 15 device.\n\nOn the EMM console:\n\nCOBO:\n\n1. Open \"Lock screen\" settings.\n2. Open \"Password constraints\".\n3. Open \"Minimum password quality\".\n4. Verify Numeric Complex, Alphabetic, Alphanumeric, or Complex is selected.\n5. Open \"Minimum password length\".\n6. Verify \"6\" is set for number of characters.\n\nCOPE:\n\n1. Open \"Lock screen\" settings.\n2. Open \"Password constraints\".\n3. Select \"Personal Profile\".\n4. Verify \"Minimum password quality\" is set to Numeric Complex, Alphabetic, Alphanumeric, or Complex.\n5. Open \"Minimum password length\".\n6. Verify the number of characters is set to \"6\" or higher.\n_____________________________\n\nOn the managed Google Android 15 device:\n\nCOBO and COPE:\n\n1. Open Settings >> Security & privacy >> Device unlock >> Screen lock.\n2. Enter current password.\n3. Tap \"Pin or Password\".\n4. Verify Password length required is at least \"6\".\n\nIf the device password length is not set to six characters or more on EMM console or on the managed Google Android 15 device, this is a finding.","fixText":"Configure the Google Android 15 device to enforce a minimum password length of six characters.\n\nOn the EMM console:\n\nCOBO:\n\n1. Open \"Lock screen\" settings.\n2. Open \"Password constraints\".\n3. Open \"Minimum password quality\".\n4. Choose Numeric Complex, Alphabetic, Alphanumeric, or Complex.\n5. Open \"Minimum password length\".\n6. Enter in the number of characters as \"6\".\n\nCOPE:\n\n1. Open \"Lock screen\" settings.\n2. Open \"Password constraints\".\n3. Select \"Personal Profile\".\n4. Open \"Minimum password quality\".\n5. Choose Numeric Complex, Alphabetic, Alphanumeric, or Complex.\n6. Open \"Minimum password length\".\n7. Enter in the number of characters as \"6\".","ccis":["CCI-004066"]},{"vulnId":"V-267432","ruleId":"SV-267432r1031481_rule","severity":"medium","ruleTitle":"Google Android 15 must be configured to not allow passwords that include more than four repeating or sequential characters.","description":"Password strength is a measure of the effectiveness of a password in resisting guessing and brute force attacks. Passwords that contain repeating or sequential characters are significantly easier to guess than those that do not contain repeating or sequential characters. Therefore, disallowing repeating or sequential characters increases password strength and decreases risk.\n\nSFRID: FMT_SMF.1.1 #1","checkContent":"Review managed Google Android 15 device configuration settings to determine if the mobile device is prohibiting passwords with more than four repeating or sequential characters.\n\nThis validation procedure is performed on both the EMM Administration Console and the managed Google Android 15 device.\n\nOn the EMM console:\n\nCOBO:\n\n1. Open \"Lock screen\" settings.\n2. Open \"Password constraints\".\n3. Verify that quality is set to \"Numeric (Complex)\" or higher.\n\nCOPE:\n\n1. Open \"Lock screen\" settings.\n2. Open \"Password constraints\".\n3. Select \"Personal Profile\".\n4. Verify that quality is set to \"Numeric (Complex)\" or higher.\n____________________________\n\nOn the managed Google Android 15 device:\n\nCOBO and COPE:\n\n1. Open Settings >> Security >> Screen lock.\n2. Enter current password.\n3. Select \"PIN\".\n4. Try to enter a new PIN with repeating numbers.\n5. Verify Password complexity requirements are listed: Ascending, descending, or repeated sequence of digits is not allowed.\n\nIf the EMM console device policy is set to a password with more than two repeating or sequential characters or on the managed Google Android 15 device, the device policy is set to a password with more than two repeating or sequential characters, this is a finding.\n\nNote: Alphabetic, Alphanumeric, and Complex are also acceptable selections, but these selections will cause the user to select a complex password, which is not required by the STIG.","fixText":"Configure the Google Android 15 device to prevent passwords from containing more than four repeating or sequential characters.\n\nOn the EMM console:\n\nCOBO:\n\n1. Open \"Lock screen\" settings.\n2. Open \"Password constraints\".\n3. Set password quality to \"Numeric (Complex)\".\n\nCOPE:\n\n1. Open \"Password constraints\".\n2. Select \"Personal Profile\".\n3. Set password quality to \"Numeric (Complex)\".\n\nNote: Alphabetic, Alphanumeric, and Complex are also acceptable selections, but these selections will cause the user to select a complex password, which is not required by the STIG.","ccis":["CCI-004066"]},{"vulnId":"V-267433","ruleId":"SV-267433r1031484_rule","severity":"medium","ruleTitle":"Google Android 15 must be configured to lock the display after 15 minutes (or less) of inactivity.","description":"The screen lock timeout must be set to a value that helps protect the device from unauthorized access. Having a too-long timeout would increase the window of opportunity for adversaries who gain physical access to the mobile device through loss, theft, etc. Such devices are much more likely to be in an unlocked state when acquired by an adversary, thus granting immediate access to the data on the mobile device. The maximum timeout period of 15 minutes has been selected to balance functionality and security; shorter timeout periods may be appropriate depending on the risks posed to the mobile device.\n\nSFRID: FMT_SMF.1.1 #2","checkContent":"Review managed Google Android device configuration settings to determine if the mobile device is enforcing a screen-lock policy that will lock the display after a period of 15 minutes or less of inactivity.\n\nNote: Google Android 15 Settings User Interface (UI) does not support the 15-minute increment, but this value can be set by the MDM.\n\nThis validation procedure is performed on both the EMM Administration Console and the Android 15 device.\n\nOn the EMM console:\n\nCOBO:\n\n1. Open \"Lock screen restrictions\".\n2. Verify that \"Max time to screen lock\" is set to \"900\".\nNote: The units are in seconds.\n\nCOPE:\n\n1. Open \"Lock screen restrictions\".\n2. Select \"Personal Profile\".\n3. Verify that \"Max time to screen lock\" is set to \"900\".\nNote: The units are in seconds.\n\nIf the EMM console device policy is not set to enable a screen-lock policy that will lock the display after a period of inactivity of 900 seconds, this is a finding.","fixText":"Configure the Google Android 15 device to enable a screen-lock policy of 15 minutes for the max period of inactivity.\n\nNote: Google Android 15 Settings User Interface (UI) does not support the 15-minute increment, but this value can be set by the MDM. \n\nOn the EMM console:\n\nCOBO:\n\n1. Open \"Lock screen restrictions\".\n2. Set \"Max time to screen lock\" to \"900\".\nNote: The units are in seconds.\n\nCOPE:\n\n1. Open \"Lock screen restrictions\".\n2. Select \"Personal Profile\".\n3. Set \"Max time to screen lock\" to 900\".\nNote: The units are in seconds.","ccis":["CCI-000057"]},{"vulnId":"V-267434","ruleId":"SV-267434r1033027_rule","severity":"medium","ruleTitle":"Google Android 15 must be configured to not allow more than 10 consecutive failed authentication attempts.","description":"The more attempts an adversary has to guess a password, the more likely the adversary will enter the correct password and gain access to resources on the device. Setting a limit on the number of attempts mitigates this risk. Setting the limit at 10 or less gives authorized users the ability to make a few mistakes when entering the password but still provides adequate protection against dictionary or brute force attacks on the password.\n\nSFRID: FMT_SMF.1.1 #2, FIA_AFL_EXT.1.5","checkContent":"Review managed Google Android 15 device configuration settings to determine if the mobile device has the maximum number of consecutive failed authentication attempts set at 10 or fewer. \n\nThis validation procedure is performed on both the EMM Administration Console and the managed Google Android 15 device. \n\nOn the EMM console:\n\nCOBO:\n\n1. Open \"Lock screen\" settings.\n2. Open \"Lock screen restrictions\".\n3. Verify that \"Max password failures for local wipe\" is set to a number between 1 and 10.\n\nCOPE:\n\n1. Open \"Lock screen\" settings.\n2. Open \"Lock screen restrictions\".\n3. Select \"Personal Profile\".\n4. Verify that \"Max password failures for local wipe\" is set to a number between 1 and 10.\n\nOn the managed Google Android 15 device:\n\nCOBO and COPE:\n\n1. Lock the device screen.\n2. Attempt to unlock the screen and validate that the device autowipes after specified number of invalid entries. Note: Perform this verification only with a test phone set up with a production profile.\n\nIf the EMM console device policy is not set to the maximum number of consecutive failed authentication attempts at 10 or fewer, or if on the managed Google Android 15 device the device policy is not set to the maximum number of consecutive failed authentication attempts at 10 or fewer, this is a finding.","fixText":"Configure the Google Android 15 device to allow only 10 or fewer consecutive failed authentication attempts.\n\nOn the EMM console:\n\nCOBO:\n\n1. Open \"Lock screen\" settings.\n2. Open \"Lock screen restrictions\".\n3. Set \"Max password failures for local wipe\" to a number between 1 and 10.\n\nCOPE:\n\n1. Open \"Lock screen\" settings.\n2. Open \"Lock screen restrictions\".\n3. Select \"Personal Profile\".\n4. Set \"Max password failures for local wipe\" to a number between 1 and 10.","ccis":["CCI-000044"]},{"vulnId":"V-267435","ruleId":"SV-267435r1031490_rule","severity":"medium","ruleTitle":"Google Android 15 must be configured to enforce an application installation policy by specifying one or more authorized application repositories, including [selection: DOD-approved commercial app repository, MDM server, mobile application store].","description":"Forcing all applications to be installed from authorized application repositories can prevent unauthorized and malicious applications from being installed and executed on mobile devices. Allowing such installations and executions could cause a compromise of DOD data accessible by these unauthorized/malicious applications.\n\nSFRID: FMT_SMF.1.1 #8","checkContent":"Review managed Google Android 15 device configuration settings to determine if the mobile device has only approved application repositories (DOD-approved commercial app repository, EMM server, and/or mobile application store).\n\nThis validation procedure is performed on both the EMM Administration Console and the managed Google Android 15 device. \n\nOn the EMM console:\n\nCOBO and COPE:\n\n1. Open \"Set user restrictions\".\n2. Verify that \"Disallow install unknown sources\" is toggled to \"ON\".\n3. Verify that \"Disallow installs from unknown sources globally\" is toggled to \"ON\".\n\nOn the Google Android 15 device:\n\nCOBO and COPE:\n\n1. Open Settings >> Apps >> Special app access.\n2. Open Install unknown apps.\n3. Ensure the list of apps is blank or if an app is on the list, \"Disabled by admin\" is listed under the app name.\n\nIf the EMM console device policy is not set to allow connections to only approved application repositories or on the managed Google Android 15 device, the device policy is not set to allow connections to only approved application repositories, this is a finding.","fixText":"Configure the Google Android 15 device to disable unauthorized application repositories.\n\nOn the EMM console:\n\nCOBO and COPE:\n\n1. Open \"Set user restrictions\".\n2. Toggle \"Disallow install unknown sources\" to \"ON\".\n3. Toggle \"Disallow installs from unknown sources globally\" to \"ON\".","ccis":["CCI-000366"]},{"vulnId":"V-267436","ruleId":"SV-267436r1033112_rule","severity":"medium","ruleTitle":"Google Android 15 must be configured to enforce an application installation policy by specifying an application allow list that restricts applications by the following characteristics: [selection: list of digital signatures, cryptographic hash values, names, application version].","description":"The application allow list, in addition to controlling the installation of applications on the MD, must control user access/execution of all core and preinstalled applications, or the MD must provide an alternate method of restricting user access/execution to core and preinstalled applications. \n\nCore application: Any application integrated into the OS by the OS or MD vendors.\n\nPreinstalled application: Additional noncore applications included in the OS build by the OS vendor, MD vendor, or wireless carrier.\n\nRequiring all authorized applications to be in an application allow list prevents the execution of any applications (e.g., unauthorized, malicious) that are not part of the allow list. Failure to configure an application allow list properly could allow unauthorized and malicious applications to be downloaded, installed, and executed on the mobile device, causing a compromise of DOD data accessible by these applications.\n\nThe application allow list, in addition to controlling the installation of applications on the MD, must control user access/execution of all core applications (included in the OS by the OS vendor) and preinstalled applications (provided by the MD vendor and wireless carrier), or the MD must provide an alternate method of restricting user access/execution to core and preinstalled applications.\n\nSFRID: FMT_SMF.1.1 #8","checkContent":"Review managed Google Android 15 device configuration settings to determine if the mobile device has an application allow list configured. Verify all applications on the allow list have been approved by the authorizing official (AO).\n\nOn the EMM console:\n\nCOBO and COPE:\n\n1. Go to the Android app catalog for managed Google Play.\n2. Verify all selected apps are AO approved.\n\nOn the managed Google Android 15 device:\n\nCOBO and COPE:\n\n1. Open the managed Google Play Store.\n2. Verify that only the approved apps are visible.\n\nNote: Managed Google Play is an allowed App Store.\n\nIf the EMM console list of selected managed Google Play apps includes nonapproved apps, this is a finding.\n\nNote: The application allow list will include approved core applications (included in the OS by the OS vendor) and preinstalled applications (provided by the MD vendor and wireless carrier), or the MD must provide an alternate method of restricting user access/execution to core and preinstalled applications. For Google Android, there are no preinstalled applications.","fixText":"Configure the Google Android 15 device to use an application allow list.\n\nOn the EMM console:\n\nCOBO and COPE:\n\n1. Go to the Android app catalog for managed Google Play.\n2. Select apps to be available (only approved apps).\n3. Push updated policy to the device.\n\nNote: Managed Google Play is an allowed App Store.","ccis":["CCI-001764"]},{"vulnId":"V-267437","ruleId":"SV-267437r1134411_rule","severity":"medium","ruleTitle":"Google Android 15 allowlist must be configured to not include applications with the following characteristics: \n- Backs up mobile device (MD) data to non-DOD cloud servers (including user and application access to cloud backup services);\n- Transmits MD diagnostic data to non-DOD servers;\n- Voice assistant application if available when MD is locked;\n- Voice dialing application if available when MD is locked;\n- Allows synchronization of data or applications between devices associated with user;\n- Payment processing;\n- Allows unencrypted (or encrypted but not FIPS 140-2/140-3 validated) data sharing with other MDs or printers;\n- Backs up own data to a remote system;\n- Renders TV shows and movies.","description":"Requiring all authorized applications to be in an application allowlist prevents the execution of any applications (e.g., unauthorized, malicious) that are not part of the allowlist. Failure to configure an application allowlist properly could allow unauthorized and malicious applications to be downloaded, installed, and executed on the mobile device, causing a compromise of DOD data accessible by these applications. Applications with the listed characteristics have features that can cause the compromise of sensitive DOD data or have features with no known application in the DOD environment.\n\nApplication note: The application allowlist, in addition to controlling the installation of applications on the MD, must control user access/execution of all core and preinstalled applications, or the MD must provide an alternate method of restricting user access/execution to core and preinstalled applications.\n\nCore application: Any application integrated into the OS by the OS or MD vendors.\n\nPreinstalled application: Additional noncore applications included in the OS build by the OS vendor, MD vendor, or wireless carrier.\n\nSFR ID: FMT_SMF_EXT.1.1 #8b","checkContent":"Review managed Google Android 15 device configuration settings to determine if the mobile device has an application allowlist configured and that the application allowlist does not include applications with the following characteristics:\n- Backs up MD data to non-DOD cloud servers (including user and application access to cloud backup services);\n- Transmits MD diagnostic data to non-DOD servers;\n- Voice assistant application (if available) when MD is locked;\n- Voice dialing application (if available) when MD is locked;\n- Allows synchronization of data or applications between devices associated with user;\n- Payment processing; \n- Allows unencrypted (or encrypted but not FIPS 140-2/140-3 validated) data sharing with other MDs, display screens (screen mirroring), or printers; \n- Backs up own data to a remote system.\n- Renders TV shows and movies.\n\nThis validation procedure is performed only on the EMM Administration Console.\n\nOn the EMM console:\n\n1. Review the list of selected Managed Google Play apps.\n2. Review the details and privacy policy of each selected app to verify that the app does not include prohibited characteristics.\n\nIf the EMM console device policy includes applications with unauthorized characteristics, this is a finding.","fixText":"Configure the Google Android 15 device application allowlist to exclude applications with the following characteristics:\n- Backs up MD data to non-DOD cloud servers (including user and application access to cloud backup services);\n- Transmits MD diagnostic data to non-DOD servers;\n- Voice assistant application (if available) when MD is locked;\n- Voice dialing application (if available) when MD is locked;\n- Allows synchronization of data or applications between devices associated with user;\n- Payment processing; \n- Allows unencrypted (or encrypted but not FIPS 140-2/140-3 validated) data sharing with other MDs, display screens (screen mirroring), or printers;\n- Backs up own data to a remote system;\n- Renders TV shows and movies.\n\nOn the EMM console:\n\n1. Go to the Android app catalog for managed Google Play.\n2. Before selecting an app, review the app details and privacy policy to ensure the app does not include prohibited characteristics.\n\nManaged Google Play is always an allowlisted App Store.","ccis":["CCI-000366","CCI-000803"]},{"vulnId":"V-267438","ruleId":"SV-267438r1042520_rule","severity":"medium","ruleTitle":"Google Android 15 allow list must be configured to not include artificial intelligence (AI) applications that process device data in the cloud, including Google Gemini.","description":"Sensitive DOD data could be exposed when an AI app processes device data in the cloud.\n\nSFRID: FMT_SMF.1.1 #8","checkContent":"Review managed Google Android 15 device configuration settings to determine if the mobile device has an AI application that processes device data in the cloud, including Google Gemini.\n\nThis validation procedure is performed only on the EMM Administration Console.\n\nOn the EMM console:\n\n1. Review the list of selected Managed Google Play apps.\n2. Verify no AI applications that process device data in the cloud, including Google Gemini, are included.\n\nIf the EMM console device policy includes AI applications that process device data in the cloud, including Google Gemini, this is a finding.\n\nNote: This restriction does not include Gemini Nano. Gemini Nano is a built-in capability of Android 15 and processes device data on the device. Refer to Section 2, Artificial Intelligence Restrictions, of the STIG Supplemental document for more information.","fixText":"Configure the Google Android 15 device application allow list to exclude AI applications that process device data in the cloud, including Google Gemini.\n\nNote: This restriction does not include Gemini Nano. Gemini Nano is a built-in capability of Android 15 and processes device data on the device. See Section 2 \"Artificial Intelligence Restrictions\" of the STIG Supplemental document for more information.","ccis":["CCI-000803"]},{"vulnId":"V-267439","ruleId":"SV-267439r1031502_rule","severity":"medium","ruleTitle":"Google Android 15 must be configured to not display the following (work profile) notifications when the device is locked: [selection:\na. email notifications \nb. calendar appointments \nc. contact associated with phone call notification \nd. text message notification\ne. other application-based notifications\nf. all notifications].","description":"Many mobile devices display notifications on the lock screen so that users can obtain relevant information in a timely manner without having to frequently unlock the phone to determine if there are new notifications. However, in many cases, these notifications can contain sensitive information. When they are available on the lock screen, an adversary can see them merely by being in close physical proximity to the device. Configuring the mobile operating system (MOS) to not send notifications to the lock screen mitigates this risk.\n\nSFRID: FMT_SMF.1.1 #18","checkContent":"Review managed Google Android 15 device settings to determine if the Google Android 15 device displays (work profile) notifications on the lock screen. Notifications of incoming phone calls are acceptable even when the device is locked.\n\nThis validation procedure is performed on both the EMM Administration Console and the managed Google Android 15 device.\n\nOn the EMM console:\n\nCOBO:\n\n1. Open \"Lock screen\" settings.\n2. Open \"Lock screen restrictions\".\n3. Verify that \"Disable unredacted notifications\" is toggled to \"ON\".\n\nCOPE:\n\n1. Open \"Lock screen\" settings.\n2. Open \"Lock screen restrictions\".\n3. Select \"Work Profile\".\n4. Verify that \"Disable unredacted notifications\" is toggled to \"ON\".\n___________________________\n\nOn the managed Google Android 15 device:\n\nCOBO:\n\n1. Go to Settings >> Display >> Lock screen.\n2. Tap on \"Privacy\".\n3. Verify that \"Show sensitive content only when unlocked\" is selected.\n\nCOPE:\n\n1. Go to Settings >> Display >> Lock screen.\n2. Tap on \"When work profile is locked\".\n3. Verify that \"Hide sensitive work content\" is selected.\n\nIf the EMM console device policy allows work notifications on the lock screen, or the managed Google Android 15 device allows work notifications on the lock screen, this is a finding.","fixText":"Configure the Google Android 15 device to not display (work profile) notifications when the device is locked.\n\nOn the EMM console:\n\nCOBO:\n\n1. Open \"Lock screen\" settings.\n2. Open \"Lock screen restrictions\".\n3. Toggle \"Disable unredacted notifications\".\n\nCOPE:\n\n1. Open \"Lock screen\" settings.\n2. Open \"Lock screen restrictions\".\n3. Select \"Work Profile\".\n4. Toggle \"Disable unredacted notifications\".","ccis":["CCI-000060"]},{"vulnId":"V-267440","ruleId":"SV-267440r1031505_rule","severity":"medium","ruleTitle":"Google Android 15 must be configured to disable trust agents.","description":"Trust agents allow a user to unlock a mobile device without entering a passcode when the mobile device is, for example, connected to a user-selected Bluetooth device or in a user-selected location. This technology would allow unauthorized users to have access to DOD sensitive data if compromised. By not permitting the use of nonpassword authentication mechanisms, users are forced to use passcodes that meet DOD passcode requirements.\n\nSFRID: FMT_SMF.1.1 #22, FIA_UAU.5.1","checkContent":"Review device configuration settings to confirm that trust agents are disabled. \n \nThis procedure is performed on both the EMM Administration console and the managed Google Android 15 device. \n \nOn the EMM console:\n\nCOBO:\n\n1. Open \"Lock screen restrictions\".\n2. Verify that \"Disable trust agents\" is toggled to \"ON\".\n\nCOPE:\n\n1. Open \"Lock screen restrictions\".\n2. Select \"Personal Profile\".\n3. Verify that \"Disable trust agents\" is toggled to \"ON\".\n4. Select \"Work Profile\".\n5. Verify that \"Disable trust agents\" is toggled to \"ON\".\n____________________________\n\nOn the managed Google Android 15 device: \n\nCOBO and COPE:\n\n1. Open Settings.\n2. Tap \"Security & privacy\". \n3. Tap \"More security & privacy\". \n4. Tap \"Trust agents\". \n5. Verify that all listed trust agents are disabled and cannot be enabled.\n \nIf on the EMM console, \"disable trust agents\" is not selected, or on the managed Google Android 15 device a trust agent can be enabled, this is a finding.","fixText":"Configure the Google Android 15 device to disable trust agents. \n \nOn the EMM console:\n\nCOBO:\n\n1. Open \"Lock screen restrictions\".\n2. Toggle \"Disable trust agents\" to \"ON\".\n\nCOPE:\n\n1. Open \"Lock screen restrictions\".\n2. Select \"Personal Profile\".\n3. Toggle \"Disable trust agents\" to \"ON\".\n4. Select \"Work Profile\".\n5. Toggle \"Disable trust agents\" to \"ON\".","ccis":["CCI-000767"]},{"vulnId":"V-267441","ruleId":"SV-267441r1033036_rule","severity":"medium","ruleTitle":"Google Android 15 must be configured to disable developer modes.","description":"Developer modes expose features of the mobile operating system (MOS) that are not available during standard operation. An adversary may leverage a vulnerability inherent in a developer mode to compromise the confidentiality, integrity, and availability of DOD sensitive information. Disabling developer modes mitigates this risk.\n\nSFRID: FMT_SMF.1.1 #26","checkContent":"Review managed Google Android 15 device configuration settings to determine whether a developer mode is enabled.\n\nThis validation procedure is performed on both the EMM Administration Console and the managed Google Android 15 device. \n\nOn the EMM console:\n\nCOBO:\n\n1. Open \"Set user restrictions\".\n2. Verify that \"Disallow debugging features\" is toggled to \"ON\".\n\nCOPE:\n\n1. Open \"Set user restrictions\".\n2. Verify that \"Disallow debugging features\" is toggled to \"ON\".\n3. Open \"Set user restrictions on parent\".\n4. Verify that \"Disallow debugging features\" is toggled to \"ON\".\n\nOn the managed Google Android 15 device:\n\nCOBO and COPE:\n\n1. Go to Settings >> System.\n2. Ensure \"Developer Options\" is not listed.\n3. Go to Settings >> About Phone.\n4. Tap on the Build Number to try to enable Developer Options and validate that action is blocked.\n\nIf the EMM console device policy is not set to disable developer mode or on the managed Google Android 15 device, the device policy is not set to disable developer mode, this is a finding.","fixText":"Configure the Google Android 15 device to disable developer modes.\n\nOn the EMM console:\n\nCOBO:\n\n1. Open \"Set user restrictions\".\n2. Toggle \"Disallow debugging features\" to \"ON\".\n\nCOPE:\n\n1. Open \"Set user restrictions\".\n2. Toggle \"Disallow debugging features\" to \"ON\".\n3. Open \"Set user restrictions on parent\".\n4. Toggle \"Disallow debugging features\" to \"ON\".","ccis":["CCI-000381"]},{"vulnId":"V-267442","ruleId":"SV-267442r1031511_rule","severity":"low","ruleTitle":"Google Android 15 must be configured to display the DOD advisory warning message at startup or each time the user unlocks the device.","description":"Before granting access to the system, the mobile operating system is required to display the DOD-approved system use notification message or banner that provides privacy and security notices consistent with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance. Required banners help ensure that DOD can audit and monitor the activities of mobile device users without legal restriction.\n\nSystem use notification messages can be displayed when individuals first access or unlock the mobile device. The banner must be implemented as a \"click-through\" banner at device unlock (to the extent permitted by the operating system). A \"click-through\" banner prevents further activity on the information system unless and until the user executes a positive action to manifest agreement by clicking on a box indicating \"OK.\"\n\nThe approved DOD text must be used exactly as required in the Knowledge Service referenced in DODI 8500.01. For devices accommodating banners of 1300 characters, the banner text is: \n\nYou are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. \nBy using this IS (which includes any device attached to this IS), you consent to the following conditions: \n-The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations.\n-At any time, the USG may inspect and seize data stored on this IS.\n-Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose.\n-This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy.\n-Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details.\n\nFor devices with severe character limitations, the banner text is:\n\nI've read & consent to terms in IS user agreem't.\n\nThe administrator must configure the banner text exactly as written without any changes.\n\nSFRID: FMT_SMF.1.1 #36","checkContent":"The DOD warning banner can be displayed by either of the following methods (required text is found in the Vulnerability Discussion):\n\n1. By placing the DOD warning banner text in the user agreement signed by each managed Android 15 device user (preferred method).\n2. By configuring the warning banner text on the EMM console and installing the banner on each managed Android 15 mobile device.\n\nDetermine which method is used at the Google Android 15 device site and follow the appropriate validation procedure below.\n\nValidation Procedure for Method #1:\nReview the signed user agreements for several Google Android 15 device users and verify the agreement includes the required DOD warning banner text.\n\nValidation Procedure for Method #2:\nOn the EMM console:\n\nCOBO:\n\n1. Open \"Lock screen restrictions\".\n2. Select \"Lock screen message\".\n3. Verify the message.\n\nCOPE:\n\n1. Open \"Lock screen restrictions\".\n2. Select \"Personal Profile\".\n3. Select \"Lock screen message\".\n4. Verify the message.\n\nIf, for Method #1, the required warning banner text is not on all signed user agreements reviewed, or for Method #2, the EMM console device policy is not set to display a warning banner with the appropriate designated wording or on the managed Google Android 15 device, the device policy is not set to display a warning banner with the appropriate designated wording, this is a finding.","fixText":"Configure the DOD warning banner by either of the following methods (required text is found in the Vulnerability Discussion):\n\n1. By placing the DOD warning banner text in the user agreement signed by each Google Android 15 device user (preferred method).\n2. By configuring the warning banner text on the EMM console and installing the banner on each Google Android 15 mobile device.\n\nOn the EMM console:\n\nCOBO:\n\n1. Open \"Lock screen restrictions\".\n2. Select \"Lock screen message\".\n3. Enter the message.\n\nCOPE:\n\n1. Open \"Lock screen restrictions\".\n2. Select \"Personal Profile\".\n3. Select \"Lock screen message\".\n4. Enter the message.","ccis":["CCI-000048"]},{"vulnId":"V-267443","ruleId":"SV-267443r1031514_rule","severity":"medium","ruleTitle":"Google Android 15 must be configured to generate audit records for the following auditable events: Detected integrity violations.","description":"Audit logs enable monitoring of security-relevant events and subsequent forensics when breaches occur. They help identify attacks so that breaches can be prevented or limited in their scope. They facilitate analysis to improve performance and security. The Requirement Statement lists key events for which the system must generate an audit record.\n\nNote: This requirement applies only to integrity violation detections that can be logged by the audit logging component.\n\nSFRID: FMT_SMF.1.1 #37","checkContent":"Review managed Google Android 15 device configuration settings to determine if the mobile device is configured to generate audit records for the following auditable events: Detected integrity violations.\n\nThis validation procedure is performed only on the EMM Administration Console. \n\nOn the EMM console:\n\nCOBO and COPE:\n\n1. Open \"Device owner management\" section.\n2. Verify that \"Enable security logging\" is toggled to \"ON\".\n\nIf the EMM console device policy is not set to enable security logging, this is a finding.","fixText":"Configure the Google Android 15 device to generate audit records for the following auditable events: Detected integrity violations.\n\nOn the EMM console:\n\nCOBO and COPE:\n\n1. Open \"Device owner management\" section.\n2. Toggle \"Enable security logging\" to \"ON\".","ccis":["CCI-000169"]},{"vulnId":"V-267444","ruleId":"SV-267444r1031517_rule","severity":"medium","ruleTitle":"Google Android 15 must be configured to disable USB mass storage mode.","description":"USB mass storage mode enables the transfer of data and software from one device to another. This software can include malware. When USB mass storage is enabled on a mobile device, it becomes a potential vector for malware and unauthorized data exfiltration. Prohibiting USB mass storage mode mitigates this risk.\n\nSFRID: FMT_SMF.1.1 #39","checkContent":"Review managed Google Android 15 device configuration settings to determine if the mobile device has a USB mass storage mode and whether it has been disabled.\n\nThis validation procedure is performed on both the EMM Administration Console and the managed Google Android 15 device. \n\nOn the EMM console:\n\nCOBO:\n\n1. Open \"User restrictions\".\n2. Open \"Set user restrictions\".\n3. Verify that \"Disallow USB file transfer\" is toggled to \"ON\".\n\nCOPE:\n\n1. Open \"User restrictions\".\n2. Open \"Set user restrictions on parent\".\n3. Verify \"Disallow USB file transfer\" is toggled to \"ON\".\n______________________________\n\nOn the managed Google Android 15 device:\n\n1. Connect a USB cable to the managed Google Android 15 device and connect to a non-DOD network-managed PC.\n2. Go to Settings >> Connected devices >> USB.\n3. Verify \"No data transfer\" is selected.\n\nIf the EMM console device policy is not set to disable USB mass storage mode or on the managed Google Android 15 device, the device policy is not set to disable USB mass storage mode, this is a finding.","fixText":"Configure the Google Android 15 device to disable USB mass storage mode.\n\nOn the EMM console:\n\nCOBO:\n\n1. Open \"User restrictions\".\n2. Open \"Set user restrictions\".\n3. Toggle \"Disallow USB file transfer\" to \"ON\".\n\nCOPE:\n\n1. Open \"User restrictions\".\n2. Open \"Set user restrictions on parent\".\n3. Toggle \"Disallow USB file transfer\" to \"ON\".","ccis":["CCI-002546"]},{"vulnId":"V-267445","ruleId":"SV-267445r1137817_rule","severity":"medium","ruleTitle":"Google Android 15 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.","description":"Data on mobile devices is protected by numerous mechanisms, including user authentication, access control, and cryptography. When the data is backed up to an external system (either locally connected or cloud based), many if not all of these mechanisms are no longer present. This leaves the backed-up data vulnerable to attack. Disabling backup to external systems mitigates this risk.\n\nSFRID: FMT_SMF.1.1 #40","checkContent":"Review managed Google Android 15 device configuration settings to determine if the capability to back up to a locally connected system has been disabled.\n\nThis validation procedure is performed on both the EMM Administration Console and the managed Google Android 15 device. \n\nOn the EMM console:\n\nCOBO and COPE:\n\n1. Open \"Device owner management\".\n2. Verify \"Enable backup service\" is toggled to \"OFF\".\n\nOn the managed Google Android 15 device:\n\nCOBO:\n\n1. Go to Settings >> System >> Backup.\n2. Verify Backup settings is \"Not available\".\n\nCOPE:\n\n1. Go to Settings >> System >> Backup.\n2. Select \"Work\".\n3. Verify Backup settings is \"Not available\".\n\nIf the EMM console device policy is not set to disable the capability to back up to a locally connected system or on the managed Google Android 15 device, the device policy is not set to disable the capability to back up to a locally connected system, and this is a finding.","fixText":"Configure the Google Android 15 device to disable backup to locally connected systems.\n\nOn the EMM console:\n\nCOBO and COPE:\n\n1. Open \"Device owner management\".\n2. Toggle \"Enable backup service\" to \"OFF\".","ccis":["CCI-001090"]},{"vulnId":"V-267446","ruleId":"SV-267446r1137819_rule","severity":"medium","ruleTitle":"Google Android 15 must be configured to not allow backup of [all applications, configuration data] to remote systems.","description":"Backups to remote systems (including cloud backup) can leave data vulnerable to breach on the external systems, which often offer less protection than the mobile operating system (MOS). Where the remote backup involves a cloud-based solution, the backup capability is often used to synchronize data across multiple devices. In this case, DOD devices may synchronize DOD sensitive information to a user's personal device or other unauthorized computers that are vulnerable to breach. Disallowing remote backup mitigates this risk.\n\nSFRID: FMT_SMF.1.1 #40","checkContent":"Review managed Google Android 15 device configuration settings to determine if the capability to back up to a remote system has been disabled. \n\nNote: Since personal accounts cannot be added to the work profile (GOOG-15-009800), this control only impacts personal profile accounts. Site can allow backup based on local policy.\n\nThis validation procedure is performed on both the EMM Administration Console and the managed Google Android 15 device. \n\nOn the EMM console:\n\nCOBO and COPE:\n\n1. Open \"Device owner management\".\n2. Verify \"Enable backup service\" is toggled to \"OFF\".\n\nOn the managed Google Android 15 device:\n\nCOBO:\n\n1. Go to Settings >> System >> System >> Backup.\n2. Verify Backup settings is \"Not available\".\n\nCOPE:\n\n1. Go to Settings >> System >> System >> Backup.\n2. Select \"Work\".\n3. Verify Backup settings is \"Not available\".\n\nIf the EMM console device policy is not set to disable the capability to back up to a remote system or on the managed Google Android 15 device, the device policy is not set to disable the capability to back up to a remote system, this is a finding.","fixText":"Configure the Google Android 15 device to disable backup to remote systems (including commercial clouds).\n\nOn the EMM console:\n\nCOBO and COPE:\n\n1. Open \"Device owner management\".\n2. Toggle \"Enable backup service\" to \"OFF\".\n\nNote: Since personal accounts cannot be added to the work profile (GOOG-15-009800), this control only impacts personal profile accounts. Site can allow backup based on local policy.","ccis":["CCI-001090"]},{"vulnId":"V-267447","ruleId":"SV-267447r1033115_rule","severity":"medium","ruleTitle":"Google Android 15 must be configured to enable authentication of personal hotspot connections to the device using a preshared key.","description":"If no authentication is required to establish personal hotspot connections (Wi-Fi and Bluetooth), an adversary may be able to use that device to perform attacks on other devices or networks without detection. A sophisticated adversary may also be able to exploit unknown system vulnerabilities to access information and computing resources on the device. Requiring authentication to establish personal hotspot connections mitigates this risk.\n\nApplication note: If hotspot functionality is permitted, it must be authenticated via a preshared key. There is no requirement to enable hotspot functionality, and it is recommended this functionality be disabled by default.\n\nSFRID: FMT_SMF.1.1 #41","checkContent":"This is a User-Based Enforcement (UBE) control.\n\nCheck a sample of Pixel phones at the site and verify the Wi-Fi hotspot preshared key (password) is set to \"WPA2/WPA3-Personal\" or \"WPA3-Personal\".\n\n1. Go to Settings >> Network & Internet >> Hotspot & tethering.\n2. Enable \"Wi-Fi hotspot\".\n3. Tap on the words to the left of the slide called \"Wi-Fi Hotspot\" to show the configuration options.\n4. Click the \"Security\" link and verify either “WPA2/WPA3-Personal” or \"WPA3-Personal\" is selected.\n\nIf the Wi-Fi hotspot security is not set to “WPA2/WPA3-Personal” or \"WPA3-Personal\", this is a finding.","fixText":"This is a User-Based Enforcement (UBE) control.\n\nTrain users to not change the default Wi-Fi hotspot security setting: 15-character complex Wi-Fi hotspot preshared key (password) (\"WPA2/WPA3-Personal\" or WPA3-Personal\"). (GOOG-15-009800). \n\nIf the required preshared key is not set up, train users to use the following procedure to set up the required setting:\n\n1. Go to Settings >> Network & Internet >> Hotspot & tethering.\n2. Enable \"Wi-Fi hotspot\".\n3. Tap on the words to the left of the slide called \"Wi-Fi Hotspot\" to show the configuration options.\n4. Click the \"Security\" link and select “WPA2/WPA3-Personal” or \"WPA3-Personal\".","ccis":["CCI-001443","CCI-002314"]},{"vulnId":"V-267448","ruleId":"SV-267448r1033039_rule","severity":"medium","ruleTitle":"Google Android 15 must be configured to disable multiuser modes.","description":"Multiuser mode allows multiple users to share a mobile device by providing a degree of separation between user data. To date, no mobile device with multiuser mode features meets DOD requirements for access control, data separation, and nonrepudiation for user accounts. In addition, the MDFPP does not include design requirements for multiuser account services. Disabling multiuser mode mitigates the risk of not meeting DOD multiuser account security policies.\n\nSFRID: FMT_SMF.1.1 #47a","checkContent":"Review documentation on the managed Google Android 15 device and inspect the configuration on the Google Android device to disable multiuser modes.\n\nThis validation procedure is performed on both the EMM Administration Console and the managed Google Android 15 device. \n\nOn the EMM console:\n\nCOBO and COPE: \n\n1. Open \"User restrictions\".\n2. Open \"Set user restrictions\".\n3. Verify \"Disallow modify accounts\" is toggled to \"ON\".\n\nOn the managed Google Android 15 device:\n\nCOBO and COPE:\n\n1. Go to Settings >> Passwords, passkeys & accounts >> Accounts for Owner.\n2. Tap \"Add account\" (work profile).\n3. Verify the action is not allowed.\n\nIf the EMM console device policy is not set to disable multiuser modes or on the managed Google Android 15 device, the device policy is not set to disable multiuser modes, this is a finding.","fixText":"Configure the Google Android 15 device to disable multiuser modes.\n\nOn the EMM console:\n\nCOBO and COPE:\n\n1. Open \"User restrictions\".\n2. Open \"Set user restrictions\".\n3. Toggle \"Disallow modify accounts\" to \"ON\".","ccis":["CCI-002110"]},{"vulnId":"V-267449","ruleId":"SV-267449r1031532_rule","severity":"low","ruleTitle":"Google Android 15 must be configured to disable all Bluetooth profiles except for HSP (Headset Profile), HFP (Hands-Free Profile), SPP (Serial Port Profile), A2DP (Advanced Audio Distribution Profile), AVRCP (Audio/Video Remote Control Profile), and PBAP (Phone Book Access Profile).","description":"Some Bluetooth profiles provide the capability for remote transfer of sensitive DOD data without encryption or otherwise do not meet DOD IT security policies and therefore must be disabled.\n\nSFRID: FMT_SMF_EXT.1.1/BLUETOOTH BT-8","checkContent":"Determine if the authorizing official (AO) has approved the use of Bluetooth at the site.\n\nIf the AO has not approved the use of Bluetooth, verify Bluetooth has been disabled.\n\nOn the EMM console:\n\nCOBO:\n\n1. Open \"User restrictions\" section.\n2. Verify \"Disallow Bluetooth\" is toggled to \"ON\".\n\nCOPE:\n\n1. Open \"User restrictions on parent\" section.\n2. Verify \"Disallow Bluetooth\" is toggled to \"ON\".\n\nOn the managed Google Android 15 device:\n\nCOBO and COPE:\n\n1. Go to Settings >> Connected Devices >> Connection Preferences >> Bluetooth.\n2. Verify \"Use Bluetooth\" is set to OFF and cannot be toggled to \"ON\".\n\nIf the AO has approved the use of Bluetooth, on the managed Android 15 device:\n\n1. Go to Settings >> Connected Devices.\n2. Verify only approved Bluetooth connected devices using approved profiles are listed.\n\nIf the AO has not approved the use of Bluetooth, and Bluetooth use is not disabled via an EMM-managed device policy, this is a finding.\n\nIf the AO has approved the use of Bluetooth, and Bluetooth devices using unauthorized Bluetooth profiles are listed on the device under \"Connected devices\", this is a finding.","fixText":"Configure the Google Android 15 device to disable Bluetooth or if the AO has approved the use of Bluetooth (for example, for car hands-free use), train the user to connect to only authorized Bluetooth devices using only HSP, HFP, or SPP Bluetooth capable devices (UBE).\n\nTo disable Bluetooth use the following procedure:\n\nOn the EMM console:\n\nCOBO:\n\n1. Open \"User restrictions\" section.\n2. Toggle \"Disallow Bluetooth\" to \"ON\".\n\nCOPE:\n\n1. Open \"User restrictions on parent\" section.\n2. Toggle \"Disallow Bluetooth\" to \"ON\".\n\nThe user training requirement is satisfied in requirement GOOG-15-009800.","ccis":["CCI-000381","CCI-001761"]},{"vulnId":"V-267450","ruleId":"SV-267450r1042523_rule","severity":"medium","ruleTitle":"Google Android 15 must be configured to disable ad hoc wireless client-to-client connection capability.","description":"Ad hoc wireless client-to-client connections allow mobile devices to communicate with each other directly, circumventing network security policies and making the traffic invisible. This could allow the exposure of sensitive DOD data and increase the risk of downloading and installing malware of the DOD mobile device.\n\nSFRID: FMT_SMF_EXT.1.1/WLAN","checkContent":"Review the configuration to determine if the Google Android devices are disallowing Wi-Fi Direct.\n\nThis validation procedure is performed on both the management tool and the Google Android device.\n\nOn the management tool, in the user restrictions, verify \"Wi-Fi Direct\" has been set to \"Disallow\":\n\nCOBO:\n1. Find \"User Restrictions\" and select \"Set User Restrictions\".\n2. Scroll down to \"Disallow Wi-Fi Direct\" and verify it is set to \"ON\".\n\nCOPE:\n1. Find \"User Restrictions on Parent\" and select \"Set User Restrictions\".\n2. Scroll down to \"Disallow Wi-Fi Direct\" and verify it is set to \"ON\".\n\nOn the Google Android device:\n1. Open Settings >> Connections >> Wi-Fi.\n2. From the hamburger menu, select Wi-Fi Direct.\n3. Verify that Wi-Fi Direct cannot be selected.\n\nIf on the management tool \"Wi-Fi Direct\" is not set to \"Disallow\", or on the Google Android device a Wi-Fi Direct device is listed that can be connected to, this is a finding.","fixText":"Configure the Google Android devices to disallow Wi-Fi Direct. On the management tool, do the following:\n\nCOBO:\n1. Find \"User Restrictions\" and select \"Set User Restrictions\".\n2. Scroll down to \"Disallow Wi-Fi Direct\" and toggle that to \"ON\".\n\nCOPE:\n1. Find \"User Restrictions on Parent\" and select \"Set User Restrictions\".\n2. Scroll down to \"Disallow Wi-Fi Direct\" and toggle that to \"ON\".","ccis":["CCI-002536"]},{"vulnId":"V-267451","ruleId":"SV-267451r1033041_rule","severity":"medium","ruleTitle":"Google Android 15 users must complete required training.","description":"The security posture of Google devices requires the device user to configure several required policy rules on their device. User-Based Enforcement (UBE) is required for these controls. In addition, if the authorizing official (AO) has approved the use of an unmanaged personal space, the user must receive training on risks. If a user is not aware of their responsibilities and does not comply with UBE requirements, the security posture of the Google mobile device may become compromised and DOD sensitive data may become compromised.\n\nSFRID: NA","checkContent":"Review a sample of site User Agreements for Google Android 15 device users or similar training records and training course content. \n\nVerify that the Google Android 15 device users have completed the required training. The intent is that required training is renewed on a periodic basis in a time period determined by the AO. \n\nIf any Google Android 15 device user has not completed the required training, this is a finding.","fixText":"All Google Android 15 device users must complete training on the following training topics (users must acknowledge that they have reviewed training via a signed User Agreement or similar written record): \n- Operational security concerns introduced by unmanaged applications/unmanaged personal space, including applications using global positioning system (GPS) tracking.\n- Need to ensure no DOD data is saved to the personal space or transmitted from a personal app (for example, from personal email). \n- If the Purebred key management app is used, users are responsible for maintaining positive control of their credentialed device at all times. The DOD PKI certificate policy requires subscribers to maintain positive control of the devices that contain private keys and to report any loss of control so the credentials can be revoked. Upon device retirement, turn-in, or reassignment, ensure that a factory data reset is performed prior to device hand off. Follow mobility service provider decommissioning procedures as applicable.\n\n- How to configure the following UBE controls (users must configure the control) on the Google device: \n **Secure use of Calendar Alarm.\n **Local screen mirroring and mirroring procedures (authorized/not authorized for use). \n **Do not upload DOD contacts via smart call and caller ID services.\n **Do not configure a DOD network (work) VPN profile on any third-party VPN client installed in the personal space. \n **If Bluetooth connections are approved for mobile device, types of allowed connections (for example car hands-free, but not Bluetooth wireless keyboard).\n **How to perform a full device wipe.\n **Use default Wi-Fi hotspot password: 15-character complex Wi-Fi hotspot preshared password enabled (\"WPA2/WPA3-personal\").\n\n- AO guidance on acceptable use and restrictions, if any, on downloading and installing personal apps and data (music, photos, etc.) in the Google device personal space.","ccis":["CCI-000366"]},{"vulnId":"V-267452","ruleId":"SV-267452r1031541_rule","severity":"medium","ruleTitle":"Google Android 15 must be configured to disable Wi-Fi Sharing.","description":"Wi-Fi Sharing is an optional configuration of Wi-Fi Tethering/Mobile Hotspot, which allows the device to share its Wi-Fi connection with other wirelessly connected devices instead of its mobile (cellular) connection.\n \nWi-Fi Sharing grants the other device access to a corporate Wi-Fi network and may possibly bypass the network access control mechanisms. This risk can be partially mitigated by requiring the use of a preshared key for personal hotspots.\n\nSFRID: FMT_SMF_EXT.1.1 / WLAN #3","checkContent":"Review device configuration settings to confirm Wi-Fi Sharing is disabled. \n \nMobile Hotspot must be enabled to enable Wi-Fi Sharing. If the Authorizing Official (AO) has not approved Mobile Hotspot, and it has been verified as disabled on the EMM console, no further action is needed. \n\nIf Mobile Hotspot is being used, use the following procedure to verify Wi-Fi Sharing is disabled: \n\nOn the EMM console:\n\nCOBO:\n\n1. Open \"Set user restrictions\".\n2. Verify \"Disallow sharing admin configured Wi-Fi\" is toggled to \"ON\".\n\nCOPE:\n\n1. Open \"Set user restrictions on parent\".\n2. Toggle \"Disallow sharing admin configured Wi-Fi\" to \"ON\".\n\nIf on the EMM console, \"Disallow sharing admin configured Wi-Fi\" is not enabled, this is a finding.","fixText":"Configure the Google Android 15 device to disable Wi-Fi Sharing.\n \nMobile Hotspot must be enabled to enable Wi-Fi Sharing. If the AO has not approved Mobile Hotspot, and it has been disabled on the EMM console, no further action is needed. \n\nIf Mobile Hotspot is being used, use the following procedure to disable Wi-Fi Sharing: \n\nOn the EMM console:\n\nCOBO:\n\n1. Open \"Set user restrictions\".\n2. Toggle \"Disallow sharing admin configured Wi-Fi\" to \"ON\".\n\nCOPE:\n\n1. Open \"Set user restrictions on parent\".\n2. Toggle \"Disallow sharing admin configured Wi-Fi\" to \"ON\".","ccis":["CCI-000366"]},{"vulnId":"V-267453","ruleId":"SV-267453r1031544_rule","severity":"medium","ruleTitle":"Google Android 15 must be configured to enforce a password for Wi-Fi and Bluetooth hotspot, if approved for use by the approving authority (AO). If not approved for use, Wi-Fi and Bluetooth hotspot must be disabled.","description":"Wi-Fi and Bluetooth hotspot use may increase the risk for exposing sensitive DOD data for some use cases, therefore it should be disabled unless approved by the AO. When a DOD mobile phone is used as a Wi-Fi or Bluetooth hotspot, a hotspot password must be enabled, otherwise unauthorized devices could connect to the DOD hotspot which may increase the risk of exposure of sensitive DOD data and/or a performance degradation of the DOD mobile phone.\n\nSFRID: FMT_SMF_EXT.1.1 / WLAN #3","checkContent":"Review device configuration, user training, and determine if the AO has approved hotspot use.\n\nIf the AO has not approved hotspot use, verify hotspot use has been disabled:\n\nOn the EMM console:\n\nCOBO:\n\n1. Open \"Set user restrictions\".\n2. Verify \"Disallow config tethering\" is toggled to \"ON\".\n\nCOPE:\n\n1. Open \"Set user restrictions on parent\".\n2. Toggle \"Disallow config tethering\" to \"ON\".\n\nOn the managed Google Android 15 device:\n\nCOBO and COPE:\n\n1. Go to Settings >> Network & Internet.\n2. Verify \"Hotspot & tethering\" is \"Controlled by admin\".\n3. Verify that tapping \"Hotspot & tethering\" provides a prompt to the user specifying \"Action not allowed\".\n \nIf on the managed Google Android 15 device \"Hotspot & tethering\" is enabled, this is a finding.\n\nIf hotspot use has been approved, verify the user has been trained to use the default hotspot password. Refer to GOOG-15-009800 for procedure.\n\nIf users are not trained to use the default hotspot password, this is a finding.","fixText":"Disable hotspot functions on the DOD phone if not approved by the AO. \n\nOn the EMM console:\n\nCOBO:\n\n1. Open \"Set user restrictions\".\n2. Toggle \"Disallow config tethering\" to \"ON\".\n\nCOPE:\n\n1. Open \"Set user restrictions on parent\".\n2. Toggle \"Disallow config tethering\" to \"ON\".\n\nIf the use of Wi-Fi and Bluetooth hotspots has been approved by the AO, train the user to not change the default hotspot password (refer to GOOG-15-009800). (By default, when Wi-Fi Hotspot is enabled, a 15-character complex password is automatically configured for the hotspot.","ccis":["CCI-000366"]},{"vulnId":"V-267454","ruleId":"SV-267454r1031547_rule","severity":"medium","ruleTitle":"Google Android 15 must have the DOD root and intermediate PKI certificates installed.","description":"DOD root and intermediate PKI certificates are used to verify the authenticity of PKI certificates of users and web services. If the root and intermediate certificates are not available, an adversary could falsely sign a certificate in such a way that it could not be detected. Providing access to the DOD root and intermediate PKI certificates greatly diminishes the risk of this attack.\n\nSFRID: FMT_SMF.1.1 #11","checkContent":"Review device configuration settings to confirm that the DOD root and intermediate PKI certificates are installed.\n \nThis procedure is performed on both the EMM Administration console and the managed Google Android 15 device. \n \nThe current DOD root and intermediate PKI certificates may be obtained in self-extracting zip files at http://cyber.mil/pki-pke (for NIPRNet). \n \nOn the EMM console, verify that the DOD root and intermediate certificates are part of a device and/or work profile that is being pushed down to the devices.\n \nOn the managed Google Android 15 device: \n\n1. Open Settings.\n2. Tap \"Security & privacy\".\n3. Tap \"Advanced\".\n4. Tap \"More security & privacy\".\n5. Tap \"Encryption & credentials\".\n6. Tap \"Trusted credentials\".\n7. Verify that DOD root and intermediate PKI certificates are listed under the \"User\" tab in the \"Work\" section.\n \nIf on the EMM console the DOD root and intermediate certificates are not listed in a profile, or the managed Android 15 device does not list the DOD root and intermediate certificates under the user tab, this is a finding.","fixText":"Configure the Google Android 15 device to install DOD root and intermediate certificates. \n \nOn the EMM console, upload DOD root and intermediate certificates as part of a device and/or work profile.\n \nThe current DOD root and intermediate PKI certificates may be obtained in self-extracting zip files at http://cyber.mil/pki-pke (for NIPRNet).","ccis":["CCI-000366"]},{"vulnId":"V-267455","ruleId":"SV-267455r1033044_rule","severity":"medium","ruleTitle":"The Google Android 15 work profile must be configured to enforce the system application disable list.","description":"The system application disable list controls user access to/execution of all core and preinstalled applications. \n \nCore application: Any application integrated into Google Android 15 by Google. \n \nPreinstalled application: Additional noncore applications included in the Google Android 15 build by Google or the wireless carrier. \n \nSome system applications can compromise DOD data or upload users' information to non-DOD-approved servers. A user must be blocked from using such applications that exhibit behavior that can result in compromise of DOD data or DOD user information. \n \nThe site administrator must analyze all preinstalled applications on the device and disable all applications not approved for DOD use by configuring the system application disable list.\n\nSFRID: FMT_SMF.1.1 #47","checkContent":"Review the managed Google Android 15 work profile configuration settings to confirm the system application disable list is enforced. This setting is enforced by default. Verify only approved system apps have been placed on the core allow list.\n \nThis procedure is performed on the EMM Administrator console. \n \nReview the system app allow list and verify only approved apps are on the list.\n\nCOBO:\n\n1. Open \"Apps management\" section.\n2. Select \"Hide apps\".\n3. Verify package names of apps are listed.\n\nCOPE:\n\n1. Open \"Apps management\" section.\n2. Select \"Hide apps on parent\".\n3. Verify package names of apps are listed.\n\nIf on the EMM console the system app allow list contains unapproved core apps, this is a finding.","fixText":"Configure the Google Android 15 device to enforce the system application disable list. \n\nThe required configuration is the default configuration when the device is enrolled. If the device configuration is changed, use the following procedure to bring the device back into compliance:\n\nOn the EMM console:\n\nCOBO:\n\n1. Open \"Apps management\" section.\n2. Select \"Hide apps\".\n3. Enter package names of apps to hide.\n\nCOPE:\n\n1. Open \"Apps management\" section.\n2. Select \"Hide apps on parent\".\n3. Enter package names of apps to hide.\n\nConfigure a list of approved Google core and preinstalled apps in the core app allow list.","ccis":["CCI-000366"]},{"vulnId":"V-267456","ruleId":"SV-267456r1031553_rule","severity":"medium","ruleTitle":"The Google Android 15 work profile must be configured to disable automatic completion of workspace internet browser text input.","description":"The autofill functionality in the web browser allows the user to complete a form that contains sensitive information, such as personally identifiable information (PII), without previous knowledge of the information. By allowing the use of autofill functionality, an adversary who learns a user's Android 15 device password, or who otherwise is able to unlock the device, may be able to further breach other systems by relying on the autofill feature to provide information unknown to the adversary. By disabling the autofill functionality, the risk of an adversary gaining further information about the device's user or compromising other systems is significantly mitigated.\n\nSFRID: FMT_SMF.1.1 #47","checkContent":"Review the work profile Chrome Browser app on the Google Android 15 autofill setting.\n\nThis procedure is performed only on the EMM Administrator console. \n \nOn the EMM console:\n\nCOBO:\n\n1. Open \"Managed Configurations\" section.\n2. Select the Chrome Browser version from the work profile.\n3. Verify \"PasswordManagerEnabled\" is turned \"OFF\".\n4. Verify \"AutofillAddressEnabled\" is turned \"OFF\".\n5. Verify \"AutofillCreditCardEnabled\" is turned \"OFF\".\n\nCOPE:\n\n1. Open \"Managed Configurations\" section.\n2. Select the Chrome Browser version from the work profile.\n3. Verify \"PasswordManagerEnabled\" is turned \"OFF\".\n4. Verify \"AutofillAddressEnabled\" is turned \"OFF\".\n5. Verify \"AutofillCreditCardEnabled\" is turned \"OFF\".\n \nIf on the EMM console any of the browser autofill settings are set to \"On\" in the Chrome Browser Settings, this is a finding.","fixText":"Configure the Chrome browser on the Google Android 15 device work profile to disable autofill.\n \nOn the EMM console:\n\nCOBO:\n\n1. Open \"Managed Configurations\" section.\n2. Select the Chrome Browser version from the work profile.\n3. Ensure \"PasswordManagerEnabled\" is turned \"OFF\".\n4. Ensure \"AutofillAddressEnabled\" is turned \"OFF\".\n5. Ensure \"AutofillCreditCardEnabled\" is turned \"OFF\".\n\nCOPE:\n\n1. Open \"Managed Configurations\" section.\n2. Select the Chrome Browser version from the work profile.\n3. Ensure \"PasswordManagerEnabled\" is turned \"OFF\".\n4. Ensure \"AutofillAddressEnabled\" is turned \"OFF\".\n5. Ensure \"AutofillCreditCardEnabled\" is turned \"OFF\".\n\nRefer to the EMM documentation to determine how to configure Chrome Browser Settings.","ccis":["CCI-000366"]},{"vulnId":"V-267457","ruleId":"SV-267457r1031556_rule","severity":"medium","ruleTitle":"The Google Android 15 work profile must be configured to disable the autofill services.","description":"The autofill services allow the user to complete text inputs that could contain sensitive information, such as personally identifiable information (PII), without previous knowledge of the information. By allowing the use of autofill services, an adversary who learns a user's Android 15 device password, or who otherwise is able to unlock the device, may be able to further breach other systems by relying on the autofill services to provide information unknown to the adversary. By disabling the autofill services, the risk of an adversary gaining further information about the device's user or compromising other systems is significantly mitigated. \n \nExamples of apps that offer autofill services include Samsung Pass, Google, Dashlane, LastPass, and 1Password.\n\nSFRID: FMT_SMF.1.1 #47","checkContent":"Review the Google Android 15 work profile configuration settings to confirm that autofill services are disabled. \n \nThis procedure is performed only on the EMM Administration console. \n \nOn the EMM console:\n\nCOBO:\n\n1. Open \"Set user restrictions\".\n2. Verify \"Disable autofill\" is toggled to \"ON\".\n\nCOPE:\n\n1. Open \"Set user restrictions\".\n2. Verify \"Disable autofill\" is toggled to \"ON\".\n \nIf on the EMM console \"disallow autofill\" is not selected, this is a finding.","fixText":"Configure the Google Android 15 device work profile to disable the autofill services. \n \nOn the EMM console:\n\nCOBO:\n\n1. Open \"Set user restrictions\".\n2. Toggle \"Disable autofill\" to \"ON\".\n\nCOPE:\n\n1. Open \"Set user restrictions\".\n2. Toggle \"Disable autofill\" to \"ON\".","ccis":["CCI-000366"]},{"vulnId":"V-267458","ruleId":"SV-267458r1031559_rule","severity":"medium","ruleTitle":"Google Android 15 must be configured to disallow configuration of date and time.","description":"Determining the correct time a particular application event occurred on a system is critical when conducting forensic analysis and investigating system events. \n \nPeriodically synchronizing internal clocks with an authoritative time source is necessary to correctly correlate the timing of events that occur across the enterprise. The three authoritative time sources for Google Android 15 are an authoritative time server that is synchronized with redundant United States Naval Observatory (USNO) time servers as designated for the appropriate DOD network (NIPRNet or SIPRNet), the Global Positioning System (GPS), or the wireless carrier. \n \nTime stamps generated by the audit system in Google Android 15 must include both date and time. The time may be expressed in Coordinated Universal Time (UTC), a modern continuation of Greenwich Mean Time (GMT), or local time with an offset from UTC.\n\nSFRID: FMT_SMF.1.1 #47","checkContent":"Review the managed Google Android 15 device configuration settings to confirm that autofill services are disabled. \n \nThis procedure is performed on both the EMM Administration console and the managed Google Android 15 device. \n \nOn the EMM console:\n\nCOBO:\n\n1. Open \"Set user restrictions\".\n2. Verify \"Disallow config date time\" is toggled to \"ON\".\n\nCOPE:\n\n1. Open \"Set user restrictions on parent\".\n2. Verify \"Disallow config date time\" is toggled to \"ON\".\n \nOn the managed Google Android 15 device: \n\nCOBO and COPE:\n\n1. Open Settings. \n2. Tap \"System\".\n3. Tap \"Date & time\". \n4. Verify \"Set time automatically\" is greyed out and is \"Enabled by admin\".\n \nIf on the EMM console \"Disallow config date time\" is not set to \"On\", or on the managed Android 15 device \"Set time automatically\" is not greyed out, this is a finding.","fixText":"Configure the Google Android 15 device to set auto network time.\n \nOn the EMM console:\n\nCOBO:\n\n1. Open \"Set user restrictions\".\n2. Toggle \"Disallow config date time\" to \"ON\".\n\nCOPE:\n\n1. Open \"Set user restrictions on parent\".\n2. Toggle \"Disallow config date time\" to \"ON\".","ccis":["CCI-000366"]},{"vulnId":"V-267459","ruleId":"SV-267459r1031562_rule","severity":"high","ruleTitle":"Android 15 devices must have the latest available Google Android 15 operating system installed.","description":"Required security features are not available in earlier operating system versions. In addition, there may be known vulnerabilities in earlier versions.\n\nSFRID: FMT_SMF.1.1 #47","checkContent":"Review device configuration settings to confirm the Google Android device has the most recently released version of managed Google Android 15 installed. \n \nThis procedure is performed on both the EMM console and the managed Google Android 15 device.\n \nIn the EMM management console, review the version of Google Android 15 installed on a sample of managed devices. This procedure will vary depending on the EMM product. \n \nOn the managed Google Android 15 device, to determine the installed operating system version: \n\nCOBO and COPE:\n\n1. Open \"Settings\".\n2. Tap \"About phone\".\n3. Verify \"Build number\".\n \nIf the installed version of the Google Android 15 operating system on any reviewed device is not the latest released by Google, this is a finding. \n\nGoogle's Android operating system patch website: https://source.android.com/security/bulletin/.\n\nAndroid versions for Pixel devices: https://developers.google.com/android/images.","fixText":"Install the latest released version of the Google Android 15 operating system on all managed Google devices.\n \nNote: Google Android device operating system updates are released directly by Google or can be distributed via the EMM. Check each device manufacturer and/or carriers for current updates.","ccis":["CCI-000366"]},{"vulnId":"V-267460","ruleId":"SV-267460r1033046_rule","severity":"low","ruleTitle":"Android 15 devices must be configured to disable the use of third-party keyboards.","description":"Many third-party keyboard applications are known to contain malware.\n\nSFRID: FMT_SMF.1.1 #47","checkContent":"Review the managed Google Android 15 configuration settings to confirm that no third-party keyboards are enabled. \n \nThis procedure is performed on the EMM console.\n \nOn the EMM console:\n\nCOBO and COPE:\n\n1. Open \"Input methods\".\n2. Tap \"Set input methods\".\n3. Verify only the approved keyboards are selected.\n\nIf third-party keyboards are allowed, this is a finding.","fixText":"Configure the Google Android 15 device to disallow the use of third-party keyboards. \n \nOn the EMM console:\n\nCOBO and COPE:\n\n1. Open \"Input methods\".\n2. Tap \"Set input methods\".\n3. Select only the approved keyboard.\n\nAdditionally, Admins can configure application allow lists for Google Play that do not have any third-party keyboards for user installation.","ccis":["CCI-000366"]},{"vulnId":"V-267461","ruleId":"SV-267461r1031568_rule","severity":"low","ruleTitle":"Android 15 devices must be configured to enable Common Criteria Mode (CC Mode).","description":"The CC Mode feature is a superset of other features and behavioral changes that are mandatory MDFPP requirements. If CC mode is not implemented, the device will not be operating in the NIAP-certified compliant CC Mode of operation.\n\nCC Mode implements the following behavioral/functional changes: How the Bluetooth and Wi-Fi keys are stored using different types of encryption.\n\nSFRID: FMT_SMF.1.1 #47","checkContent":"Review the managed Google Android 15 configuration settings to confirm CC mode is enabled. \n \nThis procedure is performed on the EMM console.\n \nCOBO and COPE:\n\n1. Open Device owner management.\n2. Verify \"Enable Common Criteria mode\" is toggled to \"ON\".\n\nIf CC mode is not enabled, this is a finding.","fixText":"Configure the Google Android 15 device to implement CC Mode. \n \nOn the EMM console:\n\nCOBO and COPE:\n\n1. Open Device owner management.\n2. Toggle \"Enable Common Criteria mode\" to \"ON\".","ccis":["CCI-000366"]},{"vulnId":"V-267462","ruleId":"SV-267462r1033049_rule","severity":"medium","ruleTitle":"Google Android 15 must be configured to disable all data signaling over [assignment: list of externally accessible hardware ports (for example, USB)].","description":"If a user is able to configure the security setting, the user could inadvertently or maliciously set it to a value that poses unacceptable risk to DOD information systems. An adversary could exploit vulnerabilities created by the weaker configuration to compromise DOD sensitive information.\n\nSFRID: FMT_MOF_EXT.1.2 #24","checkContent":"Review the device configuration to confirm that the USB port is disabled except for charging the device.\n\nOn the EMM console:\n\n1. Open \"Set user restrictions\".\n2. Verify “Disallow USB file transfer” is set to \"ON\".\n \nIf on EMM console the USB port is not disabled (“Disallow USB file transfer” is set to \"ON\"), this is a finding.","fixText":"Configure Google Android 15 device to disable the USB port (except for charging the device).\n\nCOPE and COBO:\n\nOn the EMM console:\n\n1. Open \"Set user restrictions\".\n2. Toggle “Disallow USB file transfer” to \"ON\".","ccis":["CCI-002235"]},{"vulnId":"V-267463","ruleId":"SV-267463r1033052_rule","severity":"medium","ruleTitle":"The Google Android 15 must allow only the administrator (EMM) to install/remove DOD root and intermediate PKI certificates.","description":"DOD root and intermediate PKI certificates are used to verify the authenticity of PKI certificates of users and web services. If the user is allowed to remove root and intermediate certificates, the user could allow an adversary to falsely sign a certificate in such a way that it could not be detected. Restricting the ability to remove DOD root and intermediate PKI certificates to the administrator mitigates this risk.\n\nSFRID: FMT_MOF_EXT.1.2 #47","checkContent":"Review the device configuration to confirm that the user is unable to remove DOD root and intermediate PKI certificates.\n\nOn the EMM console:\n\n1. Open \"Set user restrictions\".\n2. Verify \"Disallow config credentials\" is toggled to \"ON\".\n\nOn the Google Android 15 device:\n\n1. Open Settings.\n2. Tap \"Security & privacy\".\n3. Tap \"More security & privacy\".\n4. Tap \"Encryption & credentials\".\n5. Tap \"Trusted credentials\".\n6. Verify the user is unable to untrust or remove any work certificates.\n \nIf on the Google Android 15 device the user is able to remove certificates, this is a finding.","fixText":"Configure Google Android 15 device to prevent a user from removing DOD root and intermediate PKI certificates.\n\nOn the EMM console:\n\n1. Open \"Set user restrictions\".\n2. Toggle \"Disallow config credentials\" to \"ON\".","ccis":["CCI-000370"]},{"vulnId":"V-267464","ruleId":"SV-267464r1033054_rule","severity":"low","ruleTitle":"Google Android 15 must allow only the administrator (MDM) to perform the following management function: Disable Phone Hub.","description":"It may be possible to transfer work profile data on a DOD Android device to an unauthorized Chromebook if the user has the same Google Account set up on the Chromebook and in the work profile on the Android device. This may result in the exposure of sensitive DOD data.\n\nSFRID: FMT_MOF_EXT.1.2 #47","checkContent":"Review the EMM configuration to confirm phone hub has been disabled.\n\nOn the management tool:\n\n1. Open \"Nearby notification streaming policy\".\n2. Verify \"Nearby notification streaming policy\" is set to \"Disabled\".\n3. Open \"Nearby app streaming policy\".\n4. Verify \"Nearby app streaming policy\" is set to \"Disabled\".\n\nIf on the management tool the \"Nearby Streaming Policy\" is not set to \"Disabled\" and \"Nearby app streaming policy\" is not set to \"Disabled\", this is a finding.\n\nNote: From a Chromebook, if a device is connected to the Phone Hub, try to set up the Notifications. It will fail to connect to the device to complete the setup if phone hub has been disabled on the DOD Android device.","fixText":"Configure Google Android 15 device to disable the nearby notification streaming policy to disable Phone Hub.\n\nCOPE and COBO:\n\nOn the EMM console:\n\n1. Open \"Nearby notification streaming policy\".\n2. Set \"Nearby notification streaming policy\" to \"Disabled\".\n3. Open \"Nearby app streaming policy\".\n4. Set \"Nearby app streaming policy\" to \"Disabled\".","ccis":["CCI-001090"]},{"vulnId":"V-269100","ruleId":"SV-269100r1033116_rule","severity":"high","ruleTitle":"Google Android 15 must be configured to disable \"Private Space\" use.","description":"Private Space is an Android feature that provides a separate encrypted container on the mobile device. Apps in Private Space show up in a separate container in the launcher and are hidden from the \"Recents\" view, notifications, settings, and other apps when the Private Space is locked. In addition, MDM server allow list or blocklist cannot control the installation of apps into Private Space. Malware and other unauthorized apps could be installed on a DOD mobile device, which could lead to the compromise of DOD sensitive information or to an attack on the DOD network.\n\nSFRID: FMT_MOF_EXT.1.2 #47","checkContent":"Review the Google Android 15 work profile configuration settings to confirm that Private Space is disabled. \n \nThis procedure is performed only on the EMM Administration console. \n \nOn the EMM console:\n\nCOBO:\n\n1. Open \"Set user restrictions\".\n2. Verify \"Disallow add private profile\" is set to \"ON\".\n\nCOPE:\n\n1. Open \"Set user restrictions\".\n2. Verify \"Disallow add private profile\" is set to \"ON\".\n \nIf on the EMM console \"Disallow add private profile\" is not selected, this is a finding.","fixText":"Configure the Google Android 15 device to disable \"Private Space\". \n \nOn the EMM console:\n\nCOBO:\n\n1. Open \"Set user restrictions\".\n2. Toggle \"Disallow add private profile\" to \"ON\".\n\nCOPE:\n\n1. Open \"Set user restrictions\".\n2. Toggle \"Disallow add private profile\" to \"ON\".","ccis":["CCI-000370"]},{"vulnId":"V-276985","ruleId":"SV-276985r1183783_rule","severity":"medium","ruleTitle":"Google Android 15 must disable the user's ability to wipe the device.","description":"This feature must be disabled to comply with DOD electronic records retention requirements for mobile devices. Otherwise, mobile device users could wipe the device, which would violate DOD policy.\n\nSFR ID: FMT_MOF_EXT.1.2 #47","checkContent":"Review configuration settings to confirm that the user is unable to perform a factory reset and the admin has the ability to inject a recovery account on the device to can unlock Factory Reset Protection (FRP).\n\nThis check procedure is performed on the device management tool and the Google Android 15 device.\n\nOn the MDM console:\n\nVerify factory reset configuration:\n\nCOBO:\n\n1. Open user restrictions.\n2. Verify that \"Disallow Factory Reset\" is enabled.\n\nVerify factory reset protection policy configuration:\n\nFrom the Android Enterprise policy management:\n\n1. Go to the Factory Reset Protection section.\n2. Verify that \"Factory Reset Protection\" is set to \"Allow/Enabled\".\n3. Verify that the correct Google Account ID(s) is/are listed as allowed to unlock the FRP.\n\nOn the managed Google Android 15 device, verify factory reset configuration:\n\nCOBO:\n\n1. Open Settings >> General management >> Reset.\n2. Tap the \"Factory data reset\" option.\n3. Verify that the \"Action not allowed\" pop-up appears and factory data reset does not proceed.\n\nIf the Android device user is able to perform a factory reset or the admin cannot unlock the Android phone after an FRP event, this is a finding.","fixText":"Configure Google Android 15 device to disable the ability of the user to wipe the Android device. Enable the admin to inject a recovery account on the device to unlock FRP.\n\nOn the MDM console:\n\nDisallow factory reset:\n\nCOBO:\n\n1. Open user restrictions.\n2. Enable \"Disallow Factory Reset\".\n\nSet factory reset protection policy:\n\nCOBO: \n\n1. Device owner management >> Set factory reset protection.\n2. From Accounts Section: Add Account >> Enter recovery account >> press \"Ok\".\n3. From Enabled Section: Select \"Enabled\" to enable FRP policy.\n4. Press \"Save\" to confirm all changes.\n\nConfiguration API: factoryResetDisabled, frpAdminEmails[ ]","ccis":["CCI-000366"]},{"vulnId":"V-276986","ruleId":"SV-276986r1134396_rule","severity":"low","ruleTitle":"Google Android 15 must disable the use of assistants (including Google Assistant) unless required to meet Section 508 compliance requirements.","description":"The use of assistants could expose sensitive DOD data to cloud-based servers during the processing of assistant requests.\n\nSFR ID: FMT_MOF_EXT.1.2 #47","checkContent":"Review configuration settings to confirm that the use of assistants has been disabled.\n\nThis check procedure is performed on the device management tool and the Google Android 15 device.\n\nOn the MDM console:\n\nCOBO and COPE:\n1. Open user restrictions.\n2. Verify that \"Disallow assist content\" is enabled.\n3. Verify that the Gemini App in the Managed Google Play Store has not been added to the allowlist.\n\nOn the managed Google Android 15 device: \n\n1. Try to invoke the Google Assistant and note that it will not execute.\n2. Verify that the Gemini app is not installed and is not listed in the Managed Google Play Store.\n\nIf the use of assistants has not been disabled, this is a finding.\n\nNote: This control also disables Gemini from being invoked if it was previously installed.","fixText":"Configure the Google Android 15 device to disable the use of all assistants.\n\nOn the MDM console, do the following:\n\nCOBO and COPE:\n\n1. Open user restrictions.\n2. Enable \"Disallow assist content\".\n3. Do not allowlist the Gemini App in the Managed Google Play Store.\n\nNote: This control also disables Gemini from being invoked if it was previously installed.\n\nConfiguration API: ASSIST_CONTENT_DISALLOWED","ccis":["CCI-000366"]},{"vulnId":"V-276987","ruleId":"SV-276987r1134399_rule","severity":"low","ruleTitle":"Google Android 15 must disable wireless printing.","description":"Wireless printing allows the printing of sensitive DOD documents to non-DOD controlled printers, which may lead to the exposure of sensitive DOD information.\n\nSFR ID: FMT_MOF_EXT.1.2 #47","checkContent":"Review configuration settings to confirm that wireless printing has been disabled.\n\nThis check procedure is performed on the device management tool and the Google Android 15 device.\n\nOn the MDM console:\n\nCOBO and COPE:\n\n1. Open user restrictions. \n2. Verify that \"Disallow printing\" is enabled.\n\nOn the managed Google Android 15 device: \n\nCOBO and COPE:\n\n1. Open a document or image from the file app and try to print.\n2. Verify that printing is not possible.\n\nIf wireless printing has not been disabled, this is a finding.","fixText":"Configure Google Android 15 device to disable wireless printing.\n\nOn the MDM console, do the following:\n\nCOBO and COPE:\n\n1. Open user restrictions.\n2. Enable \"Disallow printing\".\n\nConfiguration API: PRINTING_DISALLOWED","ccis":["CCI-000366"]},{"vulnId":"V-276988","ruleId":"SV-276988r1134402_rule","severity":"low","ruleTitle":"Google Android 15 must disable screen capture.","description":"The screen capture feature could lead to the exposure of sensitive DOD information.\n\nSFR ID: FMT_MOF_EXT.1.2 #47","checkContent":"Review configuration settings to confirm that screen capture has been disabled.\n\nThis check procedure is performed on the device management tool and the Google Android 15 device.\n\nOn the MDM console:\n\nCOBO and COPE:\n\n1. Open Camera, screen capture, and audio section.\n2. Verify that the \"Disable Screen Capture\" setting is enabled.\n\nOn the managed Google Android 15 device: \n\nCOBO and COPE:\n\n1. Press the power button and the volume down button at the same time. \n2. Verify that the message \"Taking screenshots is blocked by your admin\" appears.\n\nIf screen capture has not been disabled, this is a finding.","fixText":"Install a configuration profile to disable screen capture.\n\nOn the MDM console, do the following:\n\nCOBO and COPE:\n\n1. Open Camera, screen capture, and audio section.\n2. Enable the \"Disable Screen Capture\" setting.\n\nConfiguration API: screenCaptureDisabled","ccis":["CCI-000366"]},{"vulnId":"V-276989","ruleId":"SV-276989r1134405_rule","severity":"medium","ruleTitle":"Google Android 15 devices must have a Mobile Threat Detection (MTD) app installed.","description":"DOD mobile devices are in constant risk of cyber threats. MTD apps mitigate these risks by providing real-time threat detection, malware prevention, and vulnerability analysis.\n\nSFR ID: FMT_MOF_EXT.1.2 #47","checkContent":"Confirm that an MTD app is installed on managed Google Android devices.\n\nThis check procedure is performed on both the device management tool and the Google Android device.\n\nIn the MDM console, verify that an MTD app is listed as a managed app being deployed to site managed devices.\n\nOn the Google Android device:\n\n1. Open the Settings app.\n2. Tap \"Apps\" and then \"See all apps\".\n3. Verify that an MTD app is listed.\n\nIf an MTD app is not installed on the device, this is a finding.","fixText":"Install an MTD app on managed Google Android devices.","ccis":["CCI-000366"]},{"vulnId":"V-276990","ruleId":"SV-276990r1134408_rule","severity":"medium","ruleTitle":"Google Android 15 must implement the management setting: disable Camera.","description":"Authorizing official (AO) approval is required before the mobile device camera can be enabled for a specific user or group of users, based on a risk assessment of the operational environment. Camera use may lead to the exposure of sensitive DOD information in some operational environments.\n\nSFR ID: FMT_MOF_EXT.1.2 #47","checkContent":"Determine if the site AO has approved the use of device cameras. Look for a document showing approval for a specific user or group of users. If not approved, review configuration settings to confirm that \"Allow Camera\" is disabled. If approved, this requirement is not applicable. Review configuration settings to confirm that the device camera has been disabled.\n\nThis check procedure is performed on the device management tool and the Samsung Android 15 device.\n\nOn the MDM console:\n\nCOBO and COPE:\n\n1. Open Camera.\n2. Verify that the \"Disable camera\" setting is disabled.\n\nOn the managed Samsung Android 15 device: \n\nCOBO and COPE:\n\nVerify that the camera cannot be used on the mobile device.\n\nIf the device camera has not been disabled, this is a finding.","fixText":"If the AO has not approved the use of Google device camera, configure Android 15 to disable the device camera.\n\nOn the MDM console:\n\nCOBO and COPE:\n\n1. Open Camera.\n2. Select \"Disable camera\".\n\nConfiguration API: cameraDisabled","ccis":["CCI-000366"]},{"vulnId":"V-278365","ruleId":"SV-278365r1134574_rule","severity":"medium","ruleTitle":"The Google Android device must be configured to disable Wi-Fi Aware for Work Profile apps.","description":"Wi-Fi Aware allows direct connections between nearby devices for fast data transfer, video streaming, and multiplayer gaming. It allows full peer-to-peer device discovery and communication where two or more devices are publishing and/or subscribing to the same known service name. There is risk that sensitive DOD information could be transferred from a DOD mobile device to a non-DOD device or from Work Profile apps on a DOD device to Personal Profile apps on a non-DOD device.","checkContent":"Review device configuration settings to confirm Wi-Fi Aware is disabled for each work profile app. \n \nThis procedure is performed on the EMM console.\n \nFor each Work Profile app, verify the app is configured to deny the NEARBY_WIFI_DEVICE permission. Note: Not all apps will support Wi-Fi Aware and have the NEARBY_WIFI_DEVICE permission.\n\nIf on the EMM console the NEARBY_WIFI_DEVICE permission is not set to \"deny\" for all Work Profile apps that support Wi-Fi Aware, this is a finding.","fixText":"Configure the Google Android device to disable Wi-Fi Aware for all Work Profile apps.\n \nOn the EMM console:\n\nFor each Work Profile app, configure the NEARBY_WIFI_DEVICE permission to \"deny\" to block the use of Wi-Fi Aware if the app supports this feature. If the app does not support Wi-Fi Aware, a NEARBY_WIFI_DEVICE permission may not be available.","ccis":["CCI-000366"]},{"vulnId":"V-278366","ruleId":"SV-278366r1134577_rule","severity":"medium","ruleTitle":"Google Android must implement the management setting: disable the Bluetooth radio.","description":"Authorizing official (AO) approval is required before the Google device Bluetooth radio can be enabled. All AO approvals must be documented and based on critical mission need. Use of Bluetooth may lead to the exposure of sensitive DOD information in some operational environments.\n\nSFR ID: FMT_MOF_EXT.1.2 #47","checkContent":"Determine if the site AO has approved the use of Google device Bluetooth radios. Look for a document showing AO approval. All AO approvals must be documented and based on critical mission need. \n\nIf not approved, review configuration settings on the MDM server to confirm Bluetooth has been disabled, and on the Google device, verify Bluetooth cannot be enabled. If approved, this requirement is not applicable.\n\nThis check procedure is performed on both the device management tool and managed iPhone or iPad.\n\nNote: If an organization has multiple configuration profiles, the Check procedure must be performed on the relevant configuration profiles applicable to the scope of the review.\n\nIn the iOS management tool, verify Bluetooth is disabled (\"DISALLOW_BLUETOOTH\" enabled) in the configuration profile.\n\nOn the managed Google device verify the Bluetooth radio is disabled and cannot be enabled:\n\nSettings >> Connected devices >> Connection preferences >> Bluetooth\n\nIf Bluetooth has not been disabled in the device's MDM configuration profile or if Bluetooth can be enabled on the Google device, this is a finding.","fixText":"If the AO has not approved the use of the Google device Bluetooth radio, install a configuration profile to disable Bluetooth use. \n\nOn the MDM console: \n\nIn the configuration profile for the device, disable Bluetooth (enable \"DISALLOW_BLUETOOTH\").","ccis":["CCI-000366"]}]}