STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Samsung Android OS 13 with Knox 3.x COPE Security Technical Implementation Guide

V-255146

CAT II (Medium)

Samsung Android must be configured to disable developer modes.

Rule ID

SV-255146r958478_rule

STIG

Samsung Android OS 13 with Knox 3.x COPE Security Technical Implementation Guide

Version

V2R3

CCIs

CCI-000381

Discussion

Developer modes expose features of the MOS that are not available during standard operation. An adversary may leverage a vulnerability inherent in a developer mode to compromise the confidentiality, integrity, and availability of DOD sensitive information. Disabling developer modes mitigates this risk. SFR ID: FMT_SMF_EXT.1.1 #26

Check Content

Review the configure to determine if the Samsung Android devices are disabling developer modes.

This validation procedure is performed on both the management tool and the Samsung Android device.

On the management tool, in the device restrictions, verify that "Debugging Features" is set to "Disallow".

On the Samsung Android device: 
1. Open Settings >> About phone >> Software information.
2. Tap on the Build Number to try to enable Developer Options and validate that action is blocked.

If on the management tool "Debugging Features" is not set to "Disallow" or on the Samsung Android device "Developer options" action is not blocked, this is a finding.

Fix Text

Configure the Samsung Android devices to disable developer modes.

On the management tool, in the device restrictions, set "Debugging Features" to "Disallow".