STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Samsung Android 16 COPE Security Technical Implementation Guide

V-276669

CAT III (Low)

The Samsung Android device must be configured to perform the following management function: Disable Phone Hub.

Rule ID

SV-276669r1139529_rule

STIG

Samsung Android 16 COPE Security Technical Implementation Guide

Version

V1R2

CCIs

CCI-001090

Discussion

It may be possible to transfer work profile data on a DOD Android device to an unauthorized Chromebook if the user has the same Google Account set up on the Chromebook. This may result in the exposure of sensitive DOD data. SFR ID: FMT_MOF_EXT.1.2 #47

Check Content

Review the management tool to confirm Phone Hub has been disabled.

On the management tool:
1. Open "Nearby notification streaming policy".
2. Verify "Nearby notification streaming policy" is set to "Disabled".
3. Open "Nearby app streaming policy".
4. Verify "Nearby app streaming policy" is set to "Disabled".
 
If on the management tool the "Nearby Streaming Policy" is not set to "Disabled", this is a finding.

Note: From a Chromebook, if a device is connected to the Phone Hub, try to set up the Notifications. It will fail to connect to the device to complete the setup if Phone Hub has been disabled on the DOD Android device.

Fix Text

Configure the Samsung device to disable the nearby notification and app streaming policy to disable Phone Hub.

On the management tool:
1. Open "Nearby notification streaming policy".
2. Set "Nearby notification streaming policy" to "Disabled".
3. Open "Nearby app streaming policy".
4. Set "Nearby app streaming policy" to "Disabled".

API: setNearbyNotificationStreamingPolicy