STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Samsung Android 16 COBO Security Technical Implementation Guide

V-276547

CAT II (Medium)

Samsung Android must be configured to disable USB mass storage mode.

Rule ID

SV-276547r1139163_rule

STIG

Samsung Android 16 COBO Security Technical Implementation Guide

Version

V1R3

CCIs

CCI-002546

Discussion

USB mass storage mode enables the transfer of data and software from one device to another. This software can include malware. When USB mass storage is enabled on a mobile device, it becomes a potential vector for malware and unauthorized data exfiltration. Prohibiting USB mass storage mode mitigates this risk. SFR ID: FMT_SMF.1.1 #39

Check Content

Review the configuration to determine if the Samsung Android devices are disabling USB mass storage mode.

This validation procedure is performed on both the management tool and the Samsung Android device.

On the management tool, in the device restrictions, verify "USB file transfer" has been set to "Disallow".

On the Samsung Android device, from the "USB for file transfer" notification, verify that a "File Transfer" is not an option.

If on the management tool "USB file transfer" is not set to "Disallow", or on the Samsung Android device a "File Transfer" is an option, this is a finding.

Fix Text

Configure the Samsung Android devices to disable USB mass storage mode.

On the management tool, in the device restrictions, set "USB file transfer" to "Disallow".

DeX drag and drop file transfer capabilities will be prohibited, but all other DeX capabilities remain usable.

API: addUserRestriction, DISALLOW_USB_FILE_TRANSFER