STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Samsung Android 16 COPE Security Technical Implementation Guide

V-276675

CAT II (Medium)

The Samsung Android device must be configured to disable all data signaling over [assignment: list of externally accessible hardware ports (for example, USB)].

Rule ID

SV-276675r1139547_rule

STIG

Samsung Android 16 COPE Security Technical Implementation Guide

Version

V1R2

CCIs

CCI-002235

Discussion

If a user is able to configure the security setting, the user could inadvertently or maliciously set it to a value that poses unacceptable risk to DOD information systems. An adversary could exploit vulnerabilities created by the weaker configuration to compromise DOD sensitive information. SFR ID: FMT_MOF_EXT.1.2 #24

Check Content

Review the device configuration to confirm the USB port is disabled except for charging the device.

On the management tool:
Verify "Disallow usb file transfer" is toggled to "OFF".
 
If on the management tool the USB port is not disabled, this is a finding.

Fix Text

Configure the Samsung device to disable the USB port (except for charging the device).

On the management tool:
Toggle "Disallow usb file transfer" to "OFF".

API: setUsbDataSignalingEnabled