STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Google Android 14 COPE Security Technical Implementation Guide

V-276973

CAT II (Medium)

Google Android 14 must disable the user's ability to wipe the device.

Rule ID

SV-276973r1188334_rule

STIG

Google Android 14 COPE Security Technical Implementation Guide

Version

V2R4

CCIs

CCI-000366

Discussion

This feature must be disabled to comply with DOD electronic records retention requirements for mobile devices. Otherwise, mobile device users could wipe the device, which would violate DOD policy. SFR ID: FMT_MOF_EXT.1.2 #47

Check Content

Verify the Android device user has been trained to not perform a factory wipe without the approval of the authorizing official (AO). Confirm by reviewing the site's mobile device training records or the User Agreement. This is a User-Based Enforcement (UBE) control.  

If the Android device user has not been trained to not perform a factory wipe without the approval of the AO, this is a finding.

Fix Text

Train users to not perform a factory reset on the Android device without AO approval. Document training via site mobile device training records or the User Agreement. This is a UBE control.  

Note: It is not possible for the MDM to enforce this control when the Android device is deployed in COPE mode.