STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Google Android 14 BYOAD Security Technical Implementation Guide

V-260068

CAT II (Medium)

The Google Android 14 BYOAD must be configured so that the work profile is removed if the device is no longer receiving security or software updates.

Rule ID

SV-260068r948409_rule

STIG

Google Android 14 BYOAD Security Technical Implementation Guide

Version

V1R1

CCIs

CCI-000366

Discussion

When a BYOAD is out of compliance, DOD data and apps must be removed to protect against compromise of sensitive DOD information. Reference: DOD policy "Use of Non-Government Mobile Devices" (3.b.(1)ii). SFR ID: FMT_SMF_EXT.1.1 #47

Check Content

Verify the EMM system is configured to wipe the work profile if the Google Android 14 BYOAD is no longer receiving security or software updates. The exact procedure will depend on the EMM system used at the site.

If the EMM system is not configured to wipe the work profile if the Google Android 14 BYOAD is no longer receiving security or software updates, this is a finding.

Fix Text

Configure the EMM system so the work profile is removed if the Google Android 14 BYOAD is no longer receiving security or software updates. The exact procedure will depend on the EMM system used at the site.