STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Samsung Android 16 COPE Security Technical Implementation Guide

V-276648

CAT II (Medium)

Samsung Android 16 must disable the ability of the user to wipe the device.

Rule ID

SV-276648r1183743_rule

STIG

Samsung Android 16 COPE Security Technical Implementation Guide

Version

V1R2

CCIs

CCI-000366

Discussion

This feature must be disabled in order to comply with DOD electronic records retention requirements for mobile devices. Otherwise, mobile device users could wipe the device, which would violate DOD policy. SFR ID: FMT_MOF_EXT.1.2 #47

Check Content

Verify the Android device user has been trained to not perform a factory wipe without the approval of the authorizing official (AO). Confirm by reviewing the site's mobile device training records or the User Agreement. This is a User-Based Enforcement (UBE) control.  

If the Android device user has not been trained to not perform a factory wipe without the approval of the AO, this is a finding.

Fix Text

Train users to not perform a factory reset on the Android device without AO approval. Document training via the site's mobile device training records or the User Agreement. This is a User-Based Enforcement (UBE) control.  

Note: It is not possible for the MDM to enforce this control when the Android device is deployed in COPE mode.