STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 5 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Samsung Android OS 15 with Knox 3.x COPE Security Technical Implementation Guide

V-277017

CAT II (Medium)

Samsung Android 15 must disable the ability of the user to wipe the device.

Rule ID

SV-277017r1183660_rule

STIG

Samsung Android OS 15 with Knox 3.x COPE Security Technical Implementation Guide

Version

V1R3

CCIs

CCI-000366

Discussion

This feature must be disabled to comply with DOD electronic records retention requirements for mobile devices. Otherwise, mobile device users could wipe the device, which would violate DOD policy. SFR ID: FMT_MOF_EXT.1.2 #47

Check Content

Verify, the Android device user has been trained to not perform a factory wipe without the approval of the authorizing official (AO). Conform by reviewing site mobile device training records or the User Agreement. This is a User-Based Enforcement (UBE) control.  

If the Android device user has not been trained to not perform a factory wipe without the approval of the AO, this is a finding.

Fix Text

Train users to not perform a factory reset on the Android device without AO approval. Document training via site mobile device training records or the User Agreement. This is a User-Based Enforcement (UBE) control.  

Note: It is not possible for the MDM to enforce this control when the Android device is deployed in COPE mode.