STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Google Android 15 COPE Security Technical Implementation Guide

V-276991

CAT II (Medium)

Google Android 15 must disable the user's ability to wipe the device.

Rule ID

SV-276991r1188338_rule

STIG

Google Android 15 COPE Security Technical Implementation Guide

Version

V1R4

CCIs

CCI-000366

Discussion

This feature must be disabled to comply with DOD electronic records retention requirements for mobile devices. Otherwise, mobile device users could wipe the device, which would violate DOD policy. SFR ID: FMT_MOF_EXT.1.2 #47

Check Content

Verify the Android device user has been trained to not perform a factory wipe without the approval of the authorizing official (AO). Confirm by reviewing the site's mobile device training records or the User Agreement. This is a User-Based Enforcement (UBE) control.  

If the Android device user has not been trained to not perform a factory wipe without the approval of the AO, this is a finding.

Fix Text

Train users to not perform a factory reset on the Android device without AO approval. Document training via the site's mobile device training records or the User Agreement. This is a UBE control.  

Note: It is not possible for the MDM to enforce this control when the Android device is deployed in COPE mode.