STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 5 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to STIGs

Google Android 13 COBO Security Technical Implementation Guide

Archived

Version

V2R3

Release Date

Aug 19, 2025

SCAP Benchmark ID

Google_Android_13_COBO_STIG

Total Checks

32

Tags

mobile
CAT I: 2CAT II: 25CAT III: 5

This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Export CKLExport CSVExport JSON

Checks (32)

V-254733MEDIUMGoogle Android 13 must be configured to enable audit logging.V-254734MEDIUMGoogle Android 13 must be configured to enforce a minimum password length of six characters.V-254735MEDIUMGoogle Android 13 must be configured to not allow passwords that include more than four repeating or sequential characters.V-254736MEDIUMGoogle Android 13 must be configured to enable a screen-lock policy that will lock the display after a period of inactivity.V-254737MEDIUMGoogle Android 13 must be configured to lock the display after 15 minutes (or less) of inactivity.V-254738MEDIUMGoogle Android 13 must be configured to not allow more than 10 consecutive failed authentication attempts.V-254739MEDIUMGoogle Android 13 must be configured to enforce an application installation policy by specifying one or more authorized application repositories, including [selection: DOD-approved commercial app repository, MDM server, mobile application store].V-254740MEDIUMGoogle Android 13 must be configured to enforce an application installation policy by specifying an application allowlist that restricts applications by the following characteristics: [selection: list of digital signatures, cryptographic hash values, names, application version].V-254741MEDIUMGoogle Android 13 allowlist must be configured to not include applications with the following characteristics: 1. Back up mobile device (MD) data to non-DOD cloud servers (including user and application access to cloud backup services); 2. Transmit MD diagnostic data to non-DOD servers; 3. Voice assistant application if available when MD is locked; 4. Voice dialing application if available when MD is locked; 5. Allows synchronization of data or applications between devices associated with user; and 6. Allows unencrypted (or encrypted but not FIPS 140-2 validated) data sharing with other MDs or printers.V-254742MEDIUMGoogle Android 13 must be configured to not display the following (work profile) notifications when the device is locked: [selection: a. email notifications b. calendar appointments c. contact associated with phone call notification d. text message notification e. other application-based notifications f. all notifications].V-254743MEDIUMGoogle Android 13 must be configured to disable trust agents.V-254744MEDIUMGoogle Android 13 must be configured to disable developer modes.V-254745LOWGoogle Android 13 must be configured to display the DOD advisory warning message at startup or each time the user unlocks the device.V-254746MEDIUMGoogle Android 13 must be configured to generate audit records for the following auditable events: Detected integrity violations.V-254747MEDIUMGoogle Android 13 must be configured to disable USB mass storage mode.V-254748MEDIUMGoogle Android 13 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.V-254749MEDIUMGoogle Android 13 must be configured to not allow backup of [all applications, configuration data] to remote systems.V-254750MEDIUMGoogle Android 13 must be configured to disable multiuser modes.V-254751LOWGoogle Android 13 must be configured to disable Bluetooth or configured via User Based Enforcement (UBE) to allow Bluetooth for only Headset Profile (HSP), Hands-Free Profile (HFP), and Serial Port Profile (SPP).V-254752MEDIUMGoogle Android 13 must be configured to disable ad hoc wireless client-to-client connection capability.V-254753MEDIUMGoogle Android 13 users must complete required training.V-254754MEDIUMGoogle Android 13 must be configured to enforce that Wi-Fi Sharing is disabled.V-254755MEDIUMGoogle Android 13 must have the DOD root and intermediate PKI certificates installed.V-254756MEDIUMThe Google Android 13 work profile must be configured to enforce the system application disable list.V-254757MEDIUMGoogle Android 13 must be configured to disallow configuration of date and time.V-254758HIGHAndroid 13 devices must have the latest available Google Android 13 operating system installed.V-254759LOWAndroid 13 devices must be configured to disable the use of third-party keyboards.V-254760LOWAndroid 13 devices must be configured to enable Common Criteria Mode (CC Mode).V-254761MEDIUMGoogle Android 13 must be configured to disable all data signaling over [assignment: list of externally accessible hardware ports (for example, USB)].V-254762MEDIUMThe Google Android 13 must allow only the administrator (EMM) to install/remove DOD root and intermediate PKI certificates.V-254763LOWGoogle Android 13 must allow only the Administrator (MDM) to perform the following management function: Disable Phone Hub.V-276958HIGHAll Google Android 13 installations must be removed.