STIGhubSTIGhub
STIGsSearchCompareAbout

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • VPAT
  • DISA STIG Library
STIGs updated 1 hour ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to STIGs

Google Android 14 COPE Security Technical Implementation Guide

Version

V2R4

Release Date

Feb 12, 2026

SCAP Benchmark ID

Google_Android_14_COPE_STIG

Total Checks

43

Tags

mobile
CAT I: 1CAT II: 34CAT III: 8

This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Export CKLExport CSVExport JSONDownload STIG ZIP

Checks (43)

V-258408MEDIUMGoogle Android 14 must be configured to enable audit logging.V-258409MEDIUMGoogle Android 14 must be configured to enforce a minimum password length of six characters.V-258410MEDIUMGoogle Android 14 must be configured to not allow passwords that include more than four repeating or sequential characters.V-258412MEDIUMGoogle Android 14 must be configured to lock the display after 15 minutes (or less) of inactivity.V-258413MEDIUMGoogle Android 14 must be configured to not allow more than 10 consecutive failed authentication attempts.V-258414MEDIUMGoogle Android 14 must be configured to enforce an application installation policy by specifying one or more authorized application repositories, including [selection: DOD-approved commercial app repository, MDM server, mobile application store].V-258415MEDIUMGoogle Android 14 must be configured to enforce an application installation policy by specifying an application allowlist that restricts applications by the following characteristics: [selection: list of digital signatures, cryptographic hash values, names, application version].V-258416MEDIUMGoogle Android 14 allowlist must be configured to not include applications with the following characteristics: - Backs up mobile device (MD) data to non-DOD cloud servers (including user and application access to cloud backup services); - Transmits MD diagnostic data to non-DOD servers; - Voice assistant application if available when MD is locked; - Voice dialing application if available when MD is locked; - Allows synchronization of data or applications between devices associated with user; - Payment processing; - Allows unencrypted (or encrypted but not FIPS 140-2/140-3 validated) data sharing with other MDs or printers; - Backs up own data to a remote system; - Renders TV shows and movies.V-258417MEDIUMGoogle Android 14 must be configured to not display the following (work profile) notifications when the device is locked: [selection: a. email notifications b. calendar appointments c. contact associated with phone call notification d. text message notification e. other application-based notifications f. all notifications].V-258418MEDIUMGoogle Android 14 must be configured to disable trust agents.V-258419MEDIUMGoogle Android 14 must be configured to disable developer modes.V-258420LOWGoogle Android 14 must be configured to display the DOD advisory warning message at startup or each time the user unlocks the device.V-258421MEDIUMGoogle Android 14 must be configured to generate audit records for the following auditable events: Detected integrity violations.V-258422MEDIUMGoogle Android 14 must be configured to disable USB mass storage mode.V-258423MEDIUMGoogle Android 14 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.V-258424MEDIUMGoogle Android 14 must be configured to not allow backup of [all applications, configuration data] to remote systems.V-258425MEDIUMGoogle Android 14 must be configured to disable exceptions to the access control policy that prevent [selection: application processes, groups of application processes] from accessing [selection: all, private] data stored by other [selection: application processes, groups of application processes].V-258426MEDIUMGoogle Android 14 must be configured to disable multiuser modes.V-258427LOWGoogle Android 14 must be configured to disable all Bluetooth profiles except for HSP (Headset Profile), HFP (Hands-Free Profile), SPP (Serial Port Profile), A2DP (Advanced Audio Distribution Profile), AVRCP (Audio/Video Remote Control Profile), and PBAP (Phone Book Access Profile).V-258428MEDIUMGoogle Android 14 must be configured to disable ad hoc wireless client-to-client connection capability.V-258429MEDIUMGoogle Android 14 users must complete required training.V-258430MEDIUMGoogle Android 14 must be configured to enforce that Wi-Fi Sharing is disabled.V-258431MEDIUMGoogle Android 14 must have the DOD root and intermediate PKI certificates installed.V-258432MEDIUMThe Google Android 14 work profile must be configured to prevent users from adding personal email accounts to the work email app.V-258433MEDIUMThe Google Android 14 work profile must be configured to enforce the system application disable list.V-258434MEDIUMGoogle Android 14 must be provisioned as a fully managed device and configured to create a work profile.V-258435MEDIUMThe Google Android 14 work profile must be configured to disable automatic completion of workspace internet browser text input.V-258436MEDIUMThe Google Android 14 work profile must be configured to disable the autofill services.V-258437MEDIUMGoogle Android 14 must be configured to disallow configuration of date and time.V-258438HIGHAndroid 14 devices must have the latest available Google Android 14 operating system installed.V-258439LOWAndroid 14 devices must be configured to disable the use of third-party keyboards.V-258440LOWAndroid 14 devices must be configured to enable Common Criteria Mode (CC Mode).V-258441MEDIUMGoogle Android 14 must be configured to disable all data signaling over [assignment: list of externally accessible hardware ports (for example, USB)].V-258442MEDIUMThe Google Android 14 must allow only the administrator (EMM) to install/remove DOD root and intermediate PKI certificates.V-258443LOWGoogle Android 14 must allow only the administrator (MDM) to perform the following management function: Disable Phone Hub.V-276973MEDIUMGoogle Android 14 must disable the user's ability to wipe the device.V-276974LOWGoogle Android 14 must disable the use of assistants (including Google Assistant) unless required to meet Section 508 compliance requirements.V-276975LOWGoogle Android 14 must disable wireless printing.V-276976LOWGoogle Android 14 must disable screen capture.V-276977MEDIUMGoogle Android 14 devices must have a Mobile Threat Detection (MTD) app installed.V-276978MEDIUMGoogle Android 14 must implement the management setting: disable Camera.V-278363MEDIUMThe Google Android device must be configured to disable Wi-Fi Aware for Work Profile apps.V-278364MEDIUMGoogle Android must implement the management setting: disable the Bluetooth radio.