STIGhubSTIGhub
STIGsSearchCompareAbout

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to STIGs

Samsung Android OS 13 with Knox 3.x COPE Security Technical Implementation Guide

Version

V2R3

Release Date

Aug 22, 2025

SCAP Benchmark ID

SS_Android_OS_13_KPE_3-x_COPE_STIG

Total Checks

31

Tags

mobile
CAT I: 3CAT II: 24CAT III: 4

This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Export CKLExport CSVExport JSONDownload STIG ZIP

Checks (31)

V-255137MEDIUMSamsung Android must be enrolled as a COPE device.V-255138LOWSamsung Android must be configured to display the DOD advisory warning message at startup or each time the user unlocks the device.V-255139MEDIUMSamsung Android must be configured to not allow passwords that include more than four repeating or sequential characters.V-255140MEDIUMSamsung Android must be configured to enable a screen-lock policy that will lock the display after a period of inactivity.V-255141MEDIUMSamsung Android must be configured to enforce a minimum password length of six characters.V-255142MEDIUMSamsung Android must be configured to not allow more than 10 consecutive failed authentication attempts.V-255143MEDIUMSamsung Android must be configured to lock the display after 15 minutes (or less) of inactivity.V-255144MEDIUMSamsung Android must be configured to disable authentication mechanisms providing user access to protected data other than a Password Authentication Factor, including face recognition.V-255145MEDIUMSamsung Android must be configured to enable a screen-lock policy that will lock the display after a period of inactivity - Disable trust agents.V-255146MEDIUMSamsung Android must be configured to disable developer modes.V-255147LOWSamsung Android must be configured to disable all Bluetooth profiles except for HSP (Headset Profile), HFP (Hands-Free Profile), SPP (Serial Port Profile), A2DP (Advanced Audio Distribution Profile), AVRCP (Audio/Video Remote Control Profile), and PBAP (Phone Book Access Profile).V-255148HIGHSamsung Android must be configured to enable encryption for data at rest on removable storage media or, alternately, the use of removable storage media must be disabled.V-255149MEDIUMSamsung Android must be configured to disable USB mass storage mode.V-255150MEDIUMSamsung Android must be configured to not allow backup of all applications and configuration data to locally connected systems.V-255151MEDIUMSamsung Android must be configured to enable authentication of personal hotspot connections to the device using a pre-shared key.V-255152MEDIUMSamsung Android must be configured to disallow configuration of the device's date and time.V-255153MEDIUMSamsung Android's Work profile must have the DOD root and intermediate PKI certificates installed.V-255154MEDIUMSamsung Android's Work profile must be configured to enforce an application installation policy by specifying an application allowlist that restricts applications by the following characteristics: Names.V-255155MEDIUMSamsung Android's Work profile must be configured to not allow installation of applications with the following characteristics: - Back up MD data to non-DOD cloud servers (including user and application access to cloud backup services); - Transmit MD diagnostic data to non-DOD servers; - Voice assistant application if available when MD is locked; - Voice dialing application if available when MD is locked; - Allows synchronization of data or applications between devices associated with user; and - Allows unencrypted (or encrypted but not FIPS 140-2 validated) data sharing with other MDs or printers.V-255156MEDIUMSamsung Android must be configured to not display the following (Work Environment) notifications when the device is locked: All notifications.V-255157MEDIUMSamsung Android's Work profile must be configured to enable audit logging.V-255158MEDIUMSamsung Android's Work profile must be configured to prevent users from adding personal email accounts to the work email app.V-255159MEDIUMSamsung Android's Work profile must be configured to not allow backup of all applications, configuration data to remote systems. - Disable Data Sync Framework.V-255160MEDIUMSamsung Android's Work profile must be configured to disable exceptions to the access control policy that prevent application processes, and groups of application processes from accessing all data stored by other application processes, and groups of application processes.V-255161MEDIUMSamsung Android's Work profile must allow only the Administrator (management tool) to perform the following management function: Install/remove DOD root and intermediate PKI certificates.V-255162MEDIUMSamsung Android must be configured to enforce an application installation policy by specifying one or more authorized application repositories, including DOD-approved commercial app repository, management tool server, or mobile application store.V-255163LOWSamsung Android's Work profile must be configured to enable Common Criteria (CC) mode.V-255164LOWSamsung Android must not accept the certificate when it cannot establish a connection to determine the validity of a certificate.V-255165MEDIUMSamsung Android device users must complete required training.V-255166HIGHThe Samsung Android device must have the latest available Samsung Android operating system (OS) installed.V-276998HIGHAll Samsung Android 13 installations must be removed.