Skip to content

Samsung Android OS 15 with Knox 3.x COPE Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • PP-MDF-333130

    Group
  • Samsung Android must be configured to disable developer modes.

    Developer modes expose features of the MOS that are not available during standard operation. An adversary may leverage a vulnerability inherent in a developer mode to compromise the confidentiality...
    Rule Medium Severity
  • PP-MDF-333160

    Group
  • Samsung Android must be configured to display the DOD advisory warning message at startup or each time the user unlocks the device.

    Before granting access to the system, the mobile operating system is required to display the DOD-approved system use notification message or banner that provides privacy and security notices consis...
    Rule Low Severity
  • PP-MDF-333230

    Group
  • Samsung Android must be configured to disable USB mass storage mode.

    USB mass storage mode enables the transfer of data and software from one device to another. This software can include malware. When USB mass storage is enabled on a mobile device, it becomes a pote...
    Rule Medium Severity
  • PP-MDF-333240

    Group
  • PP-MDF-333250

    Group
  • PP-MDF-331080

    Group
  • Samsung Android must not accept the certificate when it cannot establish a connection to determine the validity of a certificate.

    Certificate-based security controls depend on the ability of the system to verify the validity of a certificate. If the MOS were to accept an invalid certificate, it could take unauthorized actions...
    Rule Low Severity
  • PP-MDF-333024

    Group
  • Samsung Android must be configured to not allow backup of all applications, configuration data to remote systems. (This requirement applies to the Work Profile for COPE.) - Disable Data Sync Framework.

    Backups to remote systems (including cloud backup) can leave data vulnerable to breach on the external systems, which often offer less protection than the MOS. Where the remote backup involves a cl...
    Rule Medium Severity
  • PP-MDF-333260

    Group
  • Samsung Android must be configured to enable authentication of personal hotspot connections to the device using a preshared key.

    If no authentication is required to establish personal hotspot connections (Wi-Fi and Bluetooth), an adversary may be able to use that device to perform attacks on other devices or networks without...
    Rule Medium Severity
  • PP-MDF-333280

    Group
  • Samsung Android's Work profile must be configured to disable exceptions to the access control policy that prevent application processes and groups of application processes from accessing all data stored by other application processes and groups of application processes.

    App data sharing gives apps the ability to access the data of other apps for enhanced user functionality. However, sharing also poses a significant risk that unauthorized users or apps will obtain ...
    Rule Medium Severity
  • PP-MDF-333320

    Group
  • PP-MDF-333330

    Group
  • Samsung Android must be configured to disable ad hoc wireless client-to-client connection capability.

    Ad hoc wireless client-to-client connections allow mobile devices to communicate with each other directly, circumventing network security policies and making the traffic invisible. This could allow...
    Rule Medium Severity
  • PP-MDF-333350

    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules