Skip to content
Catalogs
XCCDF
Google Android 13 MDFPP 3.3 BYOAD Security Technical Implementation Guide
PP-BYO-000080
The Google Android 13 BYOAD must be configured to either disable access to DOD data and IT systems and user accounts or wipe the work profile if the EMM system detects native security controls are disabled.
The Google Android 13 BYOAD must be configured to either disable access to DOD data and IT systems and user accounts or wipe the work profile if the EMM system detects native security controls are disabled. An XCCDF Rule
The Google Android 13 BYOAD must be configured to either disable access to DOD data and IT systems and user accounts or wipe the work profile if the EMM system detects native security controls are disabled.
Medium Severity
<VulnDiscussion>Examples of indicators that the native device security controls have been disabled include jailbroken or rooted devices.
When a BYOAD is out of compliance, DOD data and apps must be removed to protect against compromise of sensitive DOD information.
Note: The site should review DOD and local data retention policies before wiping the work profile of a BYOAD device.
Reference: DOD policy "Use of Non-Government Mobile Devices" (3.b.(4) 3.b.(5)i).
SFR ID: FMT_SMF_EXT.1.1 #47</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>