II - Mission Support Sensitive
Rules and Groups employed by this XCCDF Profile
-
PP-MDF-323130
Group -
Google Android 12 must be configured to disable developer modes.
Developer modes expose features of the mobile operating system (MOS) that are not available during standard operation. An adversary may leverage a vulnerability inherent in a developer mode to comp...Rule Medium Severity -
PP-MDF-323160
Group -
Google Android 12 must be configured to display the DoD advisory warning message at startup or each time the user unlocks the device.
Before granting access to the system, the mobile operating system is required to display the DoD-approved system use notification message or banner that provides privacy and security notices consis...Rule Low Severity -
PP-MDF-323170
Group -
Google Android 12 must be configured to generate audit records for the following auditable events: detected integrity violations.
Audit logs enable monitoring of security-relevant events and subsequent forensics when breaches occur. They help identify attacks so that breaches can be prevented or limited in their scope. They f...Rule Medium Severity -
PP-MDF-323230
Group -
Google Android 12 must be configured to disable USB mass storage mode.
USB mass storage mode enables the transfer of data and software from one device to another. This software can include malware. When USB mass storage is enabled on a mobile device, it becomes a pote...Rule Medium Severity -
PP-MDF-323240
Group -
Google Android 12 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.
Data on mobile devices is protected by numerous mechanisms, including user authentication, access control, and cryptography. When the data is backed up to an external system (either locally connect...Rule Medium Severity -
PP-MDF-323250
Group -
Google Android 12 must be configured to not allow backup of [all applications, configuration data] to remote systems.
Backups to remote systems (including cloud backup) can leave data vulnerable to breach on the external systems, which often offer less protection than the mobile operating system (MOS). Where the r...Rule Medium Severity -
PP-MDF-323290
Group -
Google Android 12 must be configured to disable multiuser modes.
Multiuser mode allows multiple users to share a mobile device by providing a degree of separation between user data. To date, no mobile device with multiuser mode features meets DoD requirements fo...Rule Medium Severity -
PP-MDF-323320
Group -
Google Android 12 must be configured to disable Bluetooth or configured via User Based Enforcement (UBE) to allow Bluetooth for only Headset Profile (HSP), Hands-Free Profile (HFP), and Serial Port Profile (SPP).
Some Bluetooth profiles provide the capability for remote transfer of sensitive DoD data without encryption or otherwise do not meet DoD IT security policies and therefore must be disabled. SFR ID...Rule Low Severity -
PP-MDF-323330
Group -
Google Android 12 must be configured to disable ad hoc wireless client-to-client connection capability.
Ad hoc wireless client-to-client connections allow mobile devices to communicate with each other directly, circumventing network security policies and making the traffic invisible. This could allow...Rule Medium Severity -
PP-MDF-990000
Group -
Google Android 12 users must complete required training.
The security posture of Google devices requires the device user to configure several required policy rules on their device. User-Based Enforcement (UBE) is required for these controls. In addition,...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.