Skip to content

III - Administrative Public

Rules and Groups employed by this XCCDF Profile

  • PP-MDF-323130

    Group
  • Google Android 12 must be configured to disable developer modes.

    Developer modes expose features of the mobile operating system (MOS) that are not available during standard operation. An adversary may leverage a vulnerability inherent in a developer mode to comp...
    Rule Medium Severity
  • PP-MDF-323160

    Group
  • Google Android 12 must be configured to display the DoD advisory warning message at startup or each time the user unlocks the device.

    Before granting access to the system, the mobile operating system is required to display the DoD-approved system use notification message or banner that provides privacy and security notices consis...
    Rule Low Severity
  • PP-MDF-323170

    Group
  • Google Android 12 must be configured to generate audit records for the following auditable events: detected integrity violations.

    Audit logs enable monitoring of security-relevant events and subsequent forensics when breaches occur. They help identify attacks so that breaches can be prevented or limited in their scope. They f...
    Rule Medium Severity
  • PP-MDF-323230

    Group
  • Google Android 12 must be configured to disable USB mass storage mode.

    USB mass storage mode enables the transfer of data and software from one device to another. This software can include malware. When USB mass storage is enabled on a mobile device, it becomes a pote...
    Rule Medium Severity
  • PP-MDF-323240

    Group
  • Google Android 12 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.

    Data on mobile devices is protected by numerous mechanisms, including user authentication, access control, and cryptography. When the data is backed up to an external system (either locally connect...
    Rule Medium Severity
  • PP-MDF-323250

    Group
  • Google Android 12 must be configured to not allow backup of [all applications, configuration data] to remote systems.

    Backups to remote systems (including cloud backup) can leave data vulnerable to breach on the external systems, which often offer less protection than the mobile operating system (MOS). Where the r...
    Rule Medium Severity
  • PP-MDF-323280

    Group
  • Google Android 12 must be configured to disable exceptions to the access control policy that prevent [selection: application processes, groups of application processes] from accessing [selection: all, private] data stored by other [selection: application processes, groups of application processes].

    App data sharing gives apps the ability to access the data of other apps for enhanced user functionality. However, sharing also poses a significant risk that unauthorized users or apps will obtain ...
    Rule Medium Severity
  • PP-MDF-323290

    Group
  • Google Android 12 must be configured to disable multiuser modes.

    Multiuser mode allows multiple users to share a mobile device by providing a degree of separation between user data. To date, no mobile device with multiuser mode features meets DoD requirements fo...
    Rule Medium Severity
  • PP-MDF-323320

    Group
  • Google Android 12 must be configured to disable Bluetooth or configured via User Based Enforcement (UBE) to allow Bluetooth for only Headset Profile (HSP), Hands-Free Profile (HFP), and Serial Port Profile (SPP).

    Some Bluetooth profiles provide the capability for remote transfer of sensitive DoD data without encryption or otherwise do not meet DoD IT security policies and therefore must be disabled. SFR ID...
    Rule Low Severity
  • PP-MDF-323330

    Group
  • Google Android 12 must be configured to disable ad hoc wireless client-to-client connection capability.

    Ad hoc wireless client-to-client connections allow mobile devices to communicate with each other directly, circumventing network security policies and making the traffic invisible. This could allow...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules