I - Mission Critical Public
Rules and Groups employed by this XCCDF Profile
-
PP-BYO-000020
<GroupDescription></GroupDescription>Group -
The EMM system supporting the Google Android 14 BYOAD must be configured for autonomous monitoring, compliance, and validation to ensure security/configuration settings of mobile devices do not deviate from the approved configuration baseline.
<VulnDiscussion>DOD policy requires BYOAD devices with DOD data be managed by a DOD MDM server, MAM server, or VMI system. This ensures the d...Rule Medium Severity -
PP-BYO-000030
<GroupDescription></GroupDescription>Group -
The EMM system supporting the Google Android 14 BYOAD must be configured to initiate autonomous monitoring, compliance, and validation prior to granting the Google Android 14 BYOAD access to DOD information and IT resources.
<VulnDiscussion>DOD policy requires BYOAD devices with DOD data be managed by a DOD MDM server, MAM server, or VMI system. This ensures the d...Rule Medium Severity -
PP-BYO-000040
<GroupDescription></GroupDescription>Group -
The EMM system supporting the Google Android 14 BYOAD must be configured to detect if the Google Android 14 BYOAD native security controls are disabled.
<VulnDiscussion>Examples of indicators that the native device native security controls have been disabled include jailbroken or rooted device...Rule Medium Severity -
PP-BYO-000050
<GroupDescription></GroupDescription>Group -
The EMM system supporting the Google Android 14 BYOAD must be configured to detect if known malicious applications, blocked, or prohibited applications are installed on the Google Android 14 BYOAD (DOD-managed segment only).
<VulnDiscussion>DOD policy requires BYOAD devices with DOD data be managed by a DOD MDM server, MAM server, or VMI system. This ensures the d...Rule Medium Severity -
PP-BYO-000070
<GroupDescription></GroupDescription>Group -
The EMM detection/monitoring system must use continuous monitoring of enrolled Google Android 14 BYOAD.
<VulnDiscussion>DOD policy requires BYOAD devices with DOD data be managed by a DOD MDM server, MAM server, or VMI system. This ensures the d...Rule Medium Severity -
PP-BYO-000080
<GroupDescription></GroupDescription>Group -
The Google Android 14 BYOAD must be configured to either disable access to DOD data and IT systems and user accounts or wipe the work profile if the EMM system detects that native security controls are disabled.
<VulnDiscussion>Examples of indicators that the native device security controls have been disabled include jailbroken or rooted devices. Whe...Rule Medium Severity -
PP-BYO-000090
<GroupDescription></GroupDescription>Group -
The Google Android 14 BYOAD must be configured to either disable access to DOD data and IT systems and user accounts or wipe the work profile if the EMM system detects the Google Android 14 BYOAD device has known malicious, blocked, or prohibited applications, or configured to access nonapproved third-party applications stores in the work profile.
<VulnDiscussion>When a BYOAD is out of compliance, DOD data and apps must be removed to protect against compromise of sensitive DOD informati...Rule Medium Severity -
PP-BYO-000100
<GroupDescription></GroupDescription>Group -
The Google Android 14 BYOAD must be configured so that the work profile is removed if the device is no longer receiving security or software updates.
<VulnDiscussion>When a BYOAD is out of compliance, DOD data and apps must be removed to protect against compromise of sensitive DOD informati...Rule Medium Severity -
PP-BYO-000110
<GroupDescription></GroupDescription>Group -
The Google Android 14 BYOAD and DOD enterprise must be configured to limit access to only AO-approved, corporate-owned enterprise IT resources.
<VulnDiscussion>Note: IT resources includes DOD networks and applications (for example, DOD email). The System Administrator must have the c...Rule Medium Severity -
PP-BYO-000200
<GroupDescription></GroupDescription>Group -
The EMM system supporting the Google Android 14 BYOAD must be NIAP validated (included on the NIAP list of compliant products or products in evaluation) unless the DOD CIO has granted an Approved Exception to Policy (E2P).
<VulnDiscussion>Note: For a VMI solution, both the client and server must be NIAP compliant. Nonapproved EMM systems may not include suffici...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.