AIOS-14-001100 - The mobile operating system whitelist must be configured to not include applications with the following characteristics: voice dialing application if available when MD is locked.


Requiring all authorized applications to be in an application whitelist prevents the execution of any applications (e.g., unauthorized, malicious) that are not part of the whitelist. Failure to configure an application whitelist properly could allow unauthorized and malicious applications to be downloaded, installed, and executed on the mobile device, causing a compromise of DoD data accessible by these applications. Applications with the listed characteristics have features that can cause the compromise of sensitive DoD data or have features with no known application in the DoD environment.

Application note: The application whitelist, in addition to controlling the installation of applications on the MD, must control user access/execution of all core and preinstalled applications, or the MD must provide an alternate method of restricting user access/execution to core and pre-installed applications.

Core application: Any application integrated into the OS by the OS or MD vendors.

Pre-installed application: Additional non-core applications included in the OS build by the OS vendor, MD vendor, or wireless carrier.


NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.


Install a configuration profile to disable Voice Control while the device is locked.

See Also

Item Details

References: CAT|II, CCI|CCI-000366, CCI|CCI-001806, Rule-ID|SV-228736r561031_rule, STIG-ID|AIOS-14-001100, Vuln-ID|V-228736

Plugin: MDM

Control ID: 7616eb4c42ce705dc8443c16133a6d19676c2dbf7009aee70452fcfc3217b363