GOOG-11-000800 - Google Android 11 must be configured to enforce an application installation policy by specifying one or more authorized application repositories, including [selection: DoD-approved commercial app repository, EMM server, mobile application store].

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Forcing all applications to be installed from authorized application repositories can prevent unauthorized and malicious applications from being installed and executed on mobile devices. Allowing such installations and executions could cause a compromise of DoD data accessible by these unauthorized/malicious applications.

SFR ID: FMT_SMF_EXT.1.1 #8a

Solution

Configure the Google Android 11 device to disable unauthorized application repositories.

On the EMM Console:
1. Open 'Set user restrictions'.
2. Toggle 'Disallow install unknown sources' to On.
3. Toggle 'Disallow installs from unknown sources globally' to On.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Google_Android_11_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000366, CCI|CCI-001806, Rule-ID|SV-228610r505829_rule, STIG-ID|GOOG-11-000800, Vuln-ID|V-228610

Plugin: MDM

Control ID: 22eacfe2b0d732fe84953a45259a17fa340f3d71c44c524e429e4e91ad6acf30