![]() ![]() LG Android 6.x must not allow protocols supporting wireless remote access connections: USB tethering. The USB host storage feature allows the device to connect to select USB devices (e.g., USB flash drives, USB mouse, USB keyboard) using a micro USB to USB adapter cable. LG Android 6.x must implement the management setting: Disable USB host storage. Some Bluetooth profiles provide the capability for remote transfer of sensitive DoD data without encryption or otherwise do not meet DoD IT security policies and therefore should be disabled. LG Android 6.x must be configured to implement the management setting: Disable Bluetooth Data Transfer. Many mobile devices display notifications on the lock screen so that users can obtain relevant information in a timely manner without having to frequently unlock the phone to determine if there. LG Android 6.x must not display notifications when the device is locked. Requiring all authorized applications to be in an application whitelist prevents the execution of any applications (e.g., unauthorized, malicious) that are not part of the whitelist. LG Android 6.x must enforce an application installation policy by specifying an application whitelist. LG Android 6.x must enforce an application installation policy by specifying one or more authorized application repositories by disabling Google Play.įorcing all applications to be installed from authorized application repositories can prevent unauthorized and malicious applications from being installed and executed on mobile devices. Other biometrics and token-based systems are feasible as well. Many mobile devices now permit a user to unlock the user's device by presenting a fingerprint to an embedded fingerprint reader. LG Android 6.x must disable authentication mechanisms providing user access to protected data other than a Password Authentication Factor: Disable Smart Lock. Data transfer is not encrypted using FIPS-validated encryption mechanisms. LG Android 6.x must be configured to implement the management settings: Disable Android Beam.Īndroid Beam provides the capability for Android devices to transfer data between them. Synchronization of data between devices associated with one user permits a user of a mobile operating system device to transition user activities from one device to another. LG Android 6.x must not allow Google Auto sync. With this feature enabled, sensitive information will be backed up to the manufacturer's servers and. LG Android 6.x must implement the management setting: Disallow addition of Google Accounts (for Work Profile).Ī Google account may gather a user's information, such as PII, or sensitive documents. All updates should be controlled by the system administrator to ensure configuration control of the security. LG Android 6.x must be configured to disable download mode.ĭownload mode allows the firmware of the device to be flashed (updated) by the user. Failure to specify which applications are approved could allow unauthorized and malicious applications to be downloaded. This setting enables an application whitelist in the Work Profile. This requirement is only valid for activation type COPE#2. LG Android 6.x must implement the management setting: list approved apps on the Whitelisted Android Apps (for Work Profile). If data at rest is unencrypted, it is vulnerable to. The mobile operating system must ensure the data being written to the mobile device's removable media is protected from unauthorized access. LG Android 6.x must protect data at rest on removable storage media. If data at rest is unencrypted, it is vulnerable. The mobile operating system must ensure the data being written to the mobile device's built-in storage media is protected from unauthorized access. LG Android 6.x must protect data at rest on built-in storage media. Passwords may also be a source of entropy for generation of. Passwords provide a form of access control that prevents unauthorized individuals from accessing computing resources and sensitive data. LG Android 6.x must require a valid password be successfully entered before the mobile device data is unencrypted. If CC mode is not implemented, DoD data is more at risk of being compromised, and. LG Android 6.x must implement the management setting: Enable CC mode.ĬC mode implements several security controls required by the Mobile Device Functional Protection Profile (MDFPP). The LG Android OS 6 is not authorized within the DoD. The LG Android OS 6 is no longer supported by LG and therefore, may contain security vulnerabilities. Only authorized versions of the LG Android OS must be used. Findings (MAC III - Administrative Sensitive) Finding ID
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |