GOOG-11-004500 - Google Android 11 must be configured to disable exceptions to the access control policy that prevents application processes from accessing all data stored by other application processes.

Information

App data sharing gives apps the ability to access the data of other apps for enhanced user functionality. However, sharing also poses a significant risk that unauthorized users or apps will obtain access to DoD sensitive information. To mitigate this risk, there are data sharing restrictions. If a user is allowed to make exceptions to the data sharing restriction policy, the user could enable unauthorized sharing of data, leaving it vulnerable to breach. Limiting the granting of exceptions to either the Administrator or common application developer mitigates this risk.

Copy/paste of data between applications in different application processes or groups of application processes is considered an exception to the access control policy and therefore, the Administrator must be able to enable/disable the feature. Other exceptions include allowing any data or application sharing between process groups.

SFR ID: FMT_SMF_EXT.1.1 #42, FDP_ACF_EXT.1.2

Solution

Configure the Google Android 11 device to enable the access control policy that prevents [selection: application processes, groups of application processes] from accessing [selection: all, private] data stored by other [selection: application processes, groups of application processes].

NOTE: All application data is inherently sandboxed and isolated from other applications. In order to disable copy/paste on the EMM Console:
1. Open 'Set user restrictions'.
2. Toggle 'Disallow cross profile copy/paste' to On.
3. Toggle 'Disallow sharing data into the profile' to On.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Google_Android_11_Y23M01_STIG.zip

Item Details

Category: ACCESS CONTROL, CONFIGURATION MANAGEMENT

References: 800-53|AC-4(2), 800-53|CM-6b., CAT|II, CCI|CCI-000366, CCI|CCI-002191, Rule-ID|SV-228621r852665_rule, STIG-ID|GOOG-11-004500, Vuln-ID|V-228621

Plugin: MDM

Control ID: 262a6b0b72e9bb421611d9fa9242d9c5c9d49f666ed995e79180f06fac2ff78b