GOOG-12-007200 - Google Android 12 must be configured to disable trust agents - NOTE: This requirement is not applicable (NA) for specific biometric authentication factors included in the product's Common Criteria evaluation.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Trust agents allow a user to unlock a mobile device without entering a passcode when the mobile device is, for example, connected to a user-selected Bluetooth device or in a user-selected location. This technology would allow unauthorized users to have access to DoD sensitive data if compromised. By not permitting the use of non-password authentication mechanisms, users are forced to use passcodes that meet DoD passcode requirements.

SFR ID: FMT_SMF_EXT.1.1 #22, FIA_UAU.5.1

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Configure the Google Android 12 device to disable trust agents.

On the EMM console:

COBO:

1. Open 'Lock screen restrictions'.
2. Toggle 'Disable trust agents' to ON.

COPE:

1. Open 'Lock screen restrictions'.
2. Select 'Personal Profile'.
3. Toggle 'Disable trust agents' to ON.
4. Select 'Work Profile'.
5. Toggle 'Disable trust agents' to ON.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Google_Android_12_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000767, Rule-ID|SV-250428r802650_rule, STIG-ID|GOOG-12-007200, Vuln-ID|V-250428

Plugin: MDM

Control ID: ac355a9b9cebd5fe742b528072e527d6ca3648e1c7cdfaff82a49c00c7989d4a