GOOG-13-010200 - The Google Android 13 work profile must be configured to enforce the system application disable list.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

The system application disable list controls user access to/execution of all core and preinstalled applications.

Core application: Any application integrated into Google Android 13 by Google.

Preinstalled application: Additional noncore applications included in the Google Android 13 build by Google or the wireless carrier.

Some system applications can compromise DOD data or upload users' information to non-DOD-approved servers. A user must be blocked from using such applications that exhibit behavior that can result in compromise of DOD data or DOD user information.

The site administrator must analyze all preinstalled applications on the device and disable all applications not approved for DOD use by configuring the system application disable list.

SFR ID: FMT_SMF_EXT.1.1 #47

Solution

Configure the Google Android 13 device to enforce the system application disable list.

The required configuration is the default configuration when the device is enrolled. If the device configuration is changed, use the following procedure to bring the device back into compliance:

On the EMM console:

COBO:

1. Open 'Apps management' section.
2. Select 'Hide apps'.
3. Enter package names of apps to hide.

COPE:

1. Open 'Apps management' section.
2. Select 'Hide apps on parent'.
3. Enter package names of apps to hide.

Configure a list of approved Google core and preinstalled apps in the core app allowlist.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Google_Android_13_V1R1_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000366, Rule-ID|SV-254789r862749_rule, STIG-ID|GOOG-13-010200, Vuln-ID|V-254789

Plugin: MDM

Control ID: 0390aaf0f5e112220073e3de9217d34ab43b5987c6309594c50aaf2eac07aadf