ZEBR-10-004500 - Zebra Android 10 must be configured to disable exceptions to the access control policy that prevents application processes from accessing all data stored by other application processes - Sharing data into the profile

Information

App data sharing gives apps the ability to access the data of other apps for enhanced user functionality. However, sharing also poses a significant risk that unauthorized users or apps will obtain access to DoD sensitive information. To mitigate this risk, there are data sharing restrictions. If a user is allowed to make exceptions to the data sharing restriction policy, the user could enable unauthorized sharing of data, leaving it vulnerable to breach. Limiting the granting of exceptions to either the Administrator or common application developer mitigates this risk.

Copy/paste of data between applications in different application processes or groups of application processes is considered an exception to the access control policy and therefore, the Administrator must be able to enable/disable the feature. Other exceptions include allowing any data or application sharing between process groups.

SFR ID: FMT_SMF_EXT.1.1 #42, FDP_ACF_EXT.1.2

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Configure the Zebra Android 10 device to enable the access control policy that prevents [selection: application processes, groups of application processes] from accessing [selection: all, private] data stored by other [selection: application processes, groups of application processes].

Note: All application data is inherently sandboxed and isolated from other applications.

To disable copy/paste on the MDM console:
1. Open User restrictions.
2. Select 'Disallow cross profile copy/paste'.
3. Select 'Disallow sharing data into the profile'.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Zebra_Android_10_Y22M10_STIG.zip

Item Details

Category: ACCESS CONTROL, CONFIGURATION MANAGEMENT

References: 800-53|AC-4(2), 800-53|CM-6b., CAT|II, CCI|CCI-000366, CCI|CCI-002191, Rule-ID|SV-242549r852819_rule, STIG-ID|ZEBR-10-004500, Vuln-ID|V-242549

Plugin: MDM

Control ID: ce777a0b7d489103235caa0d3ccd9b4b5e41d90f52482abf3608041015126651