STIG 10 COBO compliance
Last updated July 26th, 2023
The following are settings for STIG 10 COBO compliance.
The STIG 10 policies, values, and configuration options described in the tables below are supported by KSP and designed to work within your unique UEM environment.
Policy Group | Policy Rule | Available Options | Settings | Severity | API List | API Values | COBO Work Environment Policy Paths |
---|---|---|---|---|---|---|---|
Password Requirements | Minimum password length | 0+ | 6 | II |
BasePasswordPolicy
setPasswordMinimumLength |
6 (preferred, minimum) |
1. Device-wide policies (Device Owner) 2. Enable device-wide policies [enable] 3. Password policy 4. Enable password policy controls with KSP [enable] 5. Password restrictions 6. Minimum password length [6] |
Password Requirements | Minimum password quality | Unspecified, Something, Numeric, Numeric (Complex), Alphabetic, Alphanumeric, Complex | Numeric(Complex) | II |
BasePasswordPolicy
setPasswordQuality PasswordPolicy setMaximumNumericSequenceLength |
PASSWORD_QUALITY_NUMERIC_COMPLEX (preferred) PASSWORD_QUALITY_NUMERIC (minimum) |
1. Device-wide policies (Device Owner) 2. Enable device-wide policies [enable] 3. Password policy 4. Enable password policy controls with KSP [enable] 5. Password quality [numeric] |
Password Requirements | Maximum time to screen lock | 0 minutes | 15 minutes | II |
BasePasswordPolicy
setMaximumTimeToLock |
900000 ms (minimum) |
1. Device-wide policies (Device Owner) 2. Enable device-wide policies [enable] 3. Password policy 4. Enable password policy controls with KSP [enable] 5. Allowed time for user inactivity before device locks [900000] |
Password Requirements | Maximum password failures until local wipe | 0+ | 10 | II |
BasePasswordPolicy
setMaximumFailedPasswordsToWipe |
10 (minimum) |
1. Device-wide policies (Device Owner) 2. Enable device-wide policies [enable] 3. Password policy 4. Enable password policy controls with KSP [enable] 5. Maximum failed password attempts to wipe data [10] |
Restrictions | Installs from unknown sources | Allow/Disallow | Disallow | II |
RestrictionPolicy
SetAllowNonMarketApps |
FALSE |
1. Device-wide policies (Device Owner) 2. Enable device-wide policies [enable] 3. Device restrictions 4. Enable device restriction controls 5. Allow installation of non-Google Play apps [disable] |
Restrictions | Trust agents | Allow/Disallow | Disallow | II |
BasePasswordPolicy
setKeyguardDisabledFeatures (Disable trust agent) |
KEYGUARD_DISABLE_TRUST_AGENTS |
1. Device-wide policies (Device Owner) 2. Enable device-wide policies [enable] 3. Password policy 4. Enable password policy controls with KSP [enable] 5. Disable Keyguard feature [Disable Trusted Agents] |
Restrictions | Face | Allow/Disallow | Disallow | II |
PasswordPolicy
setBiometricAuthenticationEnabled |
BIOMETRIC_AUTHENTICATION_FACE
FALSE |
1. Device-wide policies (Device Owner) 2. Enable device-wide policies [enable] 3. Password policy 4. Enable password policy controls with KSP [enable] 5. Biometric authentication 6. Enable face recognition [disable] |
Restrictions | Debugging features | Allow/Disallow | Disallow | II |
RestrictionPolicy
allowDeveloperMode |
FALSE |
1. Device-wide policies (Device Owner) 2. Enable device-wide policies [enable] 3. Device Restrictions 4. Enable device restriction controls [enable] 5. Allow developer mode [disable] |
Restrictions | USB file transfer | Allow/Disallow | Disallow | II |
RestrictionPolicy
setUsbMediaPlayerAvailability |
FALSE |
1. Device-wide policies (Device Owner) 2. Enable device-wide policies [enable] 3. Device Restrictions 4. Enable device restriction controls [enable] 5. Allow USB media player [disable] |
Wi-Fi | Unsecured hotspot | Allow/Disallow | Disallow | II |
WiFiPolicy
allowOpenWifi |
FALSE |
1. Device-wide policies (Device Owner) 2. Enable device-wide policies [enable] 3. Device Controls 4. Wi-Fi Policy 5. Enable Wi-Fi policy controls [disable] |
Multiuse | Multi-user mode | Allow/Disallow | Disallow | II |
MultiUserManage
allowMultipleUsers |
FALSE | NA |
Restrictions | CC mode | Enable/Disable | Enable | II |
AdvancedRestrictionPolicy
setCCMode |
TRUE |
1. Device-wide policies (Device Owner) 2. Enable device-wide policies [enable] 3. Advanced Restriction policies 4. Enable advanced restriction controls [enable] 5. Enable Common Criteria (CC) mode [enable] |
Policy
Management |
SD Card | Enable/Disable | Disable | I |
RestrictionPolicy
setSdCardState |
FALSE |
1. Device-wide policies (Device Owner) 2. Enable device-wide policies [enable] 3. Device Restriction 4. Enable device restriction controls [enable] 5. Allow SD card access [disable] |
Encryption | External storage encryption | Enable/Disable | Enable | I |
DeviceSecurityPolicy
setExternalStorageEncryption |
TRUE |
1. Device-wide policies (Device Owner) 2. Enable device-wide policies [enable] 3. Device Restriction 4. Enable device restriction controls [enable] 5. Tethering controls 6. Enforce external storage encryption [enable] |
Application | System app disable list | core apps list | List non AO approved system app packages | II |
ApplicationPolicy
setDisableApplication |
Package Name |
1. Device-wide policies (Device Owner) 2. Enable device-wide policies [enable] 3. Application management policies 4. Enable application management controls [enable] 5. Disable application without user interaction [configure comma separated pkg list] |
KPE Audit
Log |
Audit Log | Enable/Disable | Enable | II |
AuditLog
enableAuditLog |
(0) UEM must provide the means to read the log in their console |
1. Device-wide policies (Device Owner) 2. Enable device-wide policies [enable] 3. Audit log 4. Enable Audit Log [enable] 5. Log Path [configure] |
Restrictions | USB host mode exception list | APP AUD CDC COM CON CSCHID HUB MAS MIS PER PHY PRI STI VEN VID WIR | HID | II |
RestrictionPolicy
setUsbExceptionList |
USBInterface.HID.getValue |
1. Device-wide policies (Device Owner) 2. Enable device-wide policies [enable] 3. Device restrictions 4. Enable device restriction controls [enable] 5. Set USB exception list [Human Interface Device] |
Restrictions | USB Host Storage | Enable/Disable | Disable | II |
RestrictionPolicy
allowUsbHostStorage (must be toggled off/on for USB exception list to take effect) |
TRUE |
1. Device-wide policies (Device Owner) 2. Enable device-wide policies [enable] 3. Device restrictions 4. Enable device restriction controls [enable] 5. Allow USB host storage [disable] |
Restrictions | Bluetooth | Allow/Disallow | Allow/Disallow | III |
RestrictionPolicy
allowBluetooth |
FALSE |
1. Device-wide policies (Device Owner) 2. Enable device-wide policies [enable] 3. Device restrictions 4. Enable device restriction controls [enable] 5. Allow bluetooth [enable/disable] |
Bluetooth | Bluetooth UUID Whitelist |
A2DP_ADVAUDIODIST_UUID
A2DP_AUDIOSINK_UUID A2DP_AUDIOSOURCE_UUID AVRCP_CONTROLLER_UUI AVRCP_TARGET_UUID BNEP_UUID BPP_UUID DUN_UUID FTP_UUID HFP_AG_UUID HFP_UUID HSP_AG_UUID HSP_UUID NAP_UUID OBEXOBJECTPUSH_UUID PANU_UUID PBAP_PSE_UUID PBAP_UUID SAP_UUID SPP_UUID |
Enable | III |
BluetoothPolicy
addBluetoothUUIDsToWhiteList |
(*) wildcard string |
1. Device-wide policies (Device Owner) 2. Enable device-wide policies [enable] 3. Device Controls 4. Bluetooth Policy 5. Enable bluetooth policy controls [enable] 6. Whitelist Bluetooth Service by UUID [configure] |
Bluetooth | Bluetooth UUID Blacklist | (*) wildcard string | Enable | III |
BluetoothPolicy
addBluetoothUUIDsToBlackList |
(*) wildcard string | NA |
Banner | Banner Text | Configure | DoD-mandated warning banner text | III |
BootBanner
enableRebootBanner |
TRUE |
1. Device-wide policies (Device Owner) 2. Enable device-wide policies [enable] 3. Device Controls 4. Boot banner 5. Enable banner on device reboot [enable] |
Restrictions | Date Time Change | Enable/Disable | Disable | II |
DateTimePolicy
setDateTimeChangeEnabled |
FALSE | NA |
Restrictions | Outgoing Beam | Allow/Disallow | Disallow | II |
RestrictionPolicy
allowAndroidBeam |
FALSE |
1. Device-wide policies (Device Owner) 2. Enable device-wide policies [enable] 3. Device Restrictions 4. Enable device restriction controls [enable] 5. Allow Android Beam on device [disable] |
Restrictions | Share Via List | Allow/Disallow | Disallow | II |
RestrictionPolicy
allowShareList |
FALSE |
1. Device-wide policies (Device Owner) 2. Enable device-wide policies [enable] 3. Device Restrictions 4. Enable application management controls [enable] 5. Allow Share Via option [enable] |
Restrictions | Backup Service | Allow/Disallow | Disallow | II |
RestrictionPolicy
setBackup |
FALSE |
1. Device-wide policies (Device Owner) 2. Enable device-wide policies [enable] 3. Device Restrictions 4. Enable device restriction controls [enable] 5. Allow backup on Google Server [disable] |
RCP | Move File to Personal | Allow/Disallow | Disallow | II |
RCPPolicy
AllowMoveFilesToOwner |
FALSE | NA |
RCP | Sync Calendar to Personal | Allow/Disallow | Disallow | II |
RCPPolicy
setAllowChangeDataSyncPolicy |
CALENDAR, EXPORT,
FALSE |
NA |
Account | Account Addition Blacklist | Blocklist | "Blocklist all" for Work email app, Samsung accounts, and Google accounts | II |
DeviceAccountPolicy
addAccountsToAdditionBlackList |
Account Types (Work Email App. Google Accounts, Samsung Accounts)
(*) wildcard string |
Step 1 1. Device-wide policies (Device Owner) 2. Enable device-wide policies [enable] 3. Device Account Policy 4. Enable Device Account Policy Controls [enable] 5. Enable Device Account policies [enable] Step 2 1. Device Account Policy Configurations 2.. Device Account Policy Configuration 3. Add Account Type to Addition Blacklist [choose types] 4. Add Accounts to Addition Blacklist [configure "*"] |
Application | System App Disable List | Core App List | List non AO approved system app packages | II |
ApplicationPolicy
setDisableApplication |
Package Name |
1. Device-wide policies (Device Owner) 2. Enable device-wide policies [enable] 3. Application management policies 4.Enable application management controls [enable] 5. Disable Application without user interaction [configure comma separated pkg list] |
Restrictions | Revocation Check | Enable/Disable | Enable | II |
CertificatePolicy
enableRevocationCheck |
(*) wildcard string
TRUE |
1. Device-wide policies (Device Owner) 2. Enable device-wide policies [enable] 3. Certificate management policies 4. Enable certificate management controls [enable] 5, Certificate revocation 6. Enable revocation check [Enable for all apps] |
Restrictions |
OCSP Check
(With Revocation Check Fallback) |
Enable/Disable | Enable | II |
CertificatePolicy
enableOcspCheck |
(*) wildcard string
TRUE |
1. Device-wide policies (Device Owner) 2. Enable device-wide policies [enable] 3. Certificate management policies 4. Enable certificate management controls [enable] 5, Certificate revocation 6. Enable OSCP check before CRL [enable] |
Policy
Management |
Certificates | Configure | Include DoD certificates in work profile | II |
CertificateProvisioning
installCertificateToKeystore |
TYPE_CERTIFICATE/TYPE_PKCS12, Certificate, Alias, Decryption Password
KEYSTORE_DEFAULT/KEYSTORE_FOR_WIFI/KEYSTORE_FOR_VPN_AND_APPS
|
1. Device-wide policies (Device Owner) 2. Enable device-wide policies [enable] 3. Certificate management policies 4. Enable certificate management controls [enable] 5. Install Certificate in keystore(s) silently [configure] |
Applications | List of approved apps listed in managed Google Play | List of Apps | List only approved work apps | II |
ApplicationPolicy
addAppPackageNameToWhiteList ApplicationPolicy addAppPackageNameToBlackList |
Package name
(*) wildcard string |
1. Device-wide policies (Device Owner) 2. Enable device-wide policies [enable] 3. Application management policies 4. Enable application management controls [enable] 5. Application allow or block list by Pkg Name [comma separated list or "*"] |
Applications | List of approved apps listed in managed Google Play | List of Apps | List only approved work apps | II |
ApplicationPolicy addAppSignatureToWhiteList ApplicationPolicy addAppSignatureToBlackList |
Package Signature (*) wildcard string |
1. Device-wide policies (Device Owner) 2. Enable device-wide policies [enable] 3. Application management policies 4. Enable application management controls [enable] 5. Application allow or block list by Signature used [comma separated list or "*"] |
Is this page helpful?