0% found this document useful (0 votes)
229 views87 pages

CIS Google Android 7 Benchmark v1.0.0

This document provides security configuration recommendations for Android 7.x devices. It aims to help administrators, security specialists, and others establish a secure configuration posture. The recommendations were developed through a consensus process with subject matter experts and tested against Android 7.1. The document covers overview information, 29 security settings recommendations across OS security and privacy categories, and appendices on scoring and change history.

Uploaded by

luisco100
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
229 views87 pages

CIS Google Android 7 Benchmark v1.0.0

This document provides security configuration recommendations for Android 7.x devices. It aims to help administrators, security specialists, and others establish a secure configuration posture. The recommendations were developed through a consensus process with subject matter experts and tested against Android 7.1. The document covers overview information, 29 security settings recommendations across OS security and privacy categories, and appendices on scoring and change history.

Uploaded by

luisco100
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 87

CIS Google Android 7 Benchmark

v1.0.0 - 01-24-2017
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike
4.0 International Public License. The link to the license terms can be found at
https://creativecommons.org/licenses/by-nc-sa/4.0/legalcode

To further clarify the Creative Commons license related to CIS Benchmark content, you are
authorized to copy and redistribute the content for use by you, within your organization
and outside your organization for non-commercial purposes only, provided that (i)
appropriate credit is given to CIS, (ii) a link to the license is provided. Additionally, if you
remix, transform or build upon the CIS Benchmark(s), you may only distribute the modified
materials if they are subject to the same license terms as the original Benchmark license
and your derivative will no longer be a CIS Benchmark. Commercial use of CIS Benchmarks
is subject to the prior approval of the Center for Internet Security.

1|Page
Table of Contents

Overview .................................................................................................................................................................. 4
Intended Audience ........................................................................................................................................... 4
Consensus Guidance........................................................................................................................................ 4
Typographical Conventions ......................................................................................................................... 5
Scoring Information ........................................................................................................................................ 5
Profile Definitions ............................................................................................................................................ 6
Acknowledgements ......................................................................................................................................... 7
Recommendations ................................................................................................................................................ 8
1 Android OS Security Settings ................................................................................................................... 8
1.1 Ensure device firmware is up to date (Not Scored) ........................................................... 8
1.2 Ensure 'Screen Lock' is set to Enabled (Not Scored) ...................................................... 10
1.3 Ensure 'Make pattern visible' is set to Disabled (if using a pattern as device lock
mechanism) (Not Scored) ................................................................................................................ 12
1.4 Ensure 'Automatically Lock' is set to 'Immediately' (Not Scored) ............................ 14
1.5 Ensure 'Power button instantly locks' is set to Enabled (Not Scored) .................... 16
1.6 Ensure 'Lock Screen Message' is configured (Not Scored) .......................................... 18
1.7 Do not connect to untrusted Wi-Fi networks (Not Scored) ......................................... 20
1.8 Ensure 'Make passwords visible' is set to Disabled (Not Scored) ............................. 22
1.9 Ensure 'Encrypt phone' or 'Encrypt tablet' is set to Enabled (Not Scored) ........... 23
1.10 Ensure 'Developer Options' is set to Disabled (Not Scored) ..................................... 25
1.11 Ensure 'Unknown sources' is set to Disabled (Not Scored) ...................................... 27
1.12 Do not root your device (Not Scored) ................................................................................ 29
1.13 Ensure 'Smart Lock' is set to Disabled (Not Scored) .................................................... 30
1.14 Ensure 'Lock SIM card' is set to Enabled (Not Scored) ............................................... 32
1.15 Ensure Android Device Manager is set to Enabled (Not Scored) ............................ 34
1.16 Ensure 'Speak passwords' is set to Disabled (Not Scored) ....................................... 36
1.17 Ensure 'Automatic date & time' and 'Automatic time zone' are set to Enabled
(Not Scored) ........................................................................................................................................... 38
2|Page
1.18 Ensure 'Remotely locate this device' is set to Enabled (Not Scored) .................... 40
1.19 Ensure 'Allow remote lock and erase' is set to Enabled (Not Scored) .................. 42
1.20 Ensure 'Scan device for security threats' is set to Enabled (Not Scored) ............ 44
1.21 Ensure 'Improve harmful app detection' is set to Enabled (Not Scored) ............ 46
1.22 Ensure 'Ask for unlock pattern/PIN/password before unpinning' is set to
Enabled (Not Scored) ......................................................................................................................... 48
1.23 Ensure 'Sleep' is set to 1 minute or less (Not Scored) ................................................. 50
1.24 Ensure 'Wi-Fi assistant' is set to Disabled (Not Scored) ............................................ 52
1.25 Keep device Apps up to date (Not Scored) ...................................................................... 54
1.26 Ensure 'Add users when device is locked' is set to Disabled (Not Scored) ......... 56
1.27 Ensure 'Guest profiles' do not exist (Not Scored) ......................................................... 58
1.28 Review app permissions periodically (Not Scored) ..................................................... 60
1.29 Ensure Wi-Fi hotspot security is set to WPA2-PSK (Not Scored) ........................... 62
2 Android OS Privacy Settings.................................................................................................................. 64
2.1 Ensure 'Notifications on the lock screen' is set to Disabled (Not Scored) ............. 64
2.2 Ensure 'Location Services' is set to Disabled (Not Scored) .......................................... 66
2.3 Ensure 'Back up to Google Drive' is Disabled (Not Scored) ......................................... 68
2.4 Ensure 'Signed-out search activity' is set to Disabled (Not Scored) ......................... 70
2.5 Ensure 'Web and App Activity' is set to Disabled (Not Scored) ................................. 72
2.6 Ensure 'Device Information' is set to Disabled (Not Scored) ...................................... 74
2.7 Ensure 'Voice & Audio Activity' is set to Disabled (Not Scored) ................................ 76
2.8 Ensure 'YouTube Search History' is set to Disabled (Not Scored) ............................ 78
2.9 Ensure 'YouTube Watch History' is set to Disabled (Not Scored) ............................. 80
2.10 Ensure 'Google Location History' is set to Disabled (Not Scored) .......................... 82
Appendix: Summary Table ............................................................................................................................. 84
Appendix: Change History .............................................................................................................................. 86

3|Page
Overview
This document, Security Configuration Benchmark for Android 7.x, provides prescriptive
guidance for establishing a secure configuration posture for the Android 7.x OS. This guide was
tested against the Android 7.1 OS. This benchmark covers Android 7.x and all hardware devices
on which this OS is supported.

In determining recommendations, the current guidance treats all Android mobile device
platforms as having the same use cases and risk/threat scenarios. In all but a very few cases,
configuration steps, default settings, and benchmark recommended settings are identical
regardless of hardware platform. To obtain the latest version of this guide, please
visit http://cisecurity.org. If you have questions, comments, or have identified ways to improve
this guide, please write us at [email protected].

Intended Audience
This document is intended for system and application administrators, security specialists,
auditors, help desk, end users, and platform deployment personnel who plan to use,
develop, deploy, assess, or secure solutions that use Android 7.x.

Consensus Guidance
This benchmark was created using a consensus review process comprised of subject
matter experts. Consensus participants provide perspective from a diverse set of
backgrounds including consulting, software development, audit and compliance, security
research, operations, government, and legal.

Each CIS benchmark undergoes two phases of consensus review. The first phase occurs
during initial benchmark development. During this phase, subject matter experts convene
to discuss, create, and test working drafts of the benchmark. This discussion occurs until
consensus has been reached on benchmark recommendations. The second phase begins
after the benchmark has been published. During this phase, all feedback provided by the
Internet community is reviewed by the consensus team for incorporation in the
benchmark. If you are interested in participating in the consensus process, please visit
https://community.cisecurity.org.

4|Page
Typographical Conventions
The following typographical conventions are used throughout this guide:

Convention Meaning
Stylized Monospace font Used for blocks of code, command, and script examples.
Text should be interpreted exactly as presented.

Monospace font Used for inline code, commands, or examples. Text should
be interpreted exactly as presented.

<italic font in brackets> Italic texts set in angle brackets denote a variable
requiring substitution for a real value.

Italic font Used to denote the title of a book, article, or other


publication.

Note Additional information or caveats

Scoring Information
A scoring status indicates whether compliance with the given recommendation impacts the
assessed target's benchmark score. The following scoring statuses are used in this
benchmark:

Scored

Failure to comply with "Scored" recommendations will decrease the final benchmark score.
Compliance with "Scored" recommendations will increase the final benchmark score.

Not Scored

Failure to comply with "Not Scored" recommendations will not decrease the final
benchmark score. Compliance with "Not Scored" recommendations will not increase the
final benchmark score.

5|Page
Profile Definitions
The following configuration profiles are defined by this Benchmark:

 Level 1

Items in this profile intend to:

o be practical and prudent;


o provide a clear security benefit; and
o not negatively inhibit the utility of the technology beyond acceptable means.

 Level 2

This profile extends the "Level 1" profile. Items in this profile exhibit one or more of
the following characteristics:

o are intended for environments or use cases where security is paramount.


o acts as defense in depth measure.
o may negatively inhibit the utility or performance of the technology.

6|Page
Acknowledgements
This benchmark exemplifies the great things a community of users, vendors, and subject matter
experts can accomplish through consensus collaboration. The CIS community thanks the entire
consensus team with special recognition to the following individuals who contributed greatly to
the creation of this guide:

Author
Pravin Goyal

Editor
Jordan Rakoske

7|Page
Recommendations
1 Android OS Security Settings
This section provides the security recommendation for Android OS.

1.1 Ensure device firmware is up to date (Not Scored)


Profile Applicability:

 Level 1

Description:

Ensure that the device is kept up to date with security patch levels.

Rationale:

Firmware updates often include critical security fixes that reduce the probability of an
attacker remotely exploiting the device. The device should be on the latest security patch
level as applicable.

Audit:

To verify that your device is updated to the most recent firmware version:

1. Tap System Settings Gear Icon.


2. Tap About Phone.
3. Verify that the Android Security patch level is current.

Remediation:

Follow the below steps to check and update the device security patch level:

1. Tap System Settings Gear Icon.


2. Tap About Phone.
3. Tap System Updates.
4. Tap Check for update.
5. Apply the update, if available.

Impact:

None

8|Page
Default Value:

By default, users are notified about security patch level updates but are not installed until
the user initiates the process.

References:

1. https://source.android.com/security/bulletin/index.html

9|Page
1.2 Ensure 'Screen Lock' is set to Enabled (Not Scored)
Profile Applicability:

 Level 1

Description:

Enable Screen lock.

Rationale:

Enabling Screen lock requires a form of user authentication before interacting with the
device. This strengthens application and data protection and overall improves the device
security.

Audit:

Verify that a Pattern, PIN or Password has been set for the device.

1. Tap System Settings Gear Icon.


2. Scroll to Personal section.
3. Tap Security.
4. Verify that Screen lock has Pattern, PIN or Password underneath the text.

Remediation:

To configure a Pattern, PIN or Password for the device:

1. Tap System Settings Gear Icon.


2. Scroll to Personal section.
3. Tap Security.
4. Tap Screen Lock.
5. Tap Pattern, PIN or Password.
6. Enter a complex Pattern, PIN or Password.
7. Tap Continue.
8. Enter in the same complex Pattern, PIN or Password again.
9. Tap OK.

Impact:

A user will be prompted to unlock the device on every use.

10 | P a g e
Default Value:

By default, screen lock is not set.

References:

1. https://support.google.com/nexus/answer/2819522?hl=en&ref_topic=7029556

11 | P a g e
1.3 Ensure 'Make pattern visible' is set to Disabled (if using a pattern as
device lock mechanism) (Not Scored)
Profile Applicability:

 Level 1

Description:

Disable pattern visibility if using a pattern as device lock mechanism.

Rationale:

Keeping device unlock pattern visible during device unlock can reveal the pattern and is
vulnerable to shoulder surfing attack. Hence, do not make the device unlock pattern visible.

Audit:

Follow the below steps and verify that device unlock pattern is not visible.

1. Tap System Settings Gear Icon.


2. Scroll to Personal section.
3. Tap Security.
4. If Screen lock has Pattern underneath the text, follow further steps. If not, then
this recommendation is not applicable.
5. Tap the Gear Icon in the Screen lock.
6. Verify that the Make pattern visible switch is disabled.

Remediation:

To disable device unlock pattern visibility, follow the below steps:

1. Tap System Settings Gear Icon.


2. Scroll to Personal section.
3. Tap Security.
4. If Screen lock has Pattern underneath the text, follow further steps. If not, then
this recommendation is not applicable.
5. Tap the Gear Icon in the Screen lock.
6. Toggle Make pattern visible to Off position.

Impact:

The user would have to be careful while entering the device unlock pattern since visual
feedback would not provide any clues for tracing pattern input.

12 | P a g e
Default Value:

By default, device unlock pattern is visible.

References:

1. https://support.google.com/nexus/answer/2819522?hl=en

13 | P a g e
1.4 Ensure 'Automatically Lock' is set to 'Immediately' (Not Scored)
Profile Applicability:

 Level 1

Description:

Immediately lock the phone as soon as the device goes to sleep.

Rationale:

Automatically and immediately locking the device as soon as it goes to sleep ensure that there is
no lag between the device entering the sleep state and the device getting locked. At times, the
user just rests the device and moves away from it. The phone eventually enters the sleep state
and automatically and immediately locking it ensures that no manual locking of the device is
needed. This ensures that the unattended devices are locked immediately as soon as the device
enters the sleep state.

Audit:

Follow the below steps and verify that Automatically Look is set to Immediately.

1. Tap System Settings Gear Icon.


2. Scroll to Personal section.
3. Tap Security.
4. Tap the Gear icon next to Screen lock.
5. Verify that Automatically lock has a text Immediately after sleep underneath it.

Remediation:

Follow the below steps and set Automatically Lock to Immediately.

1. Tap System Settings Gear Icon.


2. Scroll to Personal section.
3. Tap Security.
4. Tap the Gear icon next to Screen lock.
5. Tap Automatically lock.
6. Tap Immediately.

Impact:

None

14 | P a g e
Default Value:

By default, Automatically lock is set to 5 seconds after sleep.

15 | P a g e
1.5 Ensure 'Power button instantly locks' is set to Enabled (Not Scored)
Profile Applicability:

 Level 1

Description:

Pressing the power button should lock the device instantly.

Rationale:

Pressing the power button instantly puts the phone to sleep. Enabling Power button instantly
locks setting ensures that the device is instantly locked as well.

Audit:

Follow the below steps and verify that Power button instantly locks is enabled.

1. Tap System Settings Gear Icon.


2. Scroll to Personal section.
3. Tap Security.
4. Tap the Gear icon next to Screen lock.
5. Verify that Power button instantly locks is enabled.

Remediation:

Follow the below steps to enable the Power button instantly locks setting.

1. Tap System Settings Gear Icon.


2. Scroll to Personal section.
3. Tap Security.
4. Tap the Gear icon next to Screen lock.
5. Toggle Power button instantly locks setting to On position.

Impact:

None

Default Value:

By default, Power button instantly locks setting is enabled.

16 | P a g e
References:

1. https://support.google.com/nexus/answer/2819522?hl=en

17 | P a g e
1.6 Ensure 'Lock Screen Message' is configured (Not Scored)
Profile Applicability:

 Level 1

Description:

Set a message to be displayed on the locked screen.

Rationale:

When device screen is locked, a lock screen message helps to provide

 deterrent warnings,
 device recognition without needing to unlock it and
 most importantly emergency information

Such information could be valuable to both your device security as well as personnel
security. It is thus recommended to have a suitable lock screen message.

Audit:

Follow the below steps and verify that Lock screen message is set.

1. Tap System Settings Gear Icon.


2. Scroll to Personal section.
3. Tap Security.
4. Tap the Gear icon next to Screen lock.
5. Verify that a suitable Lock screen message is set.

Remediation:

Follow the below steps to set up a Lock screen message.

1. Tap System Settings Gear Icon.


2. Scroll to Personal section.
3. Tap Security.
4. Tap the Gear icon next to Screen lock.
5. Tap Lock screen message.
6. Write your message and tap Save.

18 | P a g e
Impact:

Anyone who picks up your device can see your message and emergency information
without unlocking your phone.

Default Value:

By default, no message is set.

References:

1. https://support.google.com/nexus/answer/7055029?hl=en&ref_topic=7029556

19 | P a g e
1.7 Do not connect to untrusted Wi-Fi networks (Not Scored)
Profile Applicability:

 Level 2

Description:

Do not connect to untrusted Wi-Fi networks.

Rationale:

Connecting a device to an open untrusted network through unsecured channels can increase the
remote attack surface of the device. Additionally, at present, the cellular data network is a more
difficult medium to sniff than Wi-Fi. If you are going to be using public Wi-Fi, using a secure
VPN is recommended. In most cases, you should avoid using a public or untrusted or free Wi-Fi.

Audit:

Follow the below steps to verify that Wi-Fi is either disabled or not connected to an
untrusted network:

1. Tap System Settings Gear Icon.


2. Scroll to Wireless & networks.
3. Tap Wi-Fi.
4. Verify that the Wi-Fi switch is in the Off position or is connected to a trusted
network only.

Remediation:

Follow the below steps to disable Wi-Fi or connect to a trusted network:

1. Tap System Settings Gear Icon.


2. Scroll to Wireless & networks.
3. Tap Wi-Fi.
4. Toggle Wi-Fi setting to the Off position or connect to a trusted network.

Impact:

You might have to use cellular data and would not be able to take advantage of Public Wi-
Fi.

Default Value:

NA

20 | P a g e
References:

1. https://support.google.com/pixelphone/answer/2819519?hl=en&ref_topic=70843
92

21 | P a g e
1.8 Ensure 'Make passwords visible' is set to Disabled (Not Scored)
Profile Applicability:

 Level 2

Description:

Disable password visibility during input.

Rationale:

This setting controls whether passwords typed into your Android device should be visible
on screen, or hidden by replacing the letters with dots. When this setting is off, the
password is obscured by dots, and only the most recent key pressed is visible for a short
time after it has been pressed. When this setting is on, the entire password can be viewed
in plain text, if desired.

Disabling this setting protects you against shoulder surfing attacks.

Audit:

Follow the below steps to verify Make password visible is set to disabled:

1. Tap System Settings Gear Icon.


2. Tap Security.
3. Verify that Make passwords visible slider is off.

Remediation:

Follow the below steps to disable Make password visible:

1. Tap System Settings Gear Icon.


2. Tap Security.
3. Toggle Make passwords visible to Off position.

Impact:

Given the relative difficulty of typing letters accurately on a small on-screen keyboard, it
can be helpful to get visual feedback on-screen that you have typed all the letters of your
password correctly. Disabling password visibility might impact user experience.

Default Value:

By default, passwords are visible.

22 | P a g e
1.9 Ensure 'Encrypt phone' or 'Encrypt tablet' is set to Enabled (Not
Scored)
Profile Applicability:

 Level 1

Description:

Encrypt your device data.

Rationale:

Encryption stores your data in a form that can be read only when your device is unlocked.
Unlocking your encrypted device decrypts your data. Encryption protects your data and
protects it from disclosure.

Audit:

Follow the below steps to verify that the device is encrypted:

1. Tap System Settings Gear Icon.


2. Scroll to Personal.
3. Tap Security.
4. Verify that the device is encrypted.

Remediation:

Follow the below steps to encrypt the device:

1. Tap System Settings Gear Icon.


2. Scroll to Personal.
3. Tap Security.
4. Scroll to the Encryption section.
5. Tap Encrypt phone or Encrypt Tablet.
6. Tap Encrypt phone or Encrypt Tablet again.
7. Enter Lock screen PIN or password if set.
8. Tap Continue.
9. Tap Encrypt phone or Encrypt Tablet.

Impact:

It might take around one hour to encrypt the device for the first time. You may not be able
to use the device during this time.

23 | P a g e
Default Value:

By default, all Google Pixel phones, and Nexus 5X, Nexus 6P, Nexus 6, and Nexus 9 devices
are encrypted.

References:

1. https://support.google.com/nexus/answer/2844831?hl=en&ref_topic=7029159

24 | P a g e
1.10 Ensure 'Developer Options' is set to Disabled (Not Scored)
Profile Applicability:

 Level 1

Description:

Disable Developer Options.

Rationale:

Enabling Developer Options allows a user to drastically alter certain very advanced settings on
the device. This can severely affect the way device functions and exposes greater and
developmental features to the user. This also exposes the device to respond to features such as
USB debugging (when enabled) and other such features that could be exploited to get malicious
access to the device sub-system. Hence, the Developer Options should be disabled.

Audit:

Follow the below steps to verify that Developer Options is disabled:

1. Tap System Settings Gear Icon.


2. Scroll to System.
3. Tap Developer options.
4. Verify that it is Off.

Remediation:

Follow the below steps to disable Developer Options:

1. Tap System Settings Gear Icon.


2. Scroll to System.
3. Tap Developer options.
4. Toggle it to Off position.

Impact:

None

Default Value:

Bu default, Developer options is disabled.

25 | P a g e
References:

1. http://www.howtogeek.com/175151/8-things-you-can-do-in-androids-developer-
options/

26 | P a g e
1.11 Ensure 'Unknown sources' is set to Disabled (Not Scored)
Profile Applicability:

 Level 1

Description:

Disable installation of apps from unknown sources.

Rationale:

This setting determines whether applications can be installed from locations other than Google
Play. Disabling installation from untrusted distribution channels protects
against inadvertent installation of untrusted or malicious applications. Apps on Google play are
vetted by Google Security Team and are mostly safe to install. You should avoid installing apps
from anywhere else.

Audit:

Follow the below steps to verify that Unknown sources is disabled:

1. Tap System Settings Gear Icon.


2. Tap Security.
3. Scroll to Device administration.
4. Verify that Unknown sources is disabled.

Remediation:

Follow the below steps to disable Unknown sources:

1. Tap System Settings Gear Icon.


2. Tap Security.
3. Scroll to Device administration.
4. Toggle Unknown sources to Off position.

Impact:

None

Default Value:

By default, Unknown sources is disabled.

27 | P a g e
References:

1. https://support.google.com/nexus/answer/2812853?hl=en

28 | P a g e
1.12 Do not root your device (Not Scored)
Profile Applicability:

 Level 1

Description:

Do not root your device.

Rationale:

Rooting your Android device breaks the user level restrictions put by the Android
operating system. This significantly opens up the device to allow literally any privileged
action. Rooting enables any form of alteration to the device. This puts the device at a much
greater risk because any vulnerability can be exploited without any restrictions. This also
voids the warranty and future security updates are problematic to install. Hence, for all
user purposes, do not root your device.

Audit:

Detecting whether a device is rooted or not is not straight forward. You would usually need
to install terminal apps or root checker apps to detect rooted devices. Follow your device
manufacturer support/documentation/community to detect rooting.

Remediation:

Follow your device manufacturer support/documentation/community to completely un-


root your device.

Impact:

None

Default Value:

By default, devices are not rooted and run with user level restrictions.

References:

1. http://www.wikihow.com/Check-if-Your-Android-Cellphone-Is-Rooted-or-Not
2. http://www.wikihow.com/Unroot-Android

29 | P a g e
1.13 Ensure 'Smart Lock' is set to Disabled (Not Scored)
Profile Applicability:

 Level 2

Description:

Disable Smart Lock.

Rationale:

Smart Lock detects device presence and its circumstances and automatically keeps it
unlocked even if the device has a screen password, pin or pattern enabled. Using Smart
Lock does not require you to manually unlock the device every time if the pre-defined
circumstances are met. As a best practice, do not set the device to get unlocked
automatically. For example, if your device gets stolen and if it is taken to a location pre-
defined in Smart Lock, it would automatically unlock. Similarly, if someone could replay
your voice, the device would automatically unlock.

Audit:

Follow the below steps to verify that Smart Lock is disabled:

1. Tap the System Settings Gear Icon.


2. Scroll to Personal.
3. Tap Security.
4. Scroll to Advanced.
5. Tap Trust agents.
6. Verify that Smart Lock (Google) is Off.

Remediation:

Follow the below steps to disable Smart Lock:

1. Tap the System Settings Gear Icon.


2. Scroll to Personal.
3. Tap Security.
4. Scroll to Advanced.
5. Tap Trust agents.
6. Toggle Smart Lock (Google) to Off position.

30 | P a g e
Impact:

The device would need to be manually unlocked every time.

Default Value:

By default, Smart Lock is enabled.

References:

1. https://support.google.com/nexus/answer/6093922?hl=en

31 | P a g e
1.14 Ensure 'Lock SIM card' is set to Enabled (Not Scored)
Profile Applicability:

 Level 2

Description:

Lock SIM card.

Rationale:

If your device uses a SIM card(s), enable SIM card lock. A SIM card PIN locks the SIM and
prevents anyone from removing the SIM card from your device and use it on any other
device without knowing the PIN. Also, you might choose to store your contacts and
messages on the SIM card and thus it is highly recommended that you safeguard this
valuable personal data by setting a custom PIN on the SIM card(s).

Note: Only phones that are not locked by the service provider can lock the SIM card.

Audit:

Follow the below steps to verify that Lock SIM card is enabled:

1. Tap the System Settings Gear Icon.


2. Scroll to Personal.
3. Tap Security.
4. Tap Set up SIM card lock.
5. Verify that Lock SIM card is enabled.
6. If you have more than one SIM card, click on the 2nd SIM card tab and verify that
Lock SIM card is enabled there as well.

Remediation:

Follow the below steps to enable Lock SIM card:

1. Call up your SIM card provider and get the default SIM PIN.
2. Tap the System Settings Gear Icon.
3. Scroll to Personal.
4. Tap Security.
5. Tap Set up SIM card lock.
6. Tap Lock SIM card.
7. Enter the default PIN provided by your SIM provider.
8. Press OK.
9. The Lock SIM card option will then be enabled.

32 | P a g e
10. Tap on Change SIM PIN.
11. Again provide the default PIN provided (Old PIN) by your SIM card provider.
12. Type your new custom PIN.
13. Re-type your new custom PIN.
14. Press OK.
15. Your custom SIM PIN is then set.
16. Repeat the process for your 2nd SIM, if applicable.

Impact:

You would need to remember your SIM card PIN. If you forget your SIM card PIN, you need
your SIM card provider support for unlocking the SIM card.

Default Value:

By default, Lock SIM card is disabled. Also, the SIM card has a default PIN set by the
provider which is usually universally known.

References:

1. https://support.google.com/android-one/answer/6174402?hl=en-GB

33 | P a g e
1.15 Ensure Android Device Manager is set to Enabled (Not Scored)
Profile Applicability:

 Level 2

Description:

Setup Android Device Manager as a Device Administrator.

Rationale:

If you lose your Android device, you could use Android Device Manager to find your device
and also ring, lock, or erase your device data remotely.

Audit:

Follow the below steps to verify that Android Device Manager is enabled:

1. Tap the System Settings Gear Icon.


2. Scroll to Personal.
3. Tap Security.
4. Scroll to Device administration.
5. Tap Device administrators.
6. Verify that Android Device Manager is enabled.

Remediation:

Follow the below steps to enable Android Device Manager:

1. Tap the System Settings Gear Icon.


2. Scroll to Personal.
3. Tap Security.
4. Scroll to Device administration.
5. Tap Device administrators.
6. Tap Android Device Manager.
7. Tap Activate this device administrator.

Impact:

Google may track your device location anytime.

Default Value:

By default, Android Device Manager is not enabled.

34 | P a g e
References:

1. https://support.google.com/pixelphone/answer/3265955

35 | P a g e
1.16 Ensure 'Speak passwords' is set to Disabled (Not Scored)
Profile Applicability:

 Level 1

Description:

Disable Speak Passwords.

Rationale:

Speak passwords is an accessibility feature. When enabled, the device speaks password
characters loud and clear. To protect your privacy and account, it is recommended that
Speak passwords setting is disabled.

Audit:

Follow the below steps to verify that Speak passwords setting is disabled:

1. Tap System Settings Gear Icon.


2. Scroll to System.
3. Tap Accessibility.
4. Scroll to System.
5. Verify that Speak passwords setting is disabled.

Remediation:

Follow the below steps to disable Speak passwords setting:

1. Tap System Settings Gear Icon.


2. Scroll to System.
3. Tap Accessibility.
4. Scroll to System.
5. Toggle Speak passwords to Off position.

Impact:

If you are dependent on this accessibility feature, do not disable it. Else, there is no impact.

Default Value:

By default, Speak passwords setting is disabled.

36 | P a g e
References:

1. https://support.google.com/accessibility/android/answer/6006977?hl=en

37 | P a g e
1.17 Ensure 'Automatic date & time' and 'Automatic time zone' are set
to Enabled (Not Scored)
Profile Applicability:

 Level 1

Description:

Enable Automatic date & time. For this setting to work correctly, Automatic time
zone setting should also be enabled.

Rationale:

Automatic date & time setting fetches the date and time information from the cellular
provider and is generally more accurate and reliable than your own managed and set date
and time. Accurate date and time could help in forensics, device recovery through Android
Device Manager and maintain application and logs in a time-sync manner.

Audit:

Follow the below steps to verify that Automatic date & time setting is enabled:

1. Tap System Settings Gear Icon.


2. Scroll to System.
3. Tap Date & time.
4. Verify that Automatic date & time setting is enabled.
5. Verify that Automatic time zone setting is enabled as well.

Remediation:

Follow the below steps to enable Automatic date & time and Automatic time zone
settings:

1. Tap System Settings Gear Icon.


2. Scroll to System.
3. Tap Date & time.
4. Toggle Automatic date & time setting to On position.
5. Toggle Automatic time zone setting to On position.

Impact:

None

38 | P a g e
Default Value:

By default, Automatic date & time and Automatic time zone settings are disabled.

References:

1. https://support.google.com/nexus/answer/2841106?hl=en

39 | P a g e
1.18 Ensure 'Remotely locate this device' is set to Enabled (Not Scored)
Profile Applicability:

 Level 1

Description:

Enable remotely locating the device.

Rationale:

Remotely locate this device setting helps you to track your lost device using Android
Device Manager. It must be enabled for improving the recovery possibility of your device.

Audit:

Follow the below steps to verify that Remotely locate this device setting is enabled:

1. Tap System Settings Gear Icon.


2. Scroll to Personal.
3. Tap Google.
4. Tap Security.
5. Verify that Remotely locate this device setting is enabled.

Remediation:

Follow the below steps to enable Remotely locate this device:

1. Tap System Settings Gear Icon.


2. Scroll to Personal.
3. Tap Google.
4. Tap Security.
5. Toggle Remotely locate this device setting to On position.

Impact:

This setting requires you to keep location services enabled all the time. This might be a
privacy issue for you.

Default Value:

By default, Remotely locate this device setting is enabled.

40 | P a g e
References:

1. https://support.google.com/accounts/answer/3265955#location
2. https://support.google.com/nexus/answer/6160491?hl=en

41 | P a g e
1.19 Ensure 'Allow remote lock and erase' is set to Enabled (Not Scored)
Profile Applicability:

 Level 1

Description:

Enable remotely locking and erasing the device.

Rationale:

Allow remote lock and erase setting helps you to remotely lock your device or erase
your data through Android Device Manager. This helps you to safeguard your privacy and
protect your data from unsanctioned access.

Audit:

Follow the below steps to verify that Allow remote lock and erase setting is enabled:

1. Tap System Settings Gear Icon.


2. Scroll to Personal.
3. Tap Google.
4. Tap Security.
5. Verify that Allow remote lock and erase setting is enabled.

Remediation:

Follow the below steps to enable Allow remote lock and erase:

1. Tap System Settings Gear Icon.


2. Scroll to Personal.
3. Tap Google.
4. Tap Security.
5. Toggle Allow remote lock and erase setting to On position.

Impact:

This setting requires you to keep location services enabled all the time. This might be a
privacy issue for you.

Default Value:

By default, Allow remote lock and erase setting is enabled.

42 | P a g e
References:

1. https://support.google.com/accounts/answer/3265955#location
2. https://support.google.com/nexus/answer/6160491?hl=en

43 | P a g e
1.20 Ensure 'Scan device for security threats' is set to Enabled (Not
Scored)
Profile Applicability:

 Level 1

Description:

Scan device for security threats.

Rationale:

Scan device for security threats setting lets Google regularly check your device and
prevent or warn about potential harm. This should be always enabled.

Audit:

Follow the below steps to verify that Scan device for security threats setting is
enabled:

1. Tap System Settings Gear Icon.


2. Scroll to Personal.
3. Tap Google.
4. Tap Security.
5. Verify that Scan device for security threats setting is enabled.

Remediation:

Follow the below steps to enable Scan device for security threats:

1. Tap System Settings Gear Icon.


2. Scroll to Personal.
3. Tap Google.
4. Tap Security.
5. Toggle Scan device for security threats setting to On position.

Impact:

None

Default Value:

By default, Scan device for security threats setting is enabled.

44 | P a g e
References:

1. https://support.google.com/nexus/answer/2812853?hl=en

45 | P a g e
1.21 Ensure 'Improve harmful app detection' is set to Enabled (Not
Scored)
Profile Applicability:

 Level 1

Description:

Improve detection of harmful apps.

Rationale:

Enabling Improve harmful app detection setting sends anonymous information to


Google about apps that were not installed from Google Play. This is especially true if you
choose to install apps from "Unknown sources" outside of the Google Play Store. This
information helps Google better protect everyone from harmful apps.

Audit:

Follow the below steps to verify that Improve harmful app detection setting is enabled:

1. Tap System Settings Gear Icon.


2. Scroll to Personal.
3. Tap Google.
4. Tap Security.
5. Verify that Improve harmful app detection setting is enabled.

Remediation:

Follow the below steps to enable Improve harmful app detection:

1. Tap System Settings Gear Icon.


2. Scroll to Personal.
3. Tap Google.
4. Tap Security.
5. Toggle Improve harmful app detection setting to On position.

Impact:

User data needs to be sent to Google that may incur data charges based on your carrier.
Also, this user data might contain, but not restricted to, log information, URLs related to the
app, device ID, your Android version, and IP address.

46 | P a g e
Default Value:

By default, Improve harmful app detection setting is enabled.

References:

1. https://support.google.com/nexus/answer/2812853?hl=en

47 | P a g e
1.22 Ensure 'Ask for unlock pattern/PIN/password before unpinning' is
set to Enabled (Not Scored)
Profile Applicability:

 Level 1

Description:

Unpinning should require re-authentication.

Rationale:

Your might lend your device to a friend or anyone else for carrying out a single task such as
make an emergency phone call or play a game. You should use screen pinning in such a
situation. It locks the users to the particular screen that you handed over the device with.
Users cannot use the device outside of that application until the screen is unpinned.
Unpinning screen should require re-authentication.

Audit:

Follow the below steps to verify that Ask for pattern/PIN/password before unpinning
setting is enabled:

1. Tap the System Settings Gear Icon.


2. Scroll to Personal.
3. Tap Security.
4. Scroll to Advanced.
5. Tap Screen pinning.
6. If Screen Pinning is On, then verify that Ask for pattern/PIN/password before
unpinning setting is enabled.

Remediation:

Follow the below steps to enable Ask for pattern/PIN/password before unpinning:

1. Tap the System Settings Gear Icon.


2. Scroll to Personal.
3. Tap Security.
4. Scroll to Advanced.
5. Tap Screen pinning.
6. If you are using Screen Pinning, then toggle Ask for pattern/PIN/password
before unpinning setting to On position.

48 | P a g e
Impact:

None

Default Value:

By default, if you enable Screen pinning, then Ask for pattern/PIN/password before
unpinning setting is also enabled if you have previously chosen to lock your device with
a pattern, PIN or password. If you have previously chosen to not lock your device, you
would be required to set it up by tapping Lock device when unpinning after enabling
Screen pinning.

References:

1. https://support.google.com/nexus/answer/6118421?hl=en&ref_topic=7029159

49 | P a g e
1.23 Ensure 'Sleep' is set to 1 minute or less (Not Scored)
Profile Applicability:

 Level 1

Description:

Set Sleep setting to 1 minute of less.

Rationale:

You should set inactivity timeout to avoid unsanctioned usage of the device if you leave it
unattended. The inactivity timeout not only blackens your screen after stipulated time
period but also kicks in other security features such as screen lock that protect your device
when you leave it unattended.

Audit:

Follow the below steps to verify that Sleep setting is set to 1 minute or less:

1. Tap on System Settings Gear Icon.


2. Scroll to Device.
3. Tap Display.
4. Verify that Sleep is set to 1 minute or less.

Remediation:

Follow the below steps to set Sleep setting to 1 minute or less:

1. Tap on System Settings Gear Icon.


2. Scroll to Device.
3. Tap Display.
4. Tap Sleep.
5. Tap on time duration of 1 minute or less.

Impact:

You would need to unlock your device after every time inactivity period is reached.

Default Value:

By default, Sleep is set to 1 minute of inactivity.

50 | P a g e
References:

1. https://support.google.com/pixelphone/answer/6111557

51 | P a g e
1.24 Ensure 'Wi-Fi assistant' is set to Disabled (Not Scored)
Profile Applicability:

 Level 1

Description:

Disable automatically connecting your device to open Wi-Fi.

Rationale:

Wi-Fi assistant automatically connects to any open Wi-Fi and tunnel the connection
through Google VPN servers. Even with the level of security included when this setting is
enabled, it is recommended that users only connect to trusted networks manually and to
leave this setting disabled.

Audit:

Follow the below steps to verify that Wi-Fi assistant is disabled:

1. Tap System Settings Gear Icon.


2. Scroll to Personal section.
3. Tap Google.
4. Tap Networking.
5. Verify that Wi-Fi assistant is turned off.

Remediation:

Follow the below steps to disable Wi-Fi assistant:

1. Tap System Settings Gear Icon.


2. Scroll to Personal section.
3. Tap Google.
4. Tap Networking.
5. Toggle Wi-Fi assistant to Off position.

Impact:

You would not benefit from open Wi-Fi connections and would require using cellular data.

52 | P a g e
Default Value:

By default, Wi-Fi assistant setting is enabled.

Note: on the Verizon Variant this setting is disabled. Also, this feature is available only on
Pixel phones and Nexus devices running Android 5.1 and up in the selected countries.

References:

1. https://support.google.com/nexus/answer/6327199?hl=en

53 | P a g e
1.25 Keep device Apps up to date (Not Scored)
Profile Applicability:

 Level 1

Description:

Regularly update your device apps.

Rationale:

Keeping apps updated gives you access to the latest features and improves app security
and stability. This has similar advantages as patching. Hence, keep your device apps
updated.

Audit:

Follow the below steps to verify that Apps are up to date:

1. Tap Launcher.
2. Launch Playstore App in the App drawer.
3. Tap Menu.
4. Tap My apps & Games.
5. Verify that all apps are up to date.

Remediation:

Follow the below steps to update all Apps:

1. Tap Launcher.
2. Launch Playstore App in the App drawer.
3. Tap Menu.
4. Tap My apps & Games.
5. If there are any updates pending, then tap Update All.

Impact:

You might incur data charges.

Default Value:

By default, apps are automatically updated. If cellular data is not a concern or secure Wi-Fi
is available then you can leave the default Playstore app setting to auto update the apps to
ensure that apps are updated automatically.

54 | P a g e
References:

1. https://support.google.com/googleplay/answer/113412?hl=en-IN

55 | P a g e
1.26 Ensure 'Add users when device is locked' is set to Disabled (Not
Scored)
Profile Applicability:

 Level 1

Description:

Do not allow adding users on a locked device.

Rationale:

Users and the guest profile can do most of the same things as the device's owner, but each
profile has its own storage space. Guests could install malicious apps or carry out any other
malicious activities that may compromise overall device security. Also, Wi-Fi and Bluetooth
connections are shared which could give guests unauthorized access to networks/devices
that could compromise data. Hence, Add users when device is locked setting should be
disabled.

Audit:

Follow the below steps to verify that Add users when device is locked setting is
disabled:

1. Tap System Settings Gear Icon.


2. Scroll to Device section.
3. Tap Users.
4. Verify that Add users when device is locked setting is disabled.

Remediation:

Follow the below steps to disable Add users when device is locked setting:

1. Tap System Settings Gear Icon.


2. Scroll to Device section.
3. Tap Users.
4. Toggle Add users when device is locked setting to Off position.

Impact:

Users will not be able to add additional users when the device is locked.

56 | P a g e
Default Value:

By default, Add users when device is locked setting is enabled.

References:

1. https://support.google.com/pixelphone/answer/2865944

57 | P a g e
1.27 Ensure 'Guest profiles' do not exist (Not Scored)
Profile Applicability:

 Level 1

Description:

Do not add any guest profiles on the device.

Rationale:

Users and the guest profile can do most of the same things as the device's owner, but each
profile has its own storage space. Guests could install malicious apps or carry out any other
malicious activities that may compromise overall device security. Also, Wi-Fi and Bluetooth
connections are shared which could give guests unauthorized access to networks/devices
that could compromise data. Hence, do not add any guest profiles on the device.

If you need to give your device to someone for temporary use, use Screen Pinning to
restrict access to the desired app and be in the complete visibility of your device all the
time.

Audit:

Follow the below steps to verify that the Guest profile do not exist:

1. Tap System Settings Gear Icon.


2. Scroll to Device section.
3. Tap Users.
4. Verify that Guests is grayed out.

Remediation:

Follow the below steps remove the Guest profile:

1. Open Quick Settings drawer.


2. Tap the Profile icon.
3. Switch to Guest profile.
4. Tap Remove guest.
5. Confirm removal by tapping remove.

58 | P a g e
Impact:

None

Default Value:

By default, Guest profiles do not exist.

References:

1. https://support.google.com/pixelphone/answer/2865944
2. https://support.google.com/pixelphone/answer/6115141?hl=en&ref_topic=70834
08

59 | P a g e
1.28 Review app permissions periodically (Not Scored)
Profile Applicability:

 Level 1

Description:

Review your device app's permissions periodically.

Rationale:

App permissions allow you to control which capabilities or information apps could access
on your device. This can extend from using device hardware to using your personal data.
You should periodically review your all app's permissions and ensure that those apps have
legitimate permissions. Uninstall apps that over-seek permissions.

Audit:

Follow the below steps to review your app permissions:

1. Tap System Settings Gear Icon.


2. Scroll to Device.
3. Tap Apps.
4. Tap the gear icon on the top right corner.
5. Tap App permissions.
6. Tap on each permission and review the apps that have them.
7. After you have carried out the above steps, come back and scroll to Advanced.
8. Tap Special Access.
9. Tap on each permission and review the apps that have them.

Remediation:

Follow the below steps to set your app permissions appropriately:

1. Tap System Settings Gear Icon.


2. Scroll to Device.
3. Tap Apps.
4. Tap the gear icon on the top right corner.
5. Tap App permissions.
6. Tap on each permission and review the apps that have them.
7. Disable the app permissions that you feel are over-permissive.
8. After you have carried out the above steps, come back and scroll to Advanced.
9. Tap Special Access.
10. Tap on each permission and review the apps that have them.

60 | P a g e
11. Disable the app permissions that you feel are over-permissive.

Impact:

Some of the apps tend to have more than required permissions. Such apps might not work
if you disable the permissions it originally asked for. Also, if you disable the needed
permissions, you may not be able to use the app and might have to re-install it.

Default Value:

By default, apps seek permissions on first use or during installation.

References:

1. https://support.google.com/googleplay/answer/6270602?hl=en-IN

61 | P a g e
1.29 Ensure Wi-Fi hotspot security is set to WPA2-PSK (Not Scored)
Profile Applicability:

 Level 1

Description:

Secure your Wi-Fi hotspot with WPA2-PSK.

Rationale:

You could set up a Wi-Fi hotspot on your device. Securing it with WPA2-PSK ensures that the
connection to this Wi-Fi hotspot could be established only with a password and the data is
encrypted in transit. Using WPA2-PSK, the wireless access point uses the common
passphrase to generate unique encryption keys for each wireless client. If you set security
to None, the Wi-Fi hotspot does not require any authentication and all data could be
possibly captured.

Audit:

Follow the below steps to verify that Wi-Fi hotspot security is set to WPA2-PSK:

1. Tap on System Settings Gear Icon.


2. Scroll to Wireless & networks.
3. Tap '... More'.
4. Tap Tethering & mobile hotspot.
5. Tap Set up Wi-Fi hotspot.
6. Verify that Security setting is set to WPA2-PSK.

Remediation:

Follow the below steps to set Wi-Fi hotspot security to WPA2-PSK:

1. Tap on System Settings Gear Icon.


2. Scroll to Wireless & networks.
3. Tap '... More'.
4. Tap Tethering & mobile hotspot.
5. Tap Set up Wi-Fi hotspot.
6. Tap Security setting and set it to WPA2-PSK.
7. Choose the desired Password.
8. Tap Save.

62 | P a g e
Impact:

None

Default Value:

By default, Wi-Fi hotspot security is set to WPA2-PSK.

References:

1. https://support.google.com/fi/answer/6182204
2. https://support.google.com/nexus/answer/2812516
3. https://stage.juniper.net/techpubs/en_US/junos-space-apps12.3/network-
director/topics/concept/wireless-wpa-psk-authentication.html

63 | P a g e
2 Android OS Privacy Settings
This section provides the privacy-related recommendation for Android OS.

2.1 Ensure 'Notifications on the lock screen' is set to Disabled (Not


Scored)
Profile Applicability:

 Level 1

Description:

Disable notifications on the lock screen.

Rationale:

If the device is lost or is unattended, then disabling notifications do not display any
notification information on the locked screen. This information might be private or
confidential and thus unwarranted disclosures could be avoided.

Audit:

To verify Notifications on the lock screen are set to Don't show notifications at all:

1. Tap System Settings Gear Icon.


2. Scroll to Device section.
3. Tap Notifications.
4. Tap the gear icon.
5. Verify that On the lock screen is set to Don't show notifications at all.

Remediation:

Follow the below steps to set the On the lock screen to Don't show notifications at
all.

1. Tap System Settings Gear Icon.


2. Scroll to Device section.
3. Tap Notifications.
4. Tap the gear icon.
5. Tap On the lock screen and set it to Don't show notifications at all.

64 | P a g e
Impact:

The user will not be able to see contents of notifications on lock screen requiring her to
unlock the device each time.

Default Value:

By default, notification content is shown on the locked screen.

References:

1. https://support.google.com/pixelphone/answer/6111294?hl=en&ref_topic=70782
21

65 | P a g e
2.2 Ensure 'Location Services' is set to Disabled (Not Scored)
Profile Applicability:

 Level 2

Description:

Disable Location Services when not in use.

Rationale:

Location Services allows applications such as Maps and Internet websites to gather and use
data indicating the user's location. The user's location is determined using available
information from cellular network data, local Wi-Fi networks, Bluetooth and GPS. If the
user turns off Location Services, the user will be prompted to turn it back on again the next
time any application tries to use this feature.

Disabling location services reduces the capability of an attacker to determine or track the
user's location via websites, locally installed applications or other means without user's
consent. Thus, it should be disabled when not in use.

Note: Location service is very important for tracking your lost device if the device data is
not disabled. Make a judicious call and decide what works best for you or in your
environment.

Audit:

Follow the below steps to verify that Location services is disabled:

1. Tap System Settings Gear Icon.


2. Scroll to Personal.
3. Verify that Location is OFF.

Remediation:

Follow the below steps to disable Location Services:

1. Tap System Settings Gear Icon.


2. Scroll to Personal.
3. Tap Location.
4. Toggle it to Off position.

66 | P a g e
Impact:

Each time an application needs location data, the user activity would be interrupted to
enable the location services.

Another impact could be on finding your lost device. If the device is lost and the location
services are disabled, you cannot use remote locate services such as Android Device
Manager.

Default Value:

By default, Location Services is enabled.

References:

1. https://support.google.com/pixelphone/answer/3467281?hl=en&ref_topic=70838
17

67 | P a g e
2.3 Ensure 'Back up to Google Drive' is Disabled (Not Scored)
Profile Applicability:

 Level 2

Description:

Disable Backup to Google Drive.

Rationale:

You can back up content, data, and settings from your device to your Google Account. You
can then later restore your backed-up information to another device. Due to privacy
concerns, backing up personal data such as text messages, emails, photos and contacts to
any third party is not recommended unless you accept the risk of sharing the data with the
3rd party. Moreover, if you are using a personal device for business apps such as emails,
that data might be backed up as well in the Google Drive related to your personal account
and might be exposed. Hence, disable the automatic backup to Google drive and carefully
choose what data backup you need.

Audit:

Follow the below steps to verify Back up to Google Drive is disabled:

1. Tap System Settings Gear Icon.


2. Scroll to Personal.
3. Tap Backup & reset.
4. Tap Device Backup.
5. Verify that Back up to Google Drive is Off.

Remediation:

Follow the below steps to disable Back up to Google Drive:

1. Tap System Settings Gear Icon.


2. Scroll to Personal.
3. Tap Backup & reset.
4. Tap Device Backup.
5. Tap Back up to Google Drive.
6. Toggle it to Off position.
7. Tap OK on warning popup.

68 | P a g e
Impact:

A backup of the device will not be taken and hence restoration would not be possible. Also,
the user would have to carefully choose the data to be backed up and manually back it up
periodically.

Default Value:

By default, Back up to Google Drive is disabled.

References:

1. https://support.google.com/pixelphone/answer/7179901?hl=en

69 | P a g e
2.4 Ensure 'Signed-out search activity' is set to Disabled (Not Scored)
Profile Applicability:

 Level 1

Description:

Disable linking your searches to your account when logged out.

Note: This setting is not applicable for Google Pixel range of devices.

Rationale:

Signed-out search activity setting controls if your searches on the device are linked to
your account even if you are logged out. If you keep this setting enabled, your search
results are tweaked to list more personalized results even if you are logged out. This is a
form of activity and profile building and might be privacy-invasive. It is recommended that
you turn this off.

Audit:

Follow the below steps to verify that Signed-out search activity setting is disabled:

1. Tap System Settings Gear Icon.


2. Scroll to Personal.
3. Tap Google.
4. Tap Search & Now.
5. Tap Accounts & privacy.
6. Tap Signed-out search customization.
7. Verify that Signed-out search activity setting is disabled.

Remediation:

Follow the below steps to disable Signed-out search activity:

1. Tap System Settings Gear Icon.


2. Scroll to Personal.
3. Tap Google.
4. Tap Search & Now.
5. Tap Accounts & privacy.
6. Tap Signed-out search customization.
7. Toggle Signed-out search activity setting to Off position.

70 | P a g e
Impact:

You will not get personalized search results when you are logged out.

Default Value:

By default, Signed-out search activity setting is enabled.

References:

1. http://www.techgainer.com/disable-prevent-google-web-search-history/
2. https://support.google.com/nexus/answer/54068?co=GENIE.Platform%3DAndroi
d&hl=en

71 | P a g e
2.5 Ensure 'Web and App Activity' is set to Disabled (Not Scored)
Profile Applicability:

 Level 1

Description:

Disable linking of web and app activity to your account when you are logged out.

Note: This setting is applicable only for Google Pixel range of devices.

Rationale:

When this setting is enabled, your searches and activity from other Google services are
linked and saved to your Google Account, even when you are logged out or offline. This
could be privacy-invasive and hence it is recommended to disable this setting.

Audit:

Follow the below steps to verify that Web & App Activity setting is disabled:

1. Tap System Settings Gear Icon.


2. Scroll to Personal section.
3. Tap Google.
4. Tap Search & Now.
5. Tap Accounts & Privacy.
6. Tap Google Activity Controls.
7. Verify that Web & App Activity setting is disabled.

Remediation:

Follow the below steps to disable Web & App Activity setting:

1. Tap System Settings Gear Icon.


2. Scroll to Personal section.
3. Tap Google.
4. Tap Search & Now.
5. Tap Accounts & Privacy.
6. Tap Google Activity Controls.
7. Toggle Web & App Activity setting to Off position.

72 | P a g e
Impact:

Web and App activities would not be linked to your account. You might not get
personalized user experience.

Default Value:

By default, Web & App Activity is enabled.

References:

1. https://support.google.com/pixelphone/answer/6139018?co=GENIE.Platform%3D
Desktop&hl=en
2. https://support.google.com/websearch/answer/54068

73 | P a g e
2.6 Ensure 'Device Information' is set to Disabled (Not Scored)
Profile Applicability:

 Level 1

Description:

Disable storing device information to your account.

Note: This setting is applicable only for Google Pixel range of devices.

Rationale:

Turning on Device Information setting saves various device related information to your
account to give you personalized results, suggestions, and experiences. The information
saved might include contact lists, calendars, alarms, apps, and music. Additionally,
information such as whether the screen is on, the battery level, the quality of your Wi-Fi or
Bluetooth connection, touchscreen and sensor readings, and crash reports are also saved
and shared with Google. This could be privacy-invasive and hence it is recommended to
disable this setting.

Audit:

Follow the below steps to verify that Device Information setting is disabled:

1. Tap System Settings Gear Icon.


2. Scroll to Personal section.
3. Tap Google.
4. Tap Search & Now.
5. Tap Accounts & Privacy.
6. Tap Google Activity Controls.
7. Verify that Device Information setting is disabled.

Remediation:

Follow the below steps to disable Device Information setting:

1. Tap System Settings Gear Icon.


2. Scroll to Personal section.
3. Tap Google.
4. Tap Search & Now.
5. Tap Accounts & Privacy.
6. Tap Google Activity Controls.

74 | P a g e
7. Toggle Device Information setting to Off position.

Impact:

You might not get personalized user experience.

Default Value:

By default, Device Information is enabled.

References:

1. https://support.google.com/pixelphone/answer/6139018?co=GENIE.Platform%3D
Desktop&hl=en
2. https://support.google.com/accounts/answer/6135999

75 | P a g e
2.7 Ensure 'Voice & Audio Activity' is set to Disabled (Not Scored)
Profile Applicability:

 Level 1

Description:

Disable saving your voice and other audio to your Google Account.

Note: This setting is applicable only for Google Pixel range of devices.

Rationale:

Google records your voice and other audio when you use audio activations. Audio can be
saved even when your device is offline. When Voice & Audio Activity is off, voice inputs
won't be saved to your Google Account, even if you're signed in. Instead, they may only be
saved using anonymous identifiers. This could be privacy-invasive and hence it is
recommended to disable this setting.

Audit:

Follow the below steps to verify that Voice & Audio Activity setting is disabled:

1. Tap System Settings Gear Icon.


2. Scroll to Personal section.
3. Tap Google.
4. Tap Search & Now.
5. Tap Accounts & Privacy.
6. Tap Google Activity Controls.
7. Verify that Voice & Audio Activity setting is disabled.

Remediation:

Follow the below steps to disable Voice & Audio Activity setting:

1. Tap System Settings Gear Icon.


2. Scroll to Personal section.
3. Tap Google.
4. Tap Search & Now.
5. Tap Accounts & Privacy.
6. Tap Google Activity Controls.
7. Toggle Voice & Audio Activity setting to Off position.

76 | P a g e
Impact:

You might not get personalized user experience.

Default Value:

By default, Voice & Audio Activity setting is enabled.

References:

1. https://support.google.com/pixelphone/answer/6139018?co=GENIE.Platform%3D
Desktop&hl=en
2. https://support.google.com/websearch/answer/6030020

77 | P a g e
2.8 Ensure 'YouTube Search History' is set to Disabled (Not Scored)
Profile Applicability:

 Level 1

Description:

Disable storing YouTube Search History to your account.

Note: This setting is applicable only for Google Pixel range of devices.

Rationale:

Turning on YouTube Search History setting links and stores all your YouTube searches to
your account across any device. Also, your YouTube and Google search history influences
the recommendations that you see on your YouTube homepage when you are logged-in.
This could be privacy-invasive and hence it is recommended to disable this setting.

Audit:

Follow the below steps to verify that YouTube Search History setting is disabled:

1. Tap System Settings Gear Icon.


2. Scroll to Personal section.
3. Tap Google.
4. Tap Search & Now.
5. Tap Accounts & Privacy.
6. Tap Google Activity Controls.
7. Verify that YouTube Search History setting is disabled.

Remediation:

Follow the below steps to disable YouTube Search History setting:

1. Tap System Settings Gear Icon.


2. Scroll to Personal section.
3. Tap Google.
4. Tap Search & Now.
5. Tap Accounts & Privacy.
6. Tap Google Activity Controls.
7. Toggle YouTube Search History setting to Off position.

78 | P a g e
Impact:

You might not get personalized user experience.

Default Value:

By default, YouTube Search History setting is enabled.

References:

1. https://support.google.com/pixelphone/answer/6139018?co=GENIE.Platform%3D
Desktop&hl=en
2. https://support.google.com/youtube/answer/57711

79 | P a g e
2.9 Ensure 'YouTube Watch History' is set to Disabled (Not Scored)
Profile Applicability:

 Level 1

Description:

Disable storing YouTube Watch History to your account.

Note: This setting is applicable only for Google Pixel range of devices.

Rationale:

Turning on YouTube Watch History setting links and stores all your watched YouTube
videos to your account from any device. Also, this influences the recommendations that you
see on your YouTube homepage when you are logged-in and other YouTube video
recommendations. This could be privacy-invasive and hence it is recommended to disable
this setting.

Audit:

Follow the below steps to verify that YouTube Watch History setting is disabled:

1. Tap System Settings Gear Icon.


2. Scroll to Personal section.
3. Tap Google.
4. Tap Search & Now.
5. Tap Accounts & Privacy.
6. Tap Google Activity Controls.
7. Verify that YouTube Watch History is disabled.

Remediation:

Follow the below steps to disable YouTube Watch History setting:

1. Tap System Settings Gear Icon.


2. Scroll to Personal section.
3. Tap Google.
4. Tap Search & Now.
5. Tap Accounts & Privacy.
6. Tap Google Activity Controls.
7. Toggle YouTube Watch History setting to Off position.

80 | P a g e
Impact:

You might not get personalized user experience.

Default Value:

By default, YouTube Watch History setting is enabled.

References:

1. https://support.google.com/pixelphone/answer/6139018?co=GENIE.Platform%3D
Desktop&hl=en
2. https://support.google.com/youtube/answer/95725

81 | P a g e
2.10 Ensure 'Google Location History' is set to Disabled (Not Scored)
Profile Applicability:

 Level 1

Description:

Disable storing your location history.

Note: This setting is applicable only for Google Pixel range of devices.

Rationale:

When Google Location History setting is turned on, your device periodically sends
diagnostics information to Google about what’s working and what’s not working in relation
to Location History. Location History allows Google to regularly obtain location data from
the device. It also stores your Location History to provide results and recommendations
across Google products. This could be privacy-invasive and hence it is recommended to
disable this setting.

Audit:

Follow the below steps to verify that Google Location History setting is disabled:

1. Tap System Settings Gear Icon.


2. Scroll to Personal section.
3. Tap Google.
4. Tap Search & Now.
5. Tap Accounts & Privacy.
6. Tap Google Activity Controls.
7. Verify that Google Location History setting is turned off.

Remediation:

Follow the below steps to disable Google Location History setting:

1. Tap System Settings Gear Icon.


2. Scroll to Personal section.
3. Tap Google.
4. Tap Search & Now.
5. Tap Accounts & Privacy.
6. Tap Google Activity Controls.
7. Toggle Google Location History setting to Off position.

82 | P a g e
Impact:

You might not get personalized user experience.

Default Value:

By default, Google Location History setting is enabled.

References:

1. https://support.google.com/pixelphone/answer/6139018?co=GENIE.Platform%3D
Desktop&hl=en
2. https://support.google.com/accounts/answer/3118687

83 | P a g e
Appendix: Summary Table
Control Set
Correctly
Yes No
1 Android OS Security Settings
1.1 Ensure device firmware is up to date (Not Scored)  
1.2 Ensure 'Screen Lock' is set to Enabled (Not Scored)  
1.3 Ensure 'Make pattern visible' is set to Disabled (if using a
 
pattern as device lock mechanism) (Not Scored)
1.4 Ensure 'Automatically Lock' is set to 'Immediately' (Not
 
Scored)
1.5 Ensure 'Power button instantly locks' is set to Enabled (Not
 
Scored)
1.6 Ensure 'Lock Screen Message' is configured (Not Scored)  
1.7 Do not connect to untrusted Wi-Fi networks (Not Scored)  
1.8 Ensure 'Make passwords visible' is set to Disabled (Not
 
Scored)
1.9 Ensure 'Encrypt phone' or 'Encrypt tablet' is set to Enabled
 
(Not Scored)
1.10 Ensure 'Developer Options' is set to Disabled (Not Scored)  
1.11 Ensure 'Unknown sources' is set to Disabled (Not Scored)  
1.12 Do not root your device (Not Scored)  
1.13 Ensure 'Smart Lock' is set to Disabled (Not Scored)  
1.14 Ensure 'Lock SIM card' is set to Enabled (Not Scored)  
1.15 Ensure Android Device Manager is set to Enabled (Not
 
Scored)
1.16 Ensure 'Speak passwords' is set to Disabled (Not Scored)  
1.17 Ensure 'Automatic date & time' and 'Automatic time zone' are
 
set to Enabled (Not Scored)
1.18 Ensure 'Remotely locate this device' is set to Enabled (Not
 
Scored)
1.19 Ensure 'Allow remote lock and erase' is set to Enabled (Not
 
Scored)
1.20 Ensure 'Scan device for security threats' is set to Enabled (Not
 
Scored)
1.21 Ensure 'Improve harmful app detection' is set to Enabled (Not
 
Scored)
1.22 Ensure 'Ask for unlock pattern/PIN/password before
 
unpinning' is set to Enabled (Not Scored)
1.23 Ensure 'Sleep' is set to 1 minute or less (Not Scored)  
1.24 Ensure 'Wi-Fi assistant' is set to Disabled (Not Scored)  

84 | P a g e
1.25 Keep device Apps up to date (Not Scored)  
1.26 Ensure 'Add users when device is locked' is set to Disabled
 
(Not Scored)
1.27 Ensure 'Guest profiles' do not exist (Not Scored)  
1.28 Review app permissions periodically (Not Scored)  
1.29 Ensure Wi-Fi hotspot security is set to WPA2-PSK (Not
 
Scored)
2 Android OS Privacy Settings
2.1 Ensure 'Notifications on the lock screen' is set to Disabled
 
(Not Scored)
2.2 Ensure 'Location Services' is set to Disabled (Not Scored)  
2.3 Ensure 'Back up to Google Drive' is Disabled (Not Scored)  
2.4 Ensure 'Signed-out search activity' is set to Disabled (Not
 
Scored)
2.5 Ensure 'Web and App Activity' is set to Disabled (Not Scored)  
2.6 Ensure 'Device Information' is set to Disabled (Not Scored)  
2.7 Ensure 'Voice & Audio Activity' is set to Disabled (Not Scored)  
2.8 Ensure 'YouTube Search History' is set to Disabled (Not
 
Scored)
2.9 Ensure 'YouTube Watch History' is set to Disabled (Not
 
Scored)
2.10 Ensure 'Google Location History' is set to Disabled (Not
 
Scored)

85 | P a g e
Appendix: Change History
Date Version Changes for this version

01-24-2017 1.0.0 Initial release

86 | P a g e

You might also like