0% found this document useful (0 votes)
129 views99 pages

CIS Google Android Benchmark v1.3.0

Uploaded by

aguerey
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
129 views99 pages

CIS Google Android Benchmark v1.3.0

Uploaded by

aguerey
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 99

CIS Google Android Benchmark

v1.3.0 - 09-03-2019
Terms of Use
Please see the below link for our current terms of use:
https://www.cisecurity.org/cis-securesuite/cis-securesuite-membership-terms-of-use/

1|Page
Table of Contents

Terms of Use ........................................................................................................................................................... 1


Overview .................................................................................................................................................................. 5
Intended Audience ........................................................................................................................................... 5
Consensus Guidance........................................................................................................................................ 5
Typographical Conventions ......................................................................................................................... 6
Scoring Information ........................................................................................................................................ 6
Profile Definitions ............................................................................................................................................ 7
Acknowledgements ......................................................................................................................................... 8
Recommendations ................................................................................................................................................ 9
1 Android OS Security Settings ................................................................................................................... 9
1.1 (L1) Ensure device firmware is up to date (Not Scored) ............................................ 9
1.2 (L1) Ensure 'Screen Lock' is set to 'Enabled' (Not Scored) ..................................... 11
1.3 (L1) Ensure 'Make pattern visible' is set to 'Disabled' (if using a pattern as
device lock mechanism) (Not Scored) .................................................................................... 13
1.4 (L1) Ensure 'Automatically Lock' is set to 'Immediately' (Not Scored) ............. 15
1.5 (L1) Ensure 'Power button instantly locks' is set to 'Enabled' (Not Scored) ... 17
1.6 (L1) Ensure 'Lock Screen Message' is configured (Not Scored) ............................ 19
1.7 (L2) Do not connect to untrusted Wi-Fi networks (Not Scored) .......................... 21
1.8 (L2) Ensure 'Show passwords' is set to 'Disabled' (Not Scored) .......................... 23
1.9 (L1) Ensure 'Developer Options' is set to 'Disabled' (Not Scored) ...................... 25
1.10 (L1) Ensure 'Install unknown apps' is set to 'Disabled' (Not Scored) .............. 27
1.11 (L1) Do not root your device (Not Scored) ................................................................. 29
1.12 (L2) Ensure 'Smart Lock' is set to 'Disabled' (Not Scored) ................................... 31
1.13 (L2) Ensure 'Lock SIM card' is set to 'Enabled' (Not Scored) .............................. 33
1.14 (L2) Ensure 'Find My Device' is set to 'Enabled' (Not Scored) ............................ 35
1.15 (L1) Ensure 'Use network-provided time' and 'Use network-provided time
zone' are set to 'Enabled' (Not Scored) .................................................................................. 37
1.16 (L1) Ensure 'Remotely locate this device' is set to 'Enabled' (Not Scored) ... 39
1.17 (L1) Ensure 'Allow remote lock and erase' is set to 'Enabled' (Not Scored) . 41

2|Page
1.18 (L1) Ensure 'Scan device for security threats' is set to 'Enabled' (Not Scored)
................................................................................................................................................................ 43
1.19 (L1) Ensure 'Improve harmful app detection' is set to 'Enabled' (Not Scored)
................................................................................................................................................................ 45
1.20 (L1) Ensure 'Ask for unlock pattern/PIN/password before unpinning' is set
to 'Enabled' (Not Scored) ............................................................................................................. 47
1.21 (L1) Ensure 'Screen timeout' is set to '1 minute or less' (Not Scored) ............ 49
1.22 (L1) Ensure 'Wi-Fi assistant' is set to 'Disabled' (Not Scored)............................ 51
1.23 (L1) Keep device Apps up to date (Not Scored) ........................................................ 53
1.24 (L1) Ensure 'Add users from lock screen' is set to 'Disabled' (Not Scored)... 55
1.25 (L1) Ensure 'Guest profiles' do not exist (Not Scored)........................................... 57
1.26 (L1) Review app permissions periodically (Not Scored) ...................................... 59
1.27 (L1) Ensure 'Instant apps' is set to 'Disabled' (Not Scored) ................................. 61
2 Android OS Privacy Settings.................................................................................................................. 63
2.1 (L1) Ensure 'Lock screen' is set to 'Don't show notifications at all' (Not Scored)
................................................................................................................................................................ 63
2.2 (L2) Ensure 'Use location' is set to 'Disabled' (Not Scored) ................................... 65
2.3 (L2) Ensure 'Back up to Google Drive' is 'Disabled' (Not Scored) ........................ 67
2.4 (L1) Ensure 'Web and App Activity' is set to 'Disabled' (Not Scored) ................ 69
2.5 (L1) Ensure 'Device Information' is set to 'Disabled' (Not Scored) ..................... 71
2.6 (L1) Ensure 'Voice & Audio Activity' is set to 'Disabled' (Not Scored) ............... 73
2.7 (L1) Ensure 'YouTube Search History' is set to 'Disabled' (Not Scored) ........... 75
2.8 (L1) Ensure 'YouTube Watch History' is set to 'Disabled' (Not Scored) ............ 77
2.9 (L1) Ensure 'Google Location History' is set to 'Disabled' (Not Scored) ............ 79
2.10 (L1) Ensure 'Opt out of Ads Personalization' is set to 'Enabled' (Not Scored)
................................................................................................................................................................ 81
3 Android OS Chrome Browser Settings .............................................................................................. 83
3.1 (L1) Ensure 'Microphone' is set to 'Enabled' (Not Scored) ..................................... 83
3.2 (L1) Ensure 'Location' is set to 'Enabled' (Not Scored) ............................................ 85
3.3 (L1) Ensure 'Allow third-party cookies' is set to 'Disabled' (Not Scored) ........ 87
3.4 (L1) Ensure 'Safe Browsing' is set to 'Enabled' (Not Scored)................................. 89
3.5 (L2) Ensure 'Search and URL suggestions' is set to 'Disabled' (Not Scored) ... 91

3|Page
3.6 (L2) Ensure 'Do Not Track' is set to 'Enabled' (Not Scored) ................................... 93
Appendix: Summary Table ............................................................................................................................. 95
Appendix: Change History .............................................................................................................................. 97

4|Page
Overview
This document, Security Configuration Benchmark for Google Android, provides
prescriptive guidance for establishing a secure configuration posture for the Google
Android OS. This guide was tested against the Android 10.0.0 OS. This benchmark covers
Android 10.0.x and all hardware devices on which this OS is supported.

In determining recommendations, the current guidance treats all Android mobile device
platforms as having the same use cases and risk/threat scenarios. In all but a very few
cases, configuration steps, default settings, and benchmark recommended settings are
identical regardless of hardware platform. To obtain the latest version of this guide, please
visit http://cisecurity.org. If you have questions, comments, or have identified ways to
improve this guide, please write us at [email protected].

Intended Audience
This document is intended for system and application administrators, security specialists,
auditors, help desk, end users, and platform deployment personnel who plan to use,
develop, deploy, assess, or secure solutions that use Android 10.0.x

Consensus Guidance
This benchmark was created using a consensus review process comprised of subject
matter experts. Consensus participants provide perspective from a diverse set of
backgrounds including consulting, software development, audit and compliance, security
research, operations, government, and legal.

Each CIS benchmark undergoes two phases of consensus review. The first phase occurs
during initial benchmark development. During this phase, subject matter experts convene
to discuss, create, and test working drafts of the benchmark. This discussion occurs until
consensus has been reached on benchmark recommendations. The second phase begins
after the benchmark has been published. During this phase, all feedback provided by the
Internet community is reviewed by the consensus team for incorporation in the
benchmark. If you are interested in participating in the consensus process, please visit
https://workbench.cisecurity.org/.

5|Page
Typographical Conventions
The following typographical conventions are used throughout this guide:

Convention Meaning
Stylized Monospace font Used for blocks of code, command, and script examples.
Text should be interpreted exactly as presented.

Monospace font Used for inline code, commands, or examples. Text should
be interpreted exactly as presented.

<italic font in brackets> Italic texts set in angle brackets denote a variable
requiring substitution for a real value.

Italic font Used to denote the title of a book, article, or other


publication.

Note Additional information or caveats

Scoring Information
A scoring status indicates whether compliance with the given recommendation impacts the
assessed target's benchmark score. The following scoring statuses are used in this
benchmark:

Scored

Failure to comply with "Scored" recommendations will decrease the final benchmark score.
Compliance with "Scored" recommendations will increase the final benchmark score.

Not Scored

Failure to comply with "Not Scored" recommendations will not decrease the final
benchmark score. Compliance with "Not Scored" recommendations will not increase the
final benchmark score.

6|Page
Profile Definitions
The following configuration profiles are defined by this Benchmark:

 Level 1

Items in this profile intend to:

o be practical and prudent;


o provide a clear security benefit; and
o not negatively inhibit the utility of the technology beyond acceptable means.

 Level 2

This profile extends the "Level 1" profile. Items in this profile exhibit one or more of
the following characteristics:

o are intended for environments or use cases where security is paramount.


o acts as defense in depth measure.
o may negatively inhibit the utility or performance of the technology.

7|Page
Acknowledgements
This benchmark exemplifies the great things a community of users, vendors, and subject matter
experts can accomplish through consensus collaboration. The CIS community thanks the entire
consensus team with special recognition to the following individuals who contributed greatly to
the creation of this guide:

Editor
Jordan Rakoske GSEC, GCWN

8|Page
Recommendations
1 Android OS Security Settings
This section provides the security recommendation for Android OS.

1.1 (L1) Ensure device firmware is up to date (Not Scored)


Profile Applicability:

 Level 1

Description:

Ensure that the device is kept up to date with security patch levels.

The recommended state for this setting is: Apply updates.

Rationale:

Firmware updates often include critical security fixes that reduce the probability of an
attacker remotely exploiting the device. The device should be on the latest security patch
level as applicable.

Audit:

To verify that your device is updated to the most recent firmware version:

1. Tap Settings Gear Icon.


2. Tap System.
3. Tap Advanced.
4. Tap System update.
5. Verify that the Android Security patch level is current and that no new updates
exist.

Remediation:

Follow the below steps to check and update the device security patch level:

1. Tap Settings Gear Icon.


2. Tap System.
3. Tap Advanced.
4. Tap System Updates.
5. Tap Check for update.
9|Page
6. Apply the update, if available.

Impact:

None

Default Value:

By default, users are notified about security patch level updates but are not installed until
the user initiates the process.

References:

1. https://source.android.com/security/bulletin/index.html

CIS Controls:

Version 6

4 Continuous Vulnerability Assessment and Remediation


Continuous Vulnerability Assessment and Remediation

10 | P a g e
1.2 (L1) Ensure 'Screen Lock' is set to 'Enabled' (Not Scored)
Profile Applicability:

 Level 1

Description:

Enable Screen lock.

The recommended state for this setting is: Enabled.

Rationale:

Enabling Screen lock requires a form of user authentication before interacting with the
device. This strengthens application and data protection and overall improves the device
security.

Audit:

Verify that a Pattern, PIN or Password has been set for the device.

1. Tap Settings Gear Icon.


2. Tap Security.
3. Scroll to the Device Security section.
4. Verify that Screen lock has Pattern, PIN or Password underneath the text.

Remediation:

To configure a Pattern, PIN or Password for the device:

1. Tap Settings Gear Icon.


2. Tap Security.
3. Scroll to the Device Security section.
4. Tap Screen Lock.
5. Tap Pattern, PIN or Password.
6. Enter a complex Pattern, PIN or Password.
7. Tap Continue.
8. Enter in the same complex Pattern, PIN or Password again.
9. Tap OK.

Impact:

A user will be prompted to unlock the device on every use.

11 | P a g e
Default Value:

By default, screen lock is not set.

References:

1. https://support.google.com/android/answer/9079129?hl=en&ref_topic=7029556
&visit_id=636958548934918587-3326560713&rd=1

CIS Controls:

Version 6

16.5 Ensure Workstation Screen Locks Are Configured


Configure screen locks on systems to limit access to unattended workstations.

12 | P a g e
1.3 (L1) Ensure 'Make pattern visible' is set to 'Disabled' (if using a
pattern as device lock mechanism) (Not Scored)
Profile Applicability:

 Level 1

Description:

Disable pattern visibility if using a pattern as device lock mechanism.

The recommended state for this setting is: Disabled.

Rationale:

Keeping device unlock pattern visible during device unlock can reveal the pattern and is
vulnerable to shoulder surfing attack. Hence, do not make the device unlock pattern visible.

Audit:

Follow the below steps and verify that device unlock pattern is not visible:

1. Tap Settings Gear Icon.


2. Tap Security.
3. Scroll to the Device security section.
4. If Screen lock has Pattern underneath the text, follow further steps. If not, then
this recommendation is not applicable.
5. Tap the Gear Icon next to Screen lock.
6. Verify that the Make pattern visible switch is Disabled.

Remediation:

To disable device unlock pattern visibility, follow the below steps:

1. Tap Settings Gear Icon.


2. Tap Security.
3. Scroll to the Device security section.
4. If Screen lock has Pattern underneath the text, follow further steps. If not, then
this recommendation is not applicable.
5. Tap the Gear Icon next to Screen lock.
6. Toggle Make pattern visible to OFF position.

13 | P a g e
Impact:

The user would have to be careful while entering the device unlock pattern since visual
feedback would not provide any clues for tracing pattern input.

Default Value:

By default, device unlock pattern is visible.

References:

1. https://support.google.com/android/answer/9079129?hl=en&visit_id=636958548
934918587-3326560713&rd=1

CIS Controls:

Version 6

16 Account Monitoring and Control


Account Monitoring and Control

14 | P a g e
1.4 (L1) Ensure 'Automatically Lock' is set to 'Immediately' (Not Scored)
Profile Applicability:

 Level 1

Description:

Immediately lock the phone as soon as the device goes to sleep.

The recommended state for this setting is: Immediately.

Rationale:

Automatically and immediately locking the device as soon as it goes to sleep ensure that
there is no lag between the device entering the sleep state and the device getting locked. At
times, the user just rests the device and moves away from it. The phone eventually enters
the sleep state and automatically and immediately locking it ensures that no manual
locking of the device is needed. This ensures that the unattended devices are locked
immediately as soon as the device enters the sleep state.

Audit:

Follow the below steps and verify that Automatically Look is set to Immediately:

1. Tap Settings Gear Icon.


2. Tap Security.
3. Scroll to the Device security section.
4. Tap the Gear icon next to Screen lock.
5. Verify that Automatically lock has a text Immediately after sleep underneath it.

Remediation:

Follow the below steps and set Automatically Lock to Immediately:

1. Tap Settings Gear Icon.


2. Tap Security.
3. Scroll to the Device security section.
4. Tap the Gear icon next to Screen lock.
5. Tap Automatically lock.
6. Tap Immediately.

Impact:

None

15 | P a g e
Default Value:

By default, Automatically lock is set to 5 seconds after sleep.

CIS Controls:

Version 6

16.4 Automatically Log Off Users After Standard Period Of Inactivity


Regularly monitor the use of all accounts, automatically logging off users after a standard
period of inactivity.

16 | P a g e
1.5 (L1) Ensure 'Power button instantly locks' is set to 'Enabled' (Not
Scored)
Profile Applicability:

 Level 1

Description:

Pressing the power button should lock the device instantly.

The recommended state for this setting is: Enabled.

Rationale:

Pressing the power button instantly puts the phone to sleep. Enabling Power button
instantly locks setting ensures that the device is instantly locked as well.

Audit:

Follow the below steps and verify that Power button instantly locks is Enabled:

1. Tap Settings Gear Icon.


2. Tap Security.
3. Scroll to the Device security.
4. Tap the Gear icon next to Screen lock.
5. Verify that Power button instantly locks is Enabled.

Remediation:

Follow the below steps to enable the Power button instantly locks setting:

1. Tap Settings Gear Icon.


2. Tap Security.
3. Scroll to the Device security.
4. Tap the Gear icon next to Screen lock.
5. Toggle Power button instantly locks setting to ON position.

Impact:

None

Default Value:

By default, Power button instantly locks setting is enabled.

17 | P a g e
References:

1. https://support.google.com/android/answer/9079129?hl=en&visit_id=636958548
934918587-3326560713&rd=1

CIS Controls:

Version 6

16.5 Ensure Workstation Screen Locks Are Configured


Configure screen locks on systems to limit access to unattended workstations.

18 | P a g e
1.6 (L1) Ensure 'Lock Screen Message' is configured (Not Scored)
Profile Applicability:

 Level 1

Description:

Set a message to be displayed on the locked screen.

The recommended state for this setting is: Configure Lock Screen Message.

Rationale:

When device screen is locked, a lock screen message helps to provide

 deterrent warnings,
 device recognition without needing to unlock it and
 most importantly emergency information

Such information could be valuable to both your device security as well as personnel
security. It is thus recommended to have a suitable lock screen message.

Audit:

Follow the below steps and verify that Lock screen message is set:

1. Tap Settings Gear Icon.


2. Tap Display.
3. Tap Advanced.
4. Tap Lock screen display.
5. Scroll to the WHAT TO SHOW section.
6. Tap Lock screen message.
7. Verify that a suitable Lock screen message is set.

Remediation:

Follow the below steps to set up a Lock screen message:

1. Tap Settings Gear Icon.


2. Tap Display.
3. Tap Advanced.
4. Tap Lock screen display.
5. Scroll to the WHAT TO SHOW section.
6. Tap Lock screen message.

19 | P a g e
7. Write your message and tap Save.

Impact:

Anyone who picks up your device can see your message and emergency information
without unlocking your phone.

Default Value:

By default, no message is set.

CIS Controls:

Version 6

16.5 Ensure Workstation Screen Locks Are Configured


Configure screen locks on systems to limit access to unattended workstations.

20 | P a g e
1.7 (L2) Do not connect to untrusted Wi-Fi networks (Not Scored)
Profile Applicability:

 Level 2

Description:

Do not connect to untrusted Wi-Fi networks.

The recommended state for this setting is: Only connect to trusted networks.

Rationale:

Connecting a device to an open untrusted network through unsecured channels can


increase the remote attack surface of the device. Additionally, at present, the cellular data
network is a more difficult medium to sniff than Wi-Fi. If you are going to be using public
Wi-Fi, using a secure VPN is recommended. In most cases, you should avoid using a public
or untrusted or free Wi-Fi.

Audit:

Follow the below steps to verify that Wi-Fi is either disabled or not connected to an
untrusted network:

1. Tap Settings Gear Icon.


2. Tap Network & internet.
3. Verify that theWi-Fi switch is in the Off position or is connected to a trusted
network only.

Remediation:

Follow the below steps to disable Wi-Fi or connect to a trusted network:

1. Tap Settings Gear Icon.


2. Tap Network & internet.
3. Toggle Wi-Fi setting to the Off position or connect to a trusted network.

Impact:

You might have to use cellular data and would not be able to take advantage of Public Wi-
Fi.

21 | P a g e
Default Value:

NA

References:

1. https://support.google.com/android/answer/9075847?hl=en

CIS Controls:

Version 6

15.4 Configure Only Authorized Wireless Access On Client Machines


Where a specific business need for wireless access has been identified, configure
wireless access on client machines to allow access only to authorized wireless networks.
For devices that do not have an essential wireless business purpose, disable wireless access
in the hardware configuration (basic input/output system or extensible firmware
interface).

22 | P a g e
1.8 (L2) Ensure 'Show passwords' is set to 'Disabled' (Not Scored)
Profile Applicability:

 Level 2

Description:

Disable password visibility during input.

The recommended state for this setting is: Disabled.

Rationale:

This setting controls whether passwords typed into your Android device should be visible
on screen, or hidden by replacing the letters with dots. When this setting is off, the
password is obscured by dots, and only the most recent key pressed is visible for a short
time after it has been pressed. When this setting is on, the entire password can be viewed
in plain text, if desired.

Disabling this setting protects you against shoulder surfing attacks.

Audit:

Follow the below steps to verify Show passwords is set to Disabled:

1. Tap Settings Gear Icon.


2. Tap Privacy.
3. Verify that Show passwords slider is OFF.

Remediation:

Follow the below steps to disable Show passwords:

1. Tap Settings Gear Icon.


2. Tap Privacy.
3. Toggle Show passwords to OFF position.

Impact:

Given the relative difficulty of typing letters accurately on a small on-screen keyboard, it
can be helpful to get visual feedback on-screen that you have typed all the letters of your
password correctly. Disabling password visibility might impact user experience.

23 | P a g e
Default Value:

By default, passwords are visible.

CIS Controls:

Version 6

16.5 Ensure Workstation Screen Locks Are Configured


Configure screen locks on systems to limit access to unattended workstations.

24 | P a g e
1.9 (L1) Ensure 'Developer Options' is set to 'Disabled' (Not Scored)
Profile Applicability:

 Level 1

Description:

Disable Developer Options.

The recommended state for this setting is: Disabled.

Rationale:

Enabling Developer Options allows a user to drastically alter certain very advanced
settings on the device. This can severely affect the way device functions and exposes
greater and developmental features to the user. This also exposes the device to respond to
features such as USB debugging (when enabled) and other such features that could be
exploited to get malicious access to the device sub-system. Hence, the Developer Options
should be disabled.

Audit:

Follow the below steps to verify that Developer Options is Disabled:

1. Tap Settings Gear Icon.


2. Tap System.
3. Tap Advanced.
4. Tap Developer options.
5. Verify that it is OFF.

Remediation:

Follow the below steps to disable Developer Options:

1. Tap Settings Gear Icon.


2. Tap System.
3. Tap Advanced.
4. Tap Developer options.
5. Toggle it to OFF position.

Impact:

None

25 | P a g e
Default Value:

By default, Developer options is disabled.

References:

1. https://developer.android.com/studio/debug/dev-options

CIS Controls:

Version 6

5 Controlled Use of Administration Privileges


Controlled Use of Administration Privileges

26 | P a g e
1.10 (L1) Ensure 'Install unknown apps' is set to 'Disabled' (Not Scored)
Profile Applicability:

 Level 1

Description:

Disable installation of apps from unknown sources.

The recommended state for this setting is: Disabled.

Rationale:

This setting determines whether applications can be installed from locations other than
Google Play. Disabling installation from untrusted distribution channels protects against
inadvertent installation of untrusted or malicious applications. Apps on Google play are
vetted by Google Security Team and are mostly safe to install. You should avoid installing
apps from anywhere else.

Audit:

Follow the below steps to verify that Install unknown apps is Disabled:

1. Tap Settings Gear Icon.


2. Tap Apps & notifications.
3. Tap Advanced.
4. Tap Special app access.
5. Tap Install unknown apps.
6. Verify that all of the apps in the list show Not allowed.

Remediation:

Follow the below steps to disable Install unknown apps:

1. Tap Settings Gear Icon.


2. Tap Apps & notifications.
3. Tap Advanced.
4. Tap Special app access.
5. Tap Install unknown apps.
6. Tap any app showing Allowed.
7. Toggle Allow from this source to OFF position.

27 | P a g e
Impact:

None

Default Value:

By default, Install unknown apps is disabled.

References:

1. https://support.google.com/pixelphone/answer/7391672?hl=en

CIS Controls:

Version 6

2 Inventory of Authorized and Unauthorized Software


Inventory of Authorized and Unauthorized Software

28 | P a g e
1.11 (L1) Do not root your device (Not Scored)
Profile Applicability:

 Level 1

Description:

Do not root your device.

The recommended state for this setting is: Do not Root.

Rationale:

Rooting your Android device breaks the user level restrictions put by the Android
operating system. This significantly opens up the device to allow literally any privileged
action. Rooting enables any form of alteration to the device. This puts the device at a much
greater risk because any vulnerability can be exploited without any restrictions. This also
voids the warranty and future security updates are problematic to install. Hence, for all
user purposes, do not root your device.

Audit:

Detecting whether a device is rooted or not is not straight forward. You would usually need
to install terminal apps or root checker apps to detect rooted devices. Follow your device
manufacturer support/documentation/community to detect rooting.

Remediation:

Follow your device manufacturer support/documentation/community to completely un-


root your device.

Impact:

None

Default Value:

By default, devices are not rooted and run with user level restrictions.

References:

1. http://www.wikihow.com/Check-if-Your-Android-Cellphone-Is-Rooted-or-Not
2. http://www.wikihow.com/Unroot-Android

29 | P a g e
CIS Controls:

Version 6

5 Controlled Use of Administration Privileges


Controlled Use of Administration Privileges

30 | P a g e
1.12 (L2) Ensure 'Smart Lock' is set to 'Disabled' (Not Scored)
Profile Applicability:

 Level 2

Description:

Disable Smart Lock.

The recommended state for this setting is: Disabled.

Rationale:

Smart Lock detects device presence and its circumstances and automatically keeps it
unlocked even if the device has a screen password, pin or pattern enabled. Using Smart
Lock does not require you to manually unlock the device every time if the pre-defined
circumstances are met. As a best practice, do not set the device to get unlocked
automatically. For example, if your device gets stolen and if it is taken to a location pre-
defined in Smart Lock, it would automatically unlock. Similarly, if someone could replay
your voice, the device would automatically unlock.

Audit:

Follow the below steps to verify that Smart Lock is Disabled:

1. Tap the Settings Gear Icon.


2. Tap Security.
3. Tap Advanced.
4. Tap Trust agents.
5. Verify that Smart Lock (Google) is OFF.

Remediation:

Follow the below steps to disable Smart Lock:

1. Tap the Settings Gear Icon.


2. Tap Security.
3. Tap Advanced.
4. Tap Trust agents..
5. Toggle Smart Lock (Google) to OFF position.

31 | P a g e
Impact:

The device would need to be manually unlocked every time.

Default Value:

By default, Smart Lock is enabled.

References:

1. https://support.google.com/android/answer/9075927?hl=en&visit_id=636959420
073607202-2748220419&rd=1

CIS Controls:

Version 6

16.5 Ensure Workstation Screen Locks Are Configured


Configure screen locks on systems to limit access to unattended workstations.

32 | P a g e
1.13 (L2) Ensure 'Lock SIM card' is set to 'Enabled' (Not Scored)
Profile Applicability:

 Level 2

Description:

Lock SIM card.

The recommended state for this setting is: Enabled.

Rationale:

If your device uses a SIM card(s), enable SIM card lock. A SIM card PIN locks the SIM and
prevents anyone from removing the SIM card from your device and use it on any other
device without knowing the PIN. Also, you might choose to store your contacts and
messages on the SIM card and thus it is highly recommended that you safeguard this
valuable personal data by setting a custom PIN on the SIM card(s).

Note: Only phones that are not locked by the service provider can lock the SIM card.

Audit:

Follow the below steps to verify that Lock SIM card is Enabled:

1. Tap the Settings Gear Icon.


2. Tap Security.
3. Tap SIM card lock.
4. Verify that Lock SIM card is Enabled.
5. If you have more than one SIM card, click on the 2nd SIM card tab and verify that
Lock SIM card is Enabled there as well.

Remediation:

Follow the below steps to enable Lock SIM card:

1. Call up your SIM card provider and get the default SIM PIN.
2. Tap the Settings Gear Icon.
3. Tap Security.
4. Tap SIM card lock.
5. Toggle Lock SIM card to the on position.
6. Enter the default PIN provided by your SIM provider.
7. Press OK.
8. The Lock SIM card option will then be enabled.

33 | P a g e
9. Tap on Change SIM PIN.
10. Again provide the default PIN provided (Old PIN) by your SIM card provider.
11. Type your new custom PIN.
12. Re-type your new custom PIN.
13. Press OK.
14. Your custom SIM PIN is then set.
15. Repeat the process for your 2nd SIM, if applicable.

Impact:

You would need to remember your SIM card PIN. If you forget your SIM card PIN, you need
your SIM card provider support for unlocking the SIM card.

Default Value:

By default, Lock SIM card is disabled. Also, the SIM card has a default PIN set by the
provider which is usually universally known.

References:

1. https://support.google.com/android/answer/6088895?hl=en-
GB&visit_id=636959420073607202-2748220419&rd=1

CIS Controls:

Version 6

3 Secure Configurations for Hardware and Software on Mobile Devices, Laptops,


Workstations, and Servers
Secure Configurations for Hardware and Software on Mobile Devices, Laptops,
Workstations, and Servers

34 | P a g e
1.14 (L2) Ensure 'Find My Device' is set to 'Enabled' (Not Scored)
Profile Applicability:

 Level 2

Description:

Setup Find My Device as a Device Administrator.

The recommended state for this setting is: Enabled.

Rationale:

If you lose your Android device, you could use Find My Device to find your device and also
ring, lock, or erase your device data remotely.

Audit:

Follow the below steps to verify that Find My Device is Enabled:

1. Tap the Settings Gear Icon.


2. Tap Security.
3. Scroll to the SECURITY STATUS section.
4. Verify that the Find My Device is ON.

Remediation:

Follow the below steps to enable Find My Device:

1. Tap the Settings Gear Icon.


2. Tap Security.
3. Scroll to the SECURITY STATUS section.
4. Tap Find My Device.
5. Toggle slider to the ON position.

Impact:

Google may track your device location anytime.

Default Value:

By default, Find My Device is not enabled.

35 | P a g e
References:

1. https://support.google.com/android/answer/6160491?hl=en

CIS Controls:

Version 6

1 Inventory of Authorized and Unauthorized Devices


Inventory of Authorized and Unauthorized Devices

36 | P a g e
1.15 (L1) Ensure 'Use network-provided time' and 'Use network-
provided time zone' are set to 'Enabled' (Not Scored)
Profile Applicability:

 Level 1

Description:

Enable Use network-provided time. For this setting to work correctly, Use network-
provided time zone` setting should also be enabled.

The recommended state for this setting is: Enabled.

Rationale:

Use network-provided time setting fetches the date and time information from the
cellular provider and is generally more accurate and reliable than your own managed and
set date and time. Accurate date and time could help in forensics, device recovery through
Android Device Manager and maintain application and logs in a time-sync manner.

Audit:

Follow the below steps to verify that Use network-provided time and Use network-
provided time zone setting is Enabled:

1. Tap Settings Gear Icon.


2. Tap System.
3. Tap Date & time.
4. Verify that Use network-provided time setting is Enabled.
5. Verify that Use network-provided time zone setting is Enabled as well.

Remediation:

Follow the below steps to enable Use network-provided time and Use network-provided
time zone settings:

1. Tap Settings Gear Icon.


2. Tap System.
3. Tap Date & time.
4. Toggle Use network-provided time setting to ON position.
5. Toggle Use network-provided time zone setting to ON position.

37 | P a g e
Impact:

None

Default Value:

By default, Use network-provided time and Use network-provided time zone settings
are Enabled.

References:

1. https://support.google.com/nexus/answer/2841106?hl=en

CIS Controls:

Version 6

6 Maintenance, Monitoring, and Analysis of Audit Logs


Maintenance, Monitoring, and Analysis of Audit Logs

38 | P a g e
1.16 (L1) Ensure 'Remotely locate this device' is set to 'Enabled' (Not
Scored)
Profile Applicability:

 Level 1

Description:

Enable remotely locating the device.

The recommended state for this setting is: Enabled.

Rationale:

Remotely locate this device setting helps you to track your lost device using Find My
Device. It must be enabled for improving the recovery possibility of your device.

Audit:

Follow the below steps to verify that Remotely locate this device setting is Enabled:

1. Tap Settings Gear Icon..


2. Tap Google.
3. Scroll to the Services section.
4. Tap Security.
5. Scroll to the Find My Device section.
6. Tap Find My Device.
7. Verify that Remotely locate this device setting is Enabled.

Remediation:

Follow the below steps to enable Remotely locate this device:

1. Tap Settings Gear Icon..


2. Tap Google.
3. Scroll to the Services section.
4. Tap Security.
5. Scroll to Find My Device section.
6. Tap Find My Device.
7. Toggle Remotely locate this device setting to ON position.

39 | P a g e
Impact:

This setting requires you to keep location services enabled all the time. This might be a
privacy issue for you.

Default Value:

By default, Remotely locate this device setting is enabled.

References:

1. https://support.google.com/accounts/answer/3265955#location

CIS Controls:

Version 6

1 Inventory of Authorized and Unauthorized Devices


Inventory of Authorized and Unauthorized Devices

40 | P a g e
1.17 (L1) Ensure 'Allow remote lock and erase' is set to 'Enabled' (Not
Scored)
Profile Applicability:

 Level 1

Description:

Enable remotely locking and erasing the device.

The recommended state for this setting is: Enabled.

Rationale:

Allow remote lock and erase setting helps you to remotely lock your device or erase
your data through Find My Device. This helps you to safeguard your privacy and protect
your data from unsanctioned access.

Audit:

Follow the below steps to verify that Allow remote lock and erase setting is Enabled:

1. Tap Settings Gear Icon..


2. Tap Security.
3. Scroll to the DEVICE SECURITY section.
4. Tap Device admin apps.
5. Verify that Find My Device is Enabled and Allow remote lock and erase is listed
underneath.

Remediation:

Follow the below steps to enable Allow remote lock and erase:

1. Tap Settings Gear Icon..


2. Tap Security.
3. Scroll to the DEVICE SECURITY section.
4. Tap Device admin apps.
5. Tap Find My Device toggle.
6. Tap Activate this device.

41 | P a g e
Impact:

This setting requires you to keep location services enabled all the time. This might be a
privacy issue for you.

Default Value:

By default, Allow remote lock and erase setting is enabled.

References:

1. https://support.google.com/accounts/answer/3265955#location

CIS Controls:

Version 6

13 Data Protection
Data Protection

42 | P a g e
1.18 (L1) Ensure 'Scan device for security threats' is set to 'Enabled' (Not
Scored)
Profile Applicability:

 Level 1

Description:

Scan device for security threats.

The recommended state for this setting is: Enabled.

Rationale:

Scan device for security threats setting lets Google regularly check your device and
prevent or warn about potential harm. This should be always enabled.

Audit:

Follow the below steps to verify that Scan device for security threats setting is
Enabled:

1. Tap Settings Gear Icon.


2. Tap Google.
3. Scroll to the Services section.
4. Tap Security.
5. Scroll to the Security Status section.
6. Tap Google Play Protect.
7. Tap Settings Gear icon.
8. Verify that Scan device for security threats setting is Enabled.

Remediation:

Follow the below steps to enable Scan device for security threats:

1. Tap Settings Gear Icon.


2. Tap Google.
3. Scroll to the Services section.
4. Tap Security.
5. Scroll to the Security Status section.
6. Tap Google Play Protect.
7. Tap Settings Gear icon.
8. Toggle Scan device for security threats setting to ON position.

43 | P a g e
Impact:

None

Default Value:

By default, Scan device for security threats setting is disabled.

References:

1. https://support.google.com/googleplay/answer/2812853?hl=en

CIS Controls:

Version 6

8 Malware Defenses
Malware Defenses

44 | P a g e
1.19 (L1) Ensure 'Improve harmful app detection' is set to 'Enabled' (Not
Scored)
Profile Applicability:

 Level 1

Description:

Improve detection of harmful apps.

The recommended state for this setting is: Enabled.

Rationale:

Enabling Improve harmful app detection setting sends anonymous information to


Google about apps that were not installed from Google Play. This is especially true if you
choose to install apps from "Unknown sources" outside of the Google Play Store. This
information helps Google better protect everyone from harmful apps.

Audit:

Follow the below steps to verify that Improve harmful app detection setting is Enabled:

1. Tap Settings Gear Icon.


2. Tap Google.
3. Scroll to the Services section.
4. Tap Security.
5. Scroll to the Security Status section.
6. Tap Google Play Protect.
7. Verify that Improve harmful app detection setting is Enabled.

Remediation:

Follow the below steps to enable Improve harmful app detection:

1. Tap Settings Gear Icon.


2. Tap Google.
3. Scroll to the Services section.
4. Tap Security.
5. Scroll to the Security Status section.
6. Tap Google Play Protect.
7. Toggle Improve harmful app detection setting to ON position.

45 | P a g e
Impact:

User data needs to be sent to Google that may incur data charges based on your carrier.
Also, this user data might contain, but not restricted to, log information, URLs related to the
app, device ID, your Android version, and IP address.

Default Value:

By default, Improve harmful app detection setting is disabled.

References:

1. https://support.google.com/googleplay/answer/2812853?hl=en

CIS Controls:

Version 6

8 Malware Defenses
Malware Defenses

46 | P a g e
1.20 (L1) Ensure 'Ask for unlock pattern/PIN/password before
unpinning' is set to 'Enabled' (Not Scored)
Profile Applicability:

 Level 1

Description:

Unpinning should require re-authentication.

The recommended state for this setting is: Enabled.

Rationale:

Your might lend your device to a friend or anyone else for carrying out a single task such as
make an emergency phone call or play a game. You should use screen pinning in such a
situation. It locks the users to the particular screen that you handed over the device with.
Users cannot use the device outside of that application until the screen is unpinned.
Unpinning screen should require re-authentication.

Audit:

Follow the below steps to verify that Ask for pattern/PIN/password before unpinning
setting is Enabled:

1. Tap the Settings Gear Icon.


2. Tap Security.
3. Scroll to the DEVICE SECURITY section.
4. Tap Advanced.
5. Tap Screen pinning.
6. If Screen Pinning is On, then verify that Ask for pattern/PIN/password before
unpinning setting is Enabled.

Remediation:

Follow the below steps to enable Ask for pattern/PIN/password before unpinning:

1. Tap the Settings Gear Icon.


2. Tap Security.
3. Scroll to the DEVICE SECURITY section.
4. Tap Advanced.
5. Tap Screen pinning.

47 | P a g e
6. If you are using Screen Pinning, then toggle Ask for pattern/PIN/password
before unpinning setting to ON position.

Impact:

None

Default Value:

By default, if you enable Screen pinning, then Ask for pattern/PIN/password before
unpinning setting is also enabled if you have previously chosen to lock your device with a
pattern, PIN or password. If you have previously chosen to not lock your device, you would
be required to set it up by tapping Lock device when unpinning after enabling Screen
pinning.

References:

1. https://support.google.com/android/answer/6118421?hl=en

CIS Controls:

Version 6

16.5 Ensure Workstation Screen Locks Are Configured


Configure screen locks on systems to limit access to unattended workstations.

48 | P a g e
1.21 (L1) Ensure 'Screen timeout' is set to '1 minute or less' (Not Scored)
Profile Applicability:

 Level 1

Description:

Set Screen timeout setting to 1 minute or less.

The recommended state for this setting is: 1 Minute or less.

Rationale:

You should set inactivity timeout to avoid unsanctioned usage of the device if you leave it
unattended. The inactivity timeout not only blackens your screen after stipulated time
period but also kicks in other security features such as screen lock that protect your device
when you leave it unattended.

Audit:

Follow the below steps to verify that Screen timeout setting is set to 1 minute or less:

1. Tap on Settings Gear Icon.


2. Tap Display.
3. Tap Advanced.
4. Verify that Screen timeout is set to 1 minute or less.

Remediation:

Follow the below steps to set Screen timeout setting to 1 minute or less:

1. Tap on Settings Gear Icon.


2. Tap Display.
3. Tap Advanced.
4. Tap Screen timeout.
5. Tap on time duration of 1 minute or less.

Impact:

You would need to unlock your device after every time inactivity period is reached.

Default Value:

By default, Screen timeout is set to 1 minute of inactivity.

49 | P a g e
References:

1. https://support.google.com/android/answer/9084191?hl=en

CIS Controls:

Version 6

16.4 Automatically Log Off Users After Standard Period Of Inactivity


Regularly monitor the use of all accounts, automatically logging off users after a standard
period of inactivity.

50 | P a g e
1.22 (L1) Ensure 'Wi-Fi assistant' is set to 'Disabled' (Not Scored)
Profile Applicability:

 Level 1

Description:

Disable automatically connecting your device to open Wi-Fi.

The recommended state for this setting is: Disabled.

Rationale:

Wi-Fi assistant automatically connects to any open Wi-Fi and tunnel the connection
through Google VPN servers. Even with the level of security included when this setting is
enabled, it is recommended that users only connect to trusted networks manually and to
leave this setting disabled.

Audit:

Follow the below steps to verify that Wi-Fi assistant is Disabled:

1. Tap Settings Gear Icon.


2. Tap Google.
3. Scroll to the Services section.
4. Tap Networking.
5. Verify that Wi-Fi assistant is turned OFF.

Remediation:

Follow the below steps to disable Wi-Fi assistant:

1. Tap Settings Gear Icon.


2. Tap Google.
3. Scroll to the Services section.
4. Tap Networking.
5. Toggle Wi-Fi assistant to OFF position.

Impact:

You would not benefit from open Wi-fi connections and would require using cellular data.

51 | P a g e
Default Value:

By default, Wi-Fi assistant setting is enabled.

Note: on the Verizon Variant this setting is disabled. Also, this feature is available only on
Pixel phones and Nexus devices running Android 5.1 and up in the selected countries.

References:

1. https://support.google.com/nexus/answer/6327199?hl=en

CIS Controls:

Version 6

15.4 Configure Only Authorized Wireless Access On Client Machines


Where a specific business need for wireless access has been identified, configure
wireless access on client machines to allow access only to authorized wireless networks.
For devices that do not have an essential wireless business purpose, disable wireless access
in the hardware configuration (basic input/output system or extensible firmware
interface).

52 | P a g e
1.23 (L1) Keep device Apps up to date (Not Scored)
Profile Applicability:

 Level 1

Description:

Regularly update your device apps.

The recommended state for this setting is: Update apps.

Rationale:

Keeping apps updated gives you access to the latest features and improves app security
and stability. This has similar advantages as patching. Hence, keep your device apps
updated.

Audit:

Follow the below steps to verify that Apps are up to date:

1. Tap/slide up Launcher.
2. Launch Play Store App in the App drawer.
3. Tap Menu.
4. Tap My apps & Games.
5. Verify that all apps are up to date.

Remediation:

Follow the below steps to update all Apps:

1. Tap/slide up Launcher.
2. Launch Play Store App in the App drawer.
3. Tap Menu.
4. Tap My apps & Games.
5. If there are any updates pending, then tap Update All.

Impact:

You might incur data charges.

53 | P a g e
Default Value:

By default, apps are automatically updated. If cellular data is not a concern or secure Wi-Fi
is available then you can leave the default Playstore app setting to auto update the apps to
ensure that apps are updated automatically.

References:

1. https://support.google.com/googleplay/answer/113412?hl=en-IN

CIS Controls:

Version 6

4 Continuous Vulnerability Assessment and Remediation


Continuous Vulnerability Assessment and Remediation

54 | P a g e
1.24 (L1) Ensure 'Add users from lock screen' is set to 'Disabled' (Not
Scored)
Profile Applicability:

 Level 1

Description:

Do not allow adding users on a locked device.

The recommended state for this setting is: Disabled.

Rationale:

Users and the guest profile can do most of the same things as the device's owner, but each
profile has its own storage space. Guests could install malicious apps or carry out any other
malicious activities that may compromise overall device security. Also, Wi-Fi and Bluetooth
connections are shared which could give guests unauthorized access to networks/devices
that could compromise data. Hence, Add users from lock screen setting should be
disabled.

Audit:

Follow the below steps to verify that Add users from lock screen setting is 'Disabled`:

1. Tap Settings Gear Icon.


2. Tap System.
3. Tap Advanced.
4. Tap Multiple users.
5. Verify that Add users from lock screen setting is Disabled.

Remediation:

Follow the below steps to disable Add users from lock screen setting:

1. Tap Settings Gear Icon.


2. Tap System.
3. Tap Advanced.
4. Tap Multiple users.
5. Toggle Add users from lock screen setting to OFF position.

55 | P a g e
Impact:

Users will not be able to add additional users when the device is locked.

Default Value:

By default, Add users from lock screen setting is enabled.

References:

1. https://support.google.com/pixelphone/answer/2865944

CIS Controls:

Version 6

16.5 Ensure Workstation Screen Locks Are Configured


Configure screen locks on systems to limit access to unattended workstations.

56 | P a g e
1.25 (L1) Ensure 'Guest profiles' do not exist (Not Scored)
Profile Applicability:

 Level 1

Description:

Do not add any guest profiles on the device.

The recommended state for this setting is: Remove Guest profiles.

Rationale:

Users and the guest profile can do most of the same things as the device's owner, but each
profile has its own storage space. Guests could install malicious apps or carry out any other
malicious activities that may compromise overall device security. Also, Wi-Fi and Bluetooth
connections are shared which could give guests unauthorized access to networks/devices
that could compromise data. Hence, do not add any guest profiles on the device.

If you need to give your device to someone for temporary use, use Screen Pinning to
restrict access to the desired app and be in the complete visibility of your device all the
time.

Audit:

Follow the below steps to verify that the Guest profile do not exist:

1. Tap Settings Gear Icon.


2. Tap System.
3. Tap Advanced.
4. Tap Multiple users.
5. Verify that Guests is grayed out.

Remediation:

Follow the below steps remove the Guest profile:

1. Open Quick Settings drawer.


2. Tap the Profile icon.
3. Switch to Guest profile.
4. Open Quick Settings drawer.
5. Tap Remove guest.
6. Confirm removal by tapping remove.

57 | P a g e
Impact:

None

Default Value:

By default, Guest profiles do not exist.

References:

1. https://support.google.com/pixelphone/answer/2865944
2. https://support.google.com/pixelphone/answer/6115141?hl=en&ref_topic=70834
08

CIS Controls:

Version 6

16 Account Monitoring and Control


Account Monitoring and Control

58 | P a g e
1.26 (L1) Review app permissions periodically (Not Scored)
Profile Applicability:

 Level 1

Description:

Review your device app's permissions periodically.

The recommended state for this setting is: Review app permissions regularly.

Rationale:

App permissions allow you to control which capabilities or information apps could access
on your device. This can extend from using device hardware to using your personal data.
You should periodically review your all app's permissions and ensure that those apps have
legitimate permissions. Uninstall apps that over-seek permissions.

Audit:

Follow the below steps to review your app permissions:

1. Tap Settings Gear Icon.


2. Tap Apps & notifications.
3. Tap See all apps.
4. Tap on each permission and review the apps that have them.

Remediation:

Follow the below steps to set your app permissions appropriately:

1. Tap Settings Gear Icon.


2. Tap Apps & notifications.
3. Tap App permissions.
4. Tap on each permission and review the apps that have them.
5. Disable the app permissions that you feel are over-permissive.

Impact:

Some of the apps tend to have more than required permissions. Such apps might not work
if you disable the permissions it originally asked for. Also, if you disable the needed
permissions, you may not be able to use the app and might have to re-install it.

59 | P a g e
Default Value:

By default, apps seek permissions on first use or during installation.

References:

1. https://support.google.com/googleplay/answer/6270602?hl=en-IN

CIS Controls:

Version 6

14.4 Protect Information With Access Control Lists


All information stored on systems shall be protected with file system, network share,
claims, application, or database specific access control lists. These controls will enforce the
principle that only authorized individuals should have access to the information based on
their need to access the information as a part of their responsibilities.

60 | P a g e
1.27 (L1) Ensure 'Instant apps' is set to 'Disabled' (Not Scored)
Profile Applicability:

 Level 1

Description:

Disable instant apps.

The recommended state for this setting is: Disabled.

Rationale:

Instant apps allow you to use apps without installing them on your device. On clicking app
links, the browser downloads and run app modules as desired by the user.

Having exposure to an app like this is dangerous since any malicious link could then
potentially trick the user and then browser could download the app code and run on your
device without requiring installation. Also, this feature defies enterprise security that relies
on blacklisting or whitelisting apps based on installation. Hence, it is recommended to turn
off instant apps.

Audit:

Follow the below steps to verify that Instant apps is Disabled:

1. Tap on Settings Gear Icon.


2. Tap Apps & notifications.
3. Tap Advanced.
4. Tap Default apps.
5. Tap Opening links.
6. Verify that Instant apps setting is set to OFF position.

Remediation:

Follow the below steps to disable Instant apps:

1. Tap on Settings Gear Icon.


2. Tap Apps & notifications.
3. Tap Advanced.
4. Tap Default apps.
5. Tap Opening links.
6. Toggle Instant apps setting to OFF position.

61 | P a g e
Impact:

Instant apps will not be available. The app links would open on the browser as other
regular links.

Default Value:

By default, Instant apps is enabled.

References:

1. https://support.google.com/googleplay/answer/7240211
2. https://www.appthority.com/mobile-threat-center/blog/will-googles-instant-
apps-undermine-enterprise-security/
3. https://developer.android.com/topic/instant-apps/index.html

CIS Controls:

Version 6

18 Application Software Security


Application Software Security

62 | P a g e
2 Android OS Privacy Settings
This section provides the privacy-related recommendation for Android OS.

2.1 (L1) Ensure 'Lock screen' is set to 'Don't show notifications at all'
(Not Scored)
Profile Applicability:

 Level 1

Description:

Disable notifications on the lock screen.

The recommended state for this setting is: Don't show notifications at all.

Rationale:

If the device is lost or is unattended, then disabling notifications do not display any
notification information on the locked screen. This information might be private or
confidential and thus unwarranted disclosures could be avoided.

Audit:

To verify Notifications on the lock screen are set to Don't show notifications at all:

1. Tap Settings Gear Icon.


2. Tap Apps & notifications.
3. Tap Notifications.
4. Tap Advanced.
5. Tap Lock Screen.
6. Verify that Lock Screen is set to Don't show notifications at all.

Remediation:

Follow the below steps to set the On the lock screen to Don't show notifications at
all:

1. Tap Settings Gear Icon.


2. Tap Apps & notifications.
3. Tap Notifications.
4. Tap Advanced.
5. Tap Lock Screen.

63 | P a g e
6. Tap Lock Screen and set it to Don't show notifications at all.

Impact:

The user will not be able to see contents of notifications on lock screen requiring her to
unlock the device each time.

Default Value:

By default, notification content is shown on the locked screen.

References:

1. https://support.google.com/pixelphone/answer/6111294?hl=en&ref_topic=70782
21

CIS Controls:

Version 6

16.5 Ensure Workstation Screen Locks Are Configured


Configure screen locks on systems to limit access to unattended workstations.

64 | P a g e
2.2 (L2) Ensure 'Use location' is set to 'Disabled' (Not Scored)
Profile Applicability:

 Level 2

Description:

Disable Location when not in use.

The recommended state for this setting is: Disabled.

Rationale:

Location allows applications such as Maps and Internet websites to gather and use data
indicating the user's location. The user's location is determined using available information
from cellular network data, local Wi-Fi networks, Bluetooth and GPS. If the user turns off
Location Services, the user will be prompted to turn it back on again the next time any
application tries to use this feature.

Disabling location reduces the capability of an attacker to determine or track the user's
location via websites, locally installed applications or other means without user's consent.
Thus, it should be disabled when not in use.

Note: Location is very important for tracking your lost device if the device data is not
disabled. Make a judicious call and decide what works best for you or in your environment.

Audit:

Follow the below steps to verify that Use location is Disabled:

1. Tap Settings Gear Icon.


2. Tap Location.
3. Verify that Use location is OFF.

Remediation:

Follow the below steps to disable Use location:

1. Tap Settings Gear Icon.


2. Tap Location.
3. Toggle Use Location switch to the OFF position.

65 | P a g e
Impact:

Each time an application needs location data, the user activity would be interrupted to
enable the location.

Another impact could be on finding your lost device. If the device is lost and the location is
disabled, you cannot use remote locate services such as Android Device Manager.

Default Value:

By default, Location is enabled.

References:

1. https://support.google.com/pixelphone/answer/3467281?hl=en&ref_topic=70838
17

CIS Controls:

Version 6

13 Data Protection
Data Protection

66 | P a g e
2.3 (L2) Ensure 'Back up to Google Drive' is 'Disabled' (Not Scored)
Profile Applicability:

 Level 2

Description:

Disable Backup to Google Drive.

The recommended state for this setting is: Disabled.

Rationale:

You can back up content, data, and settings from your device to your Google Account. You
can then later restore your backed-up information to another device. Due to privacy
concerns, backing up personal data such as text messages, emails, photos and contacts to
any third party is not recommended unless you accept the risk of sharing the data with the
3rd party. Moreover, if you are using a personal device for business apps such as emails,
that data might be backed up as well in the Google Drive related to your personal account
and might be exposed. Hence, disable the automatic backup to Google drive and carefully
choose what data backup you need.

Audit:

Follow the below steps to verify Back up to Google Drive is Disabled:

1. Tap Settings Gear Icon.


2. Tap System.
3. Tap Advanced.
4. Tap Backup.
5. Verify that Back up to Google Drive is OFF.

Remediation:

Follow the below steps to disable Back up to Google Drive:

1. Tap Settings Gear Icon.


2. Tap System.
3. Tap Advanced.
4. Tap Backup.
5. Tap Back up to Google Drive.
6. Toggle it to OFF position.
7. Tap OK on warning popup.

67 | P a g e
Impact:

A backup of the device will not be taken and hence restoration would not be possible. Also,
the user would have to carefully choose the data to be backed up and manually back it up
periodically.

Default Value:

By default, Back up to Google Drive is disabled.

References:

1. https://support.google.com/pixelphone/answer/7179901?hl=en

CIS Controls:

Version 6

13 Data Protection
Data Protection

68 | P a g e
2.4 (L1) Ensure 'Web and App Activity' is set to 'Disabled' (Not Scored)
Profile Applicability:

 Level 1

Description:

Disable linking of web and app activity to your account when you are logged out.

Note: This setting is applicable only for Google Pixel range of devices.

The recommended state for this setting is: Disabled.

Rationale:

When this setting is enabled, your searches and activity from other Google services are
linked and saved to your Google Account, even when you are logged out or offline. This
could be privacy-invasive and hence it is recommended to disable this setting.

Audit:

Follow the below steps to verify that Web & App Activity setting is Disabled:

1. Tap Settings Gear Icon.


2. Tap Privacy.
3. Tap Advanced.
4. Tap Activity Controls.
5. Verify that Web & App Activity setting is Disabled.

Remediation:

Follow the below steps to disable Web & App Activity setting:

1. Tap Settings Gear Icon.


2. Tap Privacy.
3. Tap Advanced.
4. Tap Activity Controls.
5. Toggle Web & App Activity setting to OFF position.

Impact:

Web and App activities would not be linked to your account. You might not get
personalized user experience.

69 | P a g e
Default Value:

By default, Web & App Activity is enabled.

References:

1. https://support.google.com/pixelphone/answer/6139018?co=GENIE.Platform%3D
Desktop&hl=en
2. https://support.google.com/websearch/answer/54068

CIS Controls:

Version 6

13 Data Protection
Data Protection

70 | P a g e
2.5 (L1) Ensure 'Device Information' is set to 'Disabled' (Not Scored)
Profile Applicability:

 Level 1

Description:

Disable storing device information to your account.

Note: This setting is applicable only for Google Pixel range of devices.

The recommended state for this setting is: Disabled.

Rationale:

Turning on Device Information setting saves various device related information to your
account to give you personalized results, suggestions, and experiences. The information
saved might include contact lists, calendars, alarms, apps, and music. Additionally,
information such as whether the screen is on, the battery level, the quality of your Wi-Fi or
Bluetooth connection, touchscreen and sensor readings, and crash reports are also saved
and shared with Google. This could be privacy-invasive and hence it is recommended to
disable this setting.

Audit:

Follow the below steps to verify that Device Information setting is Disabled:

1. Tap Settings Gear Icon.


2. Tap Privacy.
3. Tap Advanced.
4. Tap Activity Controls.
5. Verify that Device Information setting is Disabled.

Remediation:

Follow the below steps to disable Device Information setting:

1. Tap Settings Gear Icon.


2. Tap Privacy.
3. Tap Advanced.
4. Tap Activity Controls.
5. Toggle Device Information setting to OFF position.

71 | P a g e
Impact:

You might not get personalized user experience.

Default Value:

By default, Device Information is enabled.

References:

1. https://support.google.com/pixelphone/answer/6139018?co=GENIE.Platform%3D
Desktop&hl=en
2. https://support.google.com/accounts/answer/6135999

CIS Controls:

Version 6

13 Data Protection
Data Protection

72 | P a g e
2.6 (L1) Ensure 'Voice & Audio Activity' is set to 'Disabled' (Not Scored)
Profile Applicability:

 Level 1

Description:

Disable saving your voice and other audio to your Google Account.

Note: This setting is applicable only for Google Pixel range of devices.

The recommended state for this setting is: Disabled.

Rationale:

Google records your voice and other audio when you use audio activations. Audio can be
saved even when your device is offline. When Voice & Audio Activity is off, voice inputs
won't be saved to your Google Account, even if you're signed in. Instead, they may only be
saved using anonymous identifiers. This could be privacy-invasive and hence it is
recommended to disable this setting.

Audit:

Follow the below steps to verify that Voice & Audio Activity setting is Disabled:

1. Tap Settings Gear Icon.


2. Tap Privacy.
3. Tap Advanced.
4. Tap Activity Controls.
5. Verify that Voice & Audio Activity setting is Disabled.

Remediation:

Follow the below steps to disable Voice & Audio Activity setting:

1. Tap Settings Gear Icon.


2. Tap Privacy.
3. Tap Advanced.
4. Tap Activity Controls.
5. Toggle Voice & Audio Activity setting to OFF position.

Impact:

You might not get personalized user experience.

73 | P a g e
Default Value:

By default, Voice & Audio Activity setting is enabled.

References:

1. https://support.google.com/pixelphone/answer/6139018?co=GENIE.Platform%3D
Desktop&hl=en
2. https://support.google.com/websearch/answer/6030020

CIS Controls:

Version 6

13 Data Protection
Data Protection

74 | P a g e
2.7 (L1) Ensure 'YouTube Search History' is set to 'Disabled' (Not Scored)
Profile Applicability:

 Level 1

Description:

Disable storing YouTube Search History to your account.

Note: This setting is applicable only for Google Pixel range of devices.

The recommended state for this setting is: Disabled.

Rationale:

Turning on YouTube Search History setting links and stores all your YouTube searches to
your account across any device. Also, your YouTube and Google search history influences
the recommendations that you see on your YouTube homepage when you are logged-in.
This could be privacy-invasive and hence it is recommended to disable this setting.

Audit:

Follow the below steps to verify that YouTube Search History setting is Disabled:

1. Tap Settings Gear Icon.


2. Tap Privacy.
3. Tap Advanced.
4. Tap Activity Controls.
5. Verify that YouTube Search History setting is Disabled.

Remediation:

Follow the below steps to disable YouTube Search History setting:

1. Tap Settings Gear Icon.


2. Tap Privacy.
3. Tap Advanced.
4. Tap Activity Controls.
5. Toggle YouTube Search History setting to OFF position.

Impact:

You might not get personalized user experience.

75 | P a g e
Default Value:

By default, YouTube Search History setting is enabled.

References:

1. https://support.google.com/pixelphone/answer/6139018?co=GENIE.Platform%3D
Desktop&hl=en
2. https://support.google.com/youtube/answer/57711

CIS Controls:

Version 6

13 Data Protection
Data Protection

76 | P a g e
2.8 (L1) Ensure 'YouTube Watch History' is set to 'Disabled' (Not Scored)
Profile Applicability:

 Level 1

Description:

Disable storing YouTube Watch History to your account.

Note: This setting is applicable only for Google Pixel range of devices.

The recommended state for this setting is: Disabled.

Rationale:

Turning on YouTube Watch History setting links and stores all your watched YouTube
videos to your account from any device. Also, this influences the recommendations that you
see on your YouTube homepage when you are logged-in and other YouTube video
recommendations. This could be privacy-invasive and hence it is recommended to disable
this setting.

Audit:

Follow the below steps to verify that YouTube Watch History setting is Disabled:

1. Tap Settings Gear Icon.


2. Tap Privacy.
3. Tap Advanced.
4. Tap Activity Controls.
5. Verify that YouTube Watch History is Disabled.

Remediation:

Follow the below steps to disable YouTube Watch History setting:

1. Tap Settings Gear Icon.


2. Tap Privacy.
3. Tap Advanced.
4. Tap Activity Controls.
5. Toggle YouTube Watch History setting to OFF position.

Impact:

You might not get personalized user experience.

77 | P a g e
Default Value:

By default, YouTube Watch History setting is enabled.

References:

1. https://support.google.com/pixelphone/answer/6139018?co=GENIE.Platform%3D
Desktop&hl=en
2. https://support.google.com/youtube/answer/95725

CIS Controls:

Version 6

13 Data Protection
Data Protection

78 | P a g e
2.9 (L1) Ensure 'Google Location History' is set to 'Disabled' (Not Scored)
Profile Applicability:

 Level 1

Description:

Disable storing your location history.

Note: This setting is applicable only for Google Pixel range of devices.

The recommended state for this setting is: Disabled.

Rationale:

When Google Location History setting is turned on, your device periodically sends
diagnostics information to Google about what’s working and what’s not working in relation
to Location History. Location History allows Google to regularly obtain location data from
the device. It also stores your Location History to provide results and recommendations
across Google products. This could be privacy-invasive and hence it is recommended to
disable this setting.

Audit:

Follow the below steps to verify that Google Location History setting is Disabled:

1. Tap Settings Gear Icon.


2. Tap Privacy.
3. Tap Advanced.
4. Tap Activity Controls.
5. Verify that Google Location History setting is turned OFF.

Remediation:

Follow the below steps to disable Google Location History setting:

1. Tap Settings Gear Icon.


2. Tap Privacy.
3. Tap Advanced.
4. Tap Activity Controls.
5. Toggle Google Location History setting to OFF position.

79 | P a g e
Impact:

You might not get personalized user experience.

Default Value:

By default, Google Location History setting is enabled.

References:

1. https://support.google.com/pixelphone/answer/6139018?co=GENIE.Platform%3D
Desktop&hl=en
2. https://support.google.com/accounts/answer/3118687

CIS Controls:

Version 6

13 Data Protection
Data Protection

80 | P a g e
2.10 (L1) Ensure 'Opt out of Ads Personalization' is set to 'Enabled' (Not
Scored)
Profile Applicability:

 Level 1

Description:

Restrict apps from building your app profile.

The recommended state for this setting is: Enabled.

Rationale:

Apps can use your app/browsing data to build a profile for displaying personalized ads. To
protect your privacy, you should disable building your profiles from various app/browsing
activities.

Audit:

Follow the below steps to verify that Opt out of Ads Personalization setting is Enabled:

1. Tap Settings Gear Icon.


2. Tap Google.
3. Scroll to the Services section.
4. Tap Ads.
5. Verify that Opt out of Ads Personalization setting is turned ON.

Remediation:

Follow the below steps to enable Opt out of Ads Personalization setting:

1. Tap Settings Gear Icon.


2. Tap Google.
3. Scroll to the Services section.
4. Tap Ads.
5. Toggle Opt out of Ads Personalization setting to ON position.

Impact:

You might not get personalized ads experience.

81 | P a g e
Default Value:

By default, Opt out of Ads Personalization setting is disabled.

References:

1. https://support.google.com/ads/answer/2662922?hl=en

CIS Controls:

Version 6

13 Data Protection
Data Protection

82 | P a g e
3 Android OS Chrome Browser Settings
3.1 (L1) Ensure 'Microphone' is set to 'Enabled' (Not Scored)
Profile Applicability:

 Level 1

Description:

This setting controls if a site asks before accessing the microphone.

The recommended state for this setting is: Enabled.

Rationale:

Websites will have to ask permission before being allowed to access the microphone which
will help prevent unwanted access to the microphone and help protect against potential
privacy concerns.

Audit:

Follow the below steps to verify that Microphone is Enabled:

1. Tap Chrome Icon.


2. Tap Menu Icon.
3. Tap Settings.
4. Scroll to the Advanced section.
5. Tap Site settings.
6. Verify that Microphone displays Ask first.

Remediation:

Follow the below steps to Enable the Microphone permission request:

1. Tap Chrome Icon.


2. Tap Menu Icon.
3. Tap Settings.
4. Scroll to the Advanced section.
5. Tap Site settings.
6. Tap Microphone.
7. Toggle to the ON position.

83 | P a g e
Impact:

Users will be prompted each time a website requests access to the microphone.

Default Value:

Enabled.

84 | P a g e
3.2 (L1) Ensure 'Location' is set to 'Enabled' (Not Scored)
Profile Applicability:

 Level 1

Description:

This setting controls if a site asks before accessing the location.

The recommended state for this setting is: Enabled.

Rationale:

Websites will have to ask permission before being allowed to access the location which will
help prevent unwanted access to the users location and help protect against potential
privacy concerns.

Audit:

Follow the below steps to verify that Location is Enabled:

1. Tap Chrome Icon.


2. Tap Menu Icon.
3. Tap Settings.
4. Scroll to the Advanced section.
5. Tap Site settings.
6. Verify that Location displays Ask first.

Remediation:

Follow the below steps to Enable the Location permission request:

1. Tap Chrome Icon.


2. Tap Menu Icon.
3. Tap Settings.
4. Scroll to the Advanced section.
5. Tap Site settings.
6. Tap Location.
7. Toggle to the ON position.

Impact:

Users will be prompted each time a website requests access to the location.

85 | P a g e
Default Value:

Enabled.

86 | P a g e
3.3 (L1) Ensure 'Allow third-party cookies' is set to 'Disabled' (Not Scored)
Profile Applicability:

 Level 1

Description:

A third-party cookie is a cookie sent by a domain that differs from the domain in the
browser's address bar.

The recommended state for this setting is: Disabled.

Rationale:

Blocking third party cookies can help protect a user's privacy by eliminating a number of
website tracking cookies.

Audit:

Follow the below steps to verify that Allow third-party cookies is Disabled:

1. Tap Chrome Icon.


2. Tap Menu Icon.
3. Tap Settings.
4. Scroll to the Advanced section.
5. Tap Site settings.
6. Verify that Allow third-party cookies displays Allowed, except third-party.

Remediation:

Follow the below steps to Disabled the Allow third-party cookies option:

1. Tap Chrome Icon.


2. Tap Menu Icon.
3. Tap Settings.
4. Scroll to the Advanced section.
5. Tap Site settings.
6. Tap Allow third-party cookies.
7.
Uncheck the Allow third-party cookies checkbox.

Impact:

Blocking third-party cookies may adversely effect the functionality of some sites.

87 | P a g e
Default Value:

Enabled.

88 | P a g e
3.4 (L1) Ensure 'Safe Browsing' is set to 'Enabled' (Not Scored)
Profile Applicability:

 Level 1

Description:

This setting controls the Safe Browsing feature.

The recommended state for this setting is: Enabled.

Rationale:

Google Safe Browsing helps protect devices every day by showing warnings to users when
they attempt to navigate to dangerous sites or download dangerous files.

Audit:

Follow the below steps to verify that Safe Browsing is Enabled:

1. Tap Chrome Icon.


2. Tap Menu Icon.
3. Tap Settings.
4. Scroll to the Advanced section.
5. Tap Privacy.
6. Verify that Safe Browsing checkbox is checked.

Remediation:

Follow the below steps to Enable the Safe Browsing feature:

1. Tap Chrome Icon.


2. Tap Menu Icon.
3. Tap Settings.
4. Scroll to the Advanced section.
5. Tap Privacy.
6.
Check the Safe Browsing checkbox.

Impact:

Users will be shown a warning message before they visit a dangerous site or download a
harmful app.

89 | P a g e
Default Value:

Enabled.

References:

1. https://safebrowsing.google.com/

90 | P a g e
3.5 (L2) Ensure 'Search and URL suggestions' is set to 'Disabled' (Not
Scored)
Profile Applicability:

 Level 2

Description:

Google Chrome uses a prediction service to show you related searches, matches from your
browsing history, and popular websites as you type in the address bar.

The recommended state for this setting is: Disabled.

Rationale:

Having search suggestions sent out to be processed is considered a privacy concern.

Audit:

Follow the below steps to verify that Search and URL suggestions is Disabled:

1. Tap Chrome Icon.


2. Tap Menu Icon.
3. Tap Settings.
4. Scroll to the Advanced section.
5. Tap Privacy.
6. Verify that Search and URL suggestions checkbox is unchecked.

Remediation:

Follow the below steps to Disable the Search and URL suggestions feature:

1. Tap Chrome Icon.


2. Tap Menu Icon.
3. Tap Settings.
4. Scroll to the Advanced section.
5. Tap Privacy.
6.
Uncheck the Search and URL suggestions checkbox.

Default Value:

Enabled.

91 | P a g e
References:

1. https://support.google.com/chrome/answer/114836?hl=en&co=GENIE.Platform%
3DAndroid

CIS Controls:

Version 6

13 Data Protection
Data Protection

92 | P a g e
3.6 (L2) Ensure 'Do Not Track' is set to 'Enabled' (Not Scored)
Profile Applicability:

 Level 2

Description:

When you browse the web on computers or Android devices, you can send a request to
websites not to collect or track your browsing data.

Note Chrome doesn't provide details of which websites and web services respect Do Not
Track requests and how websites interpret them.

The recommended state for this setting is: Enabled.

Rationale:

This setting will help in protecting some of the tracking that is done but many websites will
still collect and use your browsing data to improve security, provide content, services, ads
and recommendations on their websites, and generate reporting statistics.

Audit:

Follow the below steps to verify that Do Not Track is Enabled:

1. Tap Chrome Icon.


2. Tap Menu Icon.
3. Tap Settings.
4. Scroll to the Advanced section.
5. Tap Privacy.
6. Tap Do Not Track.
7. Verify that Do Not Track toggle is off.

Remediation:

Follow the below steps to Enabled the Do Not Track feature:

1. Tap Chrome Icon.


2. Tap Menu Icon.
3. Tap Settings.
4. Scroll to the Advanced section.
5. Tap Privacy.
6. Tap Do Not Track.

93 | P a g e
7.
Toggle the Do Not Track to the OFF position.

Default Value:

Disabled.

References:

1. https://support.google.com/chrome/answer/2790761?hl=en&co=GENIE.Platform
%3DAndroid

CIS Controls:

Version 6

13 Data Protection
Data Protection

94 | P a g e
Appendix: Summary Table
Control Set
Correctly
Yes No
1 Android OS Security Settings
1.1 (L1) Ensure device firmware is up to date (Not Scored)  
1.2 (L1) Ensure 'Screen Lock' is set to 'Enabled' (Not Scored)  
1.3 (L1) Ensure 'Make pattern visible' is set to 'Disabled' (if using
 
a pattern as device lock mechanism) (Not Scored)
1.4 (L1) Ensure 'Automatically Lock' is set to 'Immediately' (Not
 
Scored)
1.5 (L1) Ensure 'Power button instantly locks' is set to 'Enabled'
 
(Not Scored)
1.6 (L1) Ensure 'Lock Screen Message' is configured (Not Scored)  
1.7 (L2) Do not connect to untrusted Wi-Fi networks (Not
 
Scored)
1.8 (L2) Ensure 'Show passwords' is set to 'Disabled' (Not
 
Scored)
1.9 (L1) Ensure 'Developer Options' is set to 'Disabled' (Not
 
Scored)
1.10 (L1) Ensure 'Install unknown apps' is set to 'Disabled' (Not
 
Scored)
1.11 (L1) Do not root your device (Not Scored)  
1.12 (L2) Ensure 'Smart Lock' is set to 'Disabled' (Not Scored)  
1.13 (L2) Ensure 'Lock SIM card' is set to 'Enabled' (Not Scored)  
1.14 (L2) Ensure 'Find My Device' is set to 'Enabled' (Not Scored)  
1.15 (L1) Ensure 'Use network-provided time' and 'Use network-
 
provided time zone' are set to 'Enabled' (Not Scored)
1.16 (L1) Ensure 'Remotely locate this device' is set to 'Enabled'
 
(Not Scored)
1.17 (L1) Ensure 'Allow remote lock and erase' is set to 'Enabled'
 
(Not Scored)
1.18 (L1) Ensure 'Scan device for security threats' is set to
 
'Enabled' (Not Scored)
1.19 (L1) Ensure 'Improve harmful app detection' is set to
 
'Enabled' (Not Scored)
1.20 (L1) Ensure 'Ask for unlock pattern/PIN/password before
 
unpinning' is set to 'Enabled' (Not Scored)
1.21 (L1) Ensure 'Screen timeout' is set to '1 minute or less' (Not
 
Scored)
1.22 (L1) Ensure 'Wi-Fi assistant' is set to 'Disabled' (Not Scored)  

95 | P a g e
1.23 (L1) Keep device Apps up to date (Not Scored)  
1.24 (L1) Ensure 'Add users from lock screen' is set to 'Disabled'
 
(Not Scored)
1.25 (L1) Ensure 'Guest profiles' do not exist (Not Scored)  
1.26 (L1) Review app permissions periodically (Not Scored)  
1.27 (L1) Ensure 'Instant apps' is set to 'Disabled' (Not Scored)  
2 Android OS Privacy Settings
2.1 (L1) Ensure 'Lock screen' is set to 'Don't show notifications at
 
all' (Not Scored)
2.2 (L2) Ensure 'Use location' is set to 'Disabled' (Not Scored)  
2.3 (L2) Ensure 'Back up to Google Drive' is 'Disabled' (Not
 
Scored)
2.4 (L1) Ensure 'Web and App Activity' is set to 'Disabled' (Not
 
Scored)
2.5 (L1) Ensure 'Device Information' is set to 'Disabled' (Not
 
Scored)
2.6 (L1) Ensure 'Voice & Audio Activity' is set to 'Disabled' (Not
 
Scored)
2.7 (L1) Ensure 'YouTube Search History' is set to 'Disabled' (Not
 
Scored)
2.8 (L1) Ensure 'YouTube Watch History' is set to 'Disabled' (Not
 
Scored)
2.9 (L1) Ensure 'Google Location History' is set to 'Disabled' (Not
 
Scored)
2.10 (L1) Ensure 'Opt out of Ads Personalization' is set to 'Enabled'
 
(Not Scored)
3 Android OS Chrome Browser Settings
3.1 (L1) Ensure 'Microphone' is set to 'Enabled' (Not Scored)  
3.2 (L1) Ensure 'Location' is set to 'Enabled' (Not Scored)  
3.3 (L1) Ensure 'Allow third-party cookies' is set to 'Disabled'
 
(Not Scored)
3.4 (L1) Ensure 'Safe Browsing' is set to 'Enabled' (Not Scored)  
3.5 (L2) Ensure 'Search and URL suggestions' is set to 'Disabled'
 
(Not Scored)
3.6 (L2) Ensure 'Do Not Track' is set to 'Enabled' (Not Scored)  

96 | P a g e
Appendix: Change History
Date Version Changes for this version

1-24-17 1.0.0 Initial Release

8-28-17 1.1.0 ADDED - 1.28 Ensure 'Instant apps' is


set to Disabled. Ticket # 5386

8-28-17 1.1.0 ADDED - CIS Controls Mappings to all


recommendations.

8-28-17 1.1.0 ADDED - 2.11 Ensure 'Opt out of Ads


Personalization' is set to Enabled.
Ticket # 5383

8-28-17 1.1.0 MODIFIED- Updated all


recommendation steps to conform to
8.0.0

8-28-17 1.1.0 REMOVED - 1.9 Ensure 'Encrypt


phone' or 'Encrypt tablet' is set to
Enabled.

8-28-17 1.1.0 REMOVED - Ensure 'Speak passwords'


is set to Disabled.

8-06-18 1.2.0 ADD - (L1) Ensure 'Microphone' is set


to 'Enabled' – Ticket #6427

8-06-18 1.2.0 ADD - (L1) Ensure 'Location' is set to


'Enabled' – Ticket #6426

8-06-18 1.2.0 ADD - (L1) Ensure 'Allow third-party


cookies' is set to 'Disabled' – Ticket
#6425

8-06-18 1.2.0 REMOVE - 1.27 Ensure Wi-Fi hotspot


security is set to WPA2-PSK – Ticket
#6388

97 | P a g e
8-06-18 1.2.0 REMOVE - 2.4 Ensure 'Signed-out
search activity' is set to Disabled –
Ticket #6387

8-06-18 1.2.0 ADD - (L1) Ensure 'Safe Browsing' is


set to 'Enabled' – Ticket #6421

8-06-18 1.2.0 ADD - (L2) Ensure 'Search and site


suggestions' is set to 'Disabled' –
Ticket #6424

8-06-18 1.2.0 ADD - (L2) Ensure 'Do Not Track' is


set to 'Enabled' – Ticket # 6422

9-03-19 1.3.0 RENAME - (L1) Ensure 'Automatic


date & time' and 'Automatic time
zone' are set to 'Enabled'– Ticket
#9040

9-03-19 1.3.0 RENAME - (L1) Ensure 'Sleep' is set to


'1 minute or less' – Ticket # 9041

9-03-19 1.3.0 RENAME – (L1) Ensure ‘Notifications


on the lock screen’ is set to ‘Disabled’
– Ticket #9042

9-03-19 1.3.0 UPDATE - All Recommendation's –


Ticket #9044

98 | P a g e

You might also like