Four CIS security benchmarks [6], two designed for iOS devices (iOS 6 and iOS 7), and another two for Android devices (2.3 and 4.0), were analyzed in order to understand and extract all the relevant user-defined security configurations that should be considered when assessing the security of Android devices.
Table 1 summarizes the 44 security set- tings collected from the four documents, dividing them into seven distinct categories that allow the better understanding of their specific characteristics and relevance.
Note that this categorization is extremely useful when one wants to focus in a given subset of settings related to a specific configuration aspect and can also be used as a practical way to summarize the results of a given security assessment effort.
For each setting the table shows in which document or documents it was found, which provides some insights on its
potential generalization.