Honeywell Android 9.x COPE Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +2 −1
Comparison against the immediately-prior release (V1R1). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 2
Removed rules 1
- V-235062 Medium The Honeywell Mobility Edge Android Pie device must be configured to enforce a minimum password length of six characters.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- HONW-09-000200
- Vuln IDs
-
- V-235063
- Rule IDs
-
- SV-235063r626531_rule
Checks: C-38282r623204_chk
Review Honeywell Android device configuration settings to determine if the mobile device is prohibiting passwords with more than two repeating or sequential characters. This validation procedure is performed on both the MDM Administration console and the Android Pie device. On the MDM console: 1. Open password requirements. 2. Open device password section. 3. Ensure the password quality is set to "Numeric (Complex)". On the Honeywell Android Pie device: 1. Open Settings >> Security & location >> Screen lock. 2. Enter current password. 3. Tap on "Password". 4. Verify Password complexity requirements are listed: Must contain at least 1 letter. If the MDM console device policy is set to a password with more than two repeating or sequential characters or on the Honeywell Android Pie device, the device policy is set to a password with more than two repeating or sequential characters, this is a finding. NOTE: Alphabetic, Alphanumeric, and Complex are also acceptable selections, but these selections will cause the user to select a complex password, which is not required by the STIG.
Fix: F-38245r623205_fix
Configure the Honeywell Android device to prevent passwords from containing more than two repeating or sequential characters. On the MDM console: 1. Open password requirements. 2. Open device password section. 3. Set password quality to "Numeric (Complex)". NOTE: Alphabetic, Alphanumeric, and Complex are also acceptable selections, but these selections will cause the user to select a complex password, which is not required by the STIG.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000057
- Version
- HONW-09-000300
- Vuln IDs
-
- V-235064
- Rule IDs
-
- SV-235064r626531_rule
Checks: C-38283r623207_chk
Review Honeywell Android device configuration settings to determine if the mobile device is enforcing a screen-lock policy that will lock the display after a period of inactivity. This validation procedure is performed on both the MDM Administration console and the Android Pie device. On the MDM console: 1. Open password requirements. 2. Open device password section. 3. Ensure "Device Lock Timeout" is set to any number desired. Units are in minutes. On the Honeywell Android Pie device: 1. Open settings >> Security & location. 2. Click the "gear" icon next to "Screen lock". 3. Ensure "Automatically lock" is set at a required time. If the MDM console device policy is not set to enable a screen-lock policy that will lock the display after a period of inactivity or on the Honeywell Android Pie device, the device policy is not set to enable a screen-lock policy that will lock the display after a period of inactivity, this is a finding.
Fix: F-38246r623208_fix
Configure the Honeywell Android device to enable a screen-lock policy that will lock the display after a period of inactivity. On the MDM console: 1. Open password requirements. 2. Open device password section. 3. Set "Device Lock Timeout" to any number desired. Units are in minutes.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000057
- Version
- HONW-09-000400
- Vuln IDs
-
- V-235065
- Rule IDs
-
- SV-235065r626531_rule
Checks: C-38284r623210_chk
Review Honeywell Android device configuration settings to determine if the mobile device has the screen lock timeout set to 15 minutes or less. This validation procedure is performed on both the MDM Administration console and the Android Pie device. On the MDM console: 1. Open passcode requirements. 2. Open device passcode section. 3. Ensure "Device Lock Timeout" to any number between 1 and 15. On the Honeywell Android Pie device: 1. Open settings >> Security & location. 2. Click the "gear" icon next to "Screen lock". 3. Ensure "Automatically lock" is set to between 0 and 15 minutes. If the MDM console device policy is not set to 15 minutes or less for the screen lock timeout or on the Honeywell Android Pie device, the device policy is not set to 15 minutes or less for the screen lock timeout, this is a finding.
Fix: F-38247r623211_fix
Configure the Honeywell Android device to lock the device display after 15 minutes (or less) of inactivity. On the MDM console: 1. Open password requirements. 2. Open device password section. 3. Set "Device Lock Timeout" to any number between 1 and 15.
- RMF Control
- AC-7
- Severity
- L
- CCI
- CCI-000044
- Version
- HONW-09-000500
- Vuln IDs
-
- V-235066
- Rule IDs
-
- SV-235066r626531_rule
Checks: C-38285r623213_chk
Review Honeywell Android device configuration settings to determine if the mobile device has the maximum number of consecutive failed authentication attempts set at 10 or fewer. This validation procedure is performed on both the MDM Administration console and the Android Pie device. On the MDM console: 1. Open password requirements. 2. Open device password section. 3. Review the policy configuration that was pushed down to the device and ensure the "Maximum Number of Failed Attempts" is set between 1 and 10. On the Honeywell Android Pie device: 1. Open Setting >> Security & location >> Advanced >> Managed device info. 2. Verify "Failed password attempts before deleting all device data" is set to 10 or fewer attempts. If the MDM console device policy is not set to the maximum number of consecutive failed authentication attempts at 10 or fewer or on the Honeywell Android Pie device, the device policy is not set to the maximum number of consecutive failed authentication attempts at 10 or fewer, this is a finding.
Fix: F-38248r623214_fix
Configure the Honeywell Android device to allow only 10 or fewer consecutive failed authentication attempts. On the MDM console: 1. Open password requirements. 2. Open device password section. 3. Set "Maximum Number of Failed Attempts" to a number between 1 and 10.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- HONW-09-000800
- Vuln IDs
-
- V-235067
- Rule IDs
-
- SV-235067r852707_rule
Checks: C-38286r623216_chk
Review Honeywell Android device configuration settings to determine if the mobile device has only approved application repositories (DoD-approved commercial app repository, MDM server, and/or mobile application store). This validation procedure is performed on both the MDM Administration console and the Android Pie device. On the MDM console: 1. Open Restrictions section. 2. Set Allow "Honeywell Play" (Uses only Managed Honeywell Play). 3. Ensure that Disallow is set for "Install unknown sources". On the Honeywell Android Pie device: 1. Open Settings >> Apps and notifications >> Advanced >> Special app access. 2. Open Install unknown apps. 3. Ensure the list of apps is blank or if an app is on the list, "Disabled by admin" is listed under the app name. If the MDM console device policy is not set to allow connections to only approved application repositories or on the Honeywell Android Pie device, the device policy is not set to allow connections to only approved application repositories, this is a finding.
Fix: F-38249r623217_fix
Configure the Honeywell Android device to disable unauthorized application repositories. On the MDM console: 1. Open Restrictions section. 2. Set Allow "Honeywell Play" (Uses only Managed Honeywell Play). 3. Set Disallow "Install unknown sources".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- HONW-09-001000
- Vuln IDs
-
- V-235068
- Rule IDs
-
- SV-235068r852708_rule
Checks: C-38287r623219_chk
Review Honeywell Android device configuration settings to determine if the mobile device has an application whitelist configured. Verify all applications listed on the whitelist have been approved by the Approving Official (AO). This validation procedure is performed only on the MDM Administration console. On the MDM console: 1. Go to the Android app catalog for managed Honeywell Play. 2. Verify all selected apps are AO approved. NOTE: Managed Google Play is always a Whitelisted App Store. If on the MDM console the list of selected Managed Honeywell Play apps included non-approved apps, this is a finding. NOTE: The application whitelist will include approved core applications (included in the OS by the OS vendor) and pre-installed applications (provided by the MD vendor and wireless carrier), or the MD must provide an alternate method of restricting user access/execution to core and pre-installed applications. For Honeywell Android, there are no pre-installed applications.
Fix: F-38250r623220_fix
Configure the Honeywell Android device to use an application whitelist. On the MDM console: 1. Go to the Android app catalog for managed Honeywell Play. 2. Select apps to be available (only approved apps). 3. Push updated policy to the device. NOTE: Managed Honeywell Play is always a Whitelisted App Store.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- HONW-09-001100
- Vuln IDs
-
- V-235069
- Rule IDs
-
- SV-235069r852709_rule
Checks: C-38288r623222_chk
Review Honeywell Android device configuration settings to determine if the mobile device has an application whitelist configured and that the application whitelist does not include applications with the following characteristics: - back up MD data to non-DoD cloud servers (including user and application access to cloud backup services); - transmit MD diagnostic data to non-DoD servers; - voice assistant application if available when MD is locked; - voice dialing application if available when MD is locked; - allows synchronization of data or applications between devices associated with user; - payment processing; and - allows unencrypted (or encrypted but not FIPS 140-2 validated) data sharing with other MDs, display screens (screen mirroring), or printers. This validation procedure is performed only on the MDM Administration console. On the MDM console: 1. Review the list of selected Managed Honeywell Play apps. 2. Review the details and privacy policy of each selected app to ensure the app does not include prohibited characteristics. If the MDM console device policy includes applications with unauthorized characteristics, this is a finding.
Fix: F-38251r623223_fix
Configure the Honeywell Android device application whitelist to exclude applications with the following characteristics: - back up MD data to non-DoD cloud servers (including user and application access to cloud backup services); - transmit MD diagnostic data to non-DoD servers; - voice assistant application if available when MD is locked; - voice dialing application if available when MD is locked; - allows synchronization of data or applications between devices associated with user; - payment processing; and - allows unencrypted (or encrypted but not FIPS 140-2 validated) data sharing with other MDs, display screens (screen mirroring), or printers. On the MDM console: 1. Go to the Android app catalog for managed Honeywell Play. 2. Before selecting an app, review the app details and privacy policy to ensure the app does not include prohibited characteristics.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- HONW-09-001400
- Vuln IDs
-
- V-235070
- Rule IDs
-
- SV-235070r852710_rule
Checks: C-38289r623225_chk
Determine if the AO has approved the use of Bluetooth at the site. If the AO has not approved the use of Bluetooth, verify Bluetooth has been disabled: On the MDM console: 1. Open Restrictions section. 2. Ensure "Disallow Bluetooth" is set. On the Honeywell Android Pie device: 1. Go to Settings >> Connected Devices >> Connection Preferences >> Bluetooth. 2. Ensure that it is set to "Off" and cannot be toggled to "On". If the AO has approved the use of Bluetooth, on the Honeywell Android Pie device: 1. Go to Settings >> Connected Devices. 2. Verify only approved Bluetooth connected devices using approved profiles are listed. If the AO has not approved the use of Bluetooth, and Bluetooth use is not disabled via an MDM managed device policy, this is a finding. If the AO has approved the use of Bluetooth, and Bluetooth devices using unauthorized Bluetooth profiles are listed on the device under "Connected devices", this is a finding.
Fix: F-38252r623226_fix
Configure the Honeywell Android device to disable Bluetooth or if the AO has approved the use of Bluetooth (for example, for car handsfree use), train the user to connect to only authorized Bluetooth devices using only HSP, HFP, or SPP Bluetooth capable devices (User Based Enforcement [UBE]). To disable Bluetooth, use the following procedure: On the MDM console: 1. Open Restrictions section. 2. Toggle "Disallow Bluetooth" to "On". The user training requirement is satisfied in requirement HONW-09-008700.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- HONW-09-001600
- Vuln IDs
-
- V-235071
- Rule IDs
-
- SV-235071r626531_rule
Checks: C-38290r623228_chk
Review Honeywell Android device settings to determine if the Honeywell Android device displays (work container) notifications on the lock screen. Notifications of incoming phone calls are acceptable even when the device is locked. This validation procedure is performed on both the MDM Administration console and the Android Pie device. On the MDM console: 1. Open Restrictions section. 2. Open Work Managed Section. 3. Ensure "Unredacted Notifications" is set to "Disallow". On the Honeywell Android Pie device: 1. Go to Settings >> Security & location. 2. Tap on Lock screen preferences. 3. Ensure "Hide sensitive work content" is listed under "When work profile is locked". If the MDM console device policy allows work notifications on the lock screen or the Android Pie device allows work notifications on the lock screen, this is a finding.
Fix: F-38253r623229_fix
Configure the Honeywell Android device to not display (work profile) notifications when the device is locked. On the MDM console: 1. Open Restrictions section. 2. Open Work Managed Section. 3. Set "Unredacted Notifications" to "Disallow".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- HONW-09-002300
- Vuln IDs
-
- V-235072
- Rule IDs
-
- SV-235072r626531_rule
Checks: C-38291r623231_chk
Review device configuration settings to confirm that trust agents are disabled. This procedure is performed on both the MDM Administration console and the Honeywell Android Pie device. On the MDM console: 1. Open Restrictions section. 2. Set "Disable trust agents" to "On". On the Honeywell Android Pie device: 1. Open Settings. 2. Tap "Security & location". 3. Tap "Advanced". 4. Tap "Trust agents". 5. Verify that all listed trust agents are disabled and cannot be enabled. If on the MDM console "disable trust agents" is not selected, or on the Honeywell Android Pie device a trust agent can be enabled, this is a finding.
Fix: F-38254r623232_fix
Configure Honeywell Android Pie to disable trust agents. On the MDM console: 1. Open Lock screen restrictions section. 2. Set "Disable trust agents" to on.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- HONW-09-002800
- Vuln IDs
-
- V-235073
- Rule IDs
-
- SV-235073r626531_rule
Checks: C-38292r623234_chk
Review Honeywell Android device configuration settings to determine whether a developer mode is enabled. This validation procedure is performed on both the MDM Administration console and the Android Pie device. On the MDM console: 1. Open Restrictions section. 2. Confirm that "Debugging Features" is set to "Disallow". On the Honeywell Android Pie device: 1. Go to Settings >> System. 2. Ensure Developer Options is not listed. If the MDM console device policy is not set to disable developer mode or on the Honeywell Android Pie device, the device policy is not set to disable developer mode, this is a finding.
Fix: F-38255r623235_fix
Configure the Honeywell Android device to disable developer modes. On the MDM console: 1. Open Restrictions section. 2. Set "Debugging Features" to "Disallow".
- RMF Control
- AC-8
- Severity
- L
- CCI
- CCI-000048
- Version
- HONW-09-003400
- Vuln IDs
-
- V-235074
- Rule IDs
-
- SV-235074r626531_rule
Checks: C-38293r623237_chk
The DoD warning banner can be displayed by either of the following methods (required text is found in the Vulnerability Description): 1. By placing the DoD warning banner text in the user agreement signed by each Honeywell Android device user (preferred method). 2. By configuring the warning banner text on the MDM console and installing the banner on each managed mobile device. Determine which method is used at the Honeywell Android device site and follow the appropriate validation procedure below. Validation Procedure for Method #1: Review the signed user agreements for several Honeywell Android device users and verify the agreement includes the required DoD warning banner text. Validation Procedure for Method #2: On the MDM console: Ensure "Lock Screen Message" and the appropriate banner text is included. If, for Method #1, the required warning banner text is not on all signed user agreements reviewed, or for Method #2, the MDM console device policy is not set to display a warning banner with the appropriate designated wording or on the Honeywell Android Pie device, the device policy is not set to display a warning banner with the appropriate designated wording, this is a finding.
Fix: F-38256r623238_fix
Configure the DoD warning banner by either of the following methods (required text is found in the Vulnerability Description): 1. By placing the DoD warning banner text in the user agreement signed by each Honeywell Android device user (preferred method). 2. By configuring the warning banner text on the MDM console and installing the banner on each managed mobile device. On the MDM console: Enable "Lock Screen Message" and enter the banner text.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- HONW-09-003500
- Vuln IDs
-
- V-235075
- Rule IDs
-
- SV-235075r626531_rule
Checks: C-38294r623240_chk
Review Honeywell Android device configuration settings to determine if the mobile device has a USB mass storage mode and whether it has been disabled. This validation procedure is performed on both the MDM Administration console and the Android Pie device. On the MDM console: 1. Open Device Restrictions. 2. Open Restrictions settings. 3. Ensure "Disallow usb file transfer" is selected. On the Honeywell Android Pie device: 1. Plug USB cable into Android Pie device and connect to a non-DoD network-managed PC. 2. Go to Settings >> Connected devices >> USB. 3. Ensure No data transfer is selected. If the MDM console device policy is not set to disable USB mass storage mode or on the Honeywell Android Pie device, the device policy is not set to disable USB mass storage mode, this is a finding.
Fix: F-38257r623241_fix
Configure the Honeywell Android device to disable USB mass storage mode. On the MDM console: 1. Open Device Restrictions. 2. Open Restrictions settings. 3. Select "Disallow usb file transfer".
- RMF Control
- AC-20
- Severity
- M
- CCI
- CCI-000097
- Version
- HONW-09-003700
- Vuln IDs
-
- V-235076
- Rule IDs
-
- SV-235076r626531_rule
Checks: C-38295r623243_chk
Review Honeywell Android device configuration settings to determine if the capability to back up to a locally connected system has been disabled. This validation procedure is performed on both the MDM Administration console and the Android Pie device. On the MDM console: 1. Open Device Restrictions. 2. Open Restrictions settings. 3. Ensure "Disallow usb file transfer" is selected. On the Honeywell Android Pie device: 1. Plug USB cable into Android Pie device and connect to a non-DoD network-managed PC. 2. Go to Settings >> Connected devices >> USB. 3. Ensure "No data transfer" is selected. If the MDM console device policy is not set to disable the capability to back up to a locally connected system or on the Honeywell Android Pie device, the device policy is not set to disable the capability to back up to a locally connected system, this is a finding.
Fix: F-38258r623244_fix
Configure the Honeywell Android device to disable backup to locally connected systems. NOTE: On Restrictions, the backup features for Honeywell are not in the framework. On the MDM console: 1. Open Device Restrictions. 2. Open Restrictions settings. 3. Select "Disallow usb file transfer".
- RMF Control
- AC-20
- Severity
- M
- CCI
- CCI-002338
- Version
- HONW-09-003900
- Vuln IDs
-
- V-235077
- Rule IDs
-
- SV-235077r852711_rule
Checks: C-38296r623246_chk
Review Honeywell Android device configuration settings to determine if the capability to back up to a remote system has been disabled. This validation procedure is performed on both the MDM Administration console and the Android Pie device. On the MDM console: 1. Open Device Restrictions. 2. Open Restrictions settings. 3. Ensure "Disallow backup servicer" is not selected. On the Honeywell Android Pie device: 1. Go to Settings >> System. 2. Ensure Backup is set to "Off". If the MDM console device policy is not set to disable the capability to back up to a remote system or on the Honeywell Android Pie device, the device policy is not set to disable the capability to back up to a remote system, this is a finding.
Fix: F-38259r623247_fix
Configure the Honeywell Android device to disable backup to remote systems (including commercial clouds). NOTE: On Restrictions, data in the work profile cannot be backed up by default. On the MDM console: 1. Open Device Restrictions. 2. Open Restrictions settings. 3. Ensure "Enable backup service" is not selected.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- HONW-09-004500
- Vuln IDs
-
- V-235078
- Rule IDs
-
- SV-235078r852712_rule
Checks: C-38297r623249_chk
Review documentation on the Honeywell Android device and inspect the configuration on the Honeywell Android device to verify the access control policy that prevents [selection: application processes] from accessing [selection: all] data stored by other [selection: application processes] is enabled. This validation procedure is performed only on the MDM Administration console. On the MDM console: 1. Open Restrictions settings. 2. Open User restrictions. 3. Ensure "Disallow cross profile copy/paste" is selected. 4. Ensure "Disallow sharing data into the profile" is selected. If the MDM console device policy is not set to disable data sharing between profiles, this is a finding.
Fix: F-38260r623250_fix
Configure the Honeywell Android Pie to enable the access control policy that prevents [selection: application processes, groups of application processes] from accessing [selection: all, private] data stored by other [selection: application processes, groups of application processes]. NOTE: All application data is inherently sandboxed and isolated from other applications. In order to disable copy/paste on the MDM Console: 1. Open Restrictions settings. 2. Open User restrictions. 3. Select "Disallow cross profile copy/paste". 4. Select "Disallow sharing data into the profile".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- HONW-09-004700
- Vuln IDs
-
- V-235079
- Rule IDs
-
- SV-235079r852713_rule
Checks: C-38298r623252_chk
Review documentation on the Honeywell Android device and inspect the configuration on the Honeywell Android device to disable multi-user modes. This validation procedure is performed on both the MDM Administration console and the Android Pie device. On the MDM console: 1. Open the Restrictions settings. 2. Open User settings. 3. Confirm "Disallow Add User" is selected. On the Honeywell Android Pie device: 1. Go to Settings >> System >> Advanced >> Multiple users. 2. Verify there is no option to add a user. If the MDM console device policy is not set to disable multi-user modes or on the Honeywell Android Pie device, the device policy is not set to disable multi-user modes, this is a finding.
Fix: F-38261r623253_fix
Configure the Honeywell Android Pie to disable multi-user modes. On the MDM console: 1. Open the Restrictions settings. 2. Open User settings. 3. Select "Disallow Add User".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- HONW-09-005505
- Vuln IDs
-
- V-235080
- Rule IDs
-
- SV-235080r852714_rule
Checks: C-38299r623255_chk
Review documentation on the Honeywell Android device and inspect the configuration on the Honeywell Android device to enable audit logging. This validation procedure is performed on only on the MDM Administration console. On the MDM console: 1. Open the Restrictions settings. 2. Open User settings. 3. Select "Enable security logging". 4. Select "Enable network logging". If the MDM console device policy is not set to enable audit logging, this is a finding.
Fix: F-38262r623256_fix
Configure the Honeywell Android Pie to enable audit logging. On the MDM console: 1. Open the Restrictions settings. 2. Open User settings. 3. Select "Enable security logging". 4. Select "Enable network logging".
- RMF Control
- AU-12
- Severity
- L
- CCI
- CCI-000169
- Version
- HONW-09-006100
- Vuln IDs
-
- V-235081
- Rule IDs
-
- SV-235081r626531_rule
Checks: C-38300r623258_chk
Review Honeywell Android device configuration settings to determine if the mobile device is configured to generate audit records for the following auditable events: detected integrity violations. This validation procedure is performed only on the MDM Administration console. On the MDM console: 1. Go to Policy management. 2. Confirm Security Logging is enabled. If the MDM console device policy is not set to enable security logging, this is a finding.
Fix: F-38263r623259_fix
Configure the Honeywell Android device to generate audit records for the following auditable events: detected integrity violations. On the MDM console: 1. Go to Policy management. 2. Enable Security Logging.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- HONW-09-008700
- Vuln IDs
-
- V-235082
- Rule IDs
-
- SV-235082r626531_rule
Checks: C-38301r623261_chk
Review a sample of site User Agreements for Honeywell device users or similar training records and training course content. Verify that Honeywell device users have completed the required training. The intent is that required training is renewed on a periodic basis in a time period determined by the AO. If any Honeywell device user has not completed the required training, this is a finding.
Fix: F-38264r623262_fix
Have all Honeywell device users complete training on the following topics. Users should acknowledge that they have reviewed training via a signed User Agreement or similar written record. Training topics: - Operational security concerns introduced by unmanaged applications/unmanaged personal space, including applications using global positioning system (GPS) tracking. - Need to ensure no DoD data is saved to the personal space or transmitted from a personal app (for example, from personal email). - If the Purebred key management app is used, users are responsible for maintaining positive control of their credentialed device at all times. The DoD PKI certificate policy requires subscribers to maintain positive control of the devices that contain private keys and to report any loss of control so the credentials can be revoked. Upon device retirement, turn-in, or reassignment, ensure that a factory data reset is performed prior to device hand-off. Follow mobility service provider decommissioning procedures as applicable. - How to configure the following UBE controls (users must configure the control) on the Honeywell device: **Secure use of Calendar Alarm **Local screen mirroring and Mirroring procedures (authorized/not authorized for use) **Do not upload DoD contacts via smart call and caller ID services **Do not remove DoD intermediate and root PKI digital certificates **Disable Wi-Fi Sharing **Do not configure a DoD network (work) VPN profile on any third-party VPN client installed in the personal space **If Bluetooth connections are approved for mobile device, types of allowed connections (for example car handsfree, but not Bluetooth wireless keyboard) - AO guidance on acceptable use and restrictions, if any, on downloading and installing personal apps and data (music, photos, etc.) in the Honeywell device personal space.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- HONW-09-009000
- Vuln IDs
-
- V-235083
- Rule IDs
-
- SV-235083r626531_rule
Checks: C-38302r623264_chk
Review device configuration settings to confirm that the DoD root and intermediate PKI certificates are installed. This procedure is performed on both the MDM Administration console and the Honeywell Android Pie device. The current DoD root and intermediate PKI certificates may be obtained in self-extracting zip files at http://cyber.mil/pki-pke (for NIPRNet). On the MDM console, verify that the DoD root and intermediate certificates are part of a device and/or work profile that is being pushed down to the devices. On the Honeywell Android Pie device: 1. Open Settings. 2. Tap "Security & Location". 3. Tap on "Advanced". 4. Tap on "Encryption & credentials". 5. Tap on "Trusted credentials". 6. Verify that DoD root and intermediate PKI certificates are listed under the user tab. If on the MDM console the DoD root and intermediate certificates are not listed in a profile, or on the Honeywell Android Pie device does not list the DoD root and intermediate certificates under the user tab, this is a finding.
Fix: F-38265r623265_fix
Configure Honeywell Mobility Edge Android Pie devices to install DoD root and intermediate certificates. On the MDM console upload DoD root and intermediate certificates as part of a device and/or work profile. The current DoD root and intermediate PKI certificates may be obtained in self-extracting zip files at http://cyber.mil/pki-pke (for NIPRNet).
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- HONW-09-009100
- Vuln IDs
-
- V-235084
- Rule IDs
-
- SV-235084r626531_rule
Checks: C-38303r623267_chk
Review the device configuration to confirm that the user is unable to remove DoD root and intermediate PKI certificates. On the MDM console: 1. Open the User restrictions setting. 2. Verify that "Disallow config credentials" to "On" for the work profile. On the Honeywell Android Pie device: 1. Open Settings. 2. Tap "Security & Location". 3. Tap on "Advanced". 4. Tap on "Encryption & credentials". 5. Tap on "Trusted credentials". 6. Verify that the user is unable to untrust or remove any work certificates. If on the Honeywell Android Pie device the user is able to remove certificates, this is a finding.
Fix: F-38266r623268_fix
Configure Honeywell Android Pie device to prevent a user from removing DoD root and intermediate PKI certificates. On the MDM console: 1. Open the User restrictions setting. 2. Set "Disallow config credentials" to "On" for the work profile.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- HONW-09-009200
- Vuln IDs
-
- V-235085
- Rule IDs
-
- SV-235085r626531_rule
Checks: C-38304r623270_chk
Review the Honeywell Mobility Edge Android Pie devices Work Profile configuration settings to confirm that users are prevented from adding personal email accounts to the work email app. This procedure is performed on both the MDM Administrator console and the Honeywell Mobility Edge Android Pie devices device. On the MDM console: 1. Open the User restrictions setting. 2. Verify that "Disallow add accounts" is set to "On". On the Honeywell Android Pie device, do the following: 1. Open Settings. 2. Tap "Accounts". 3. Verify that "Add account" is grayed out under the Work section. If on the MDM console the restriction to "Disallow add accounts" is not set or on the Honeywell Mobility Edge Android Pie device the user is able to add an account, this is a finding.
Fix: F-38267r623271_fix
Configure Honeywell Mobility Edge Android Pie devices Work Profile to prevent users from adding personal email accounts to the work email app. On the MDM console, for the Work Profile: 1. Open the User restrictions setting. 2. Set "Disallow modify accounts" to "On". Refer to the MDM documentation to determine how to provision users' work email accounts for the work email app.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- HONW-09-009400
- Vuln IDs
-
- V-235086
- Rule IDs
-
- SV-235086r626531_rule
Checks: C-38305r623273_chk
Review the Honeywell Mobility Edge Android Pie devices Work Profile configuration settings to confirm the system application disable list is enforced. This setting is enforced by default. What needs to happen is to verify only approved system apps have been placed on the core whitelist. This procedure is performed on the MDM Administrator console. Review the system app whitelist and verify only approved apps are on the list. If on the MDM console the system app whitelist contains unapproved core apps, this is a finding.
Fix: F-38268r623274_fix
Configure Honeywell Mobility Edge Android Pie devices Work Profile to enforce the system application disable list. The required configuration is the default configuration when the device is enrolled. If the device configuration is changed, use the following procedure to bring the device back into compliance: On the MDM, configure a list of approved Honeywell core and preinstalled apps in the core app whitelist.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- HONW-09-009600
- Vuln IDs
-
- V-235087
- Rule IDs
-
- SV-235087r626531_rule
Checks: C-38306r623276_chk
Review that Honeywell Mobility Edge Android Pie devices is configured as Corporate Owned Work Managed. This procedure is performed on both the MDM Administrator console and the Honeywell Mobility Edge Android Pie devices device. On the MDM console, verify that the default enrollment is set to Corporate Owned Work Managed. On the Honeywell Android Pie device: 1. Go to the application drawer. 2. Ensure there is a Personal tab and a Work tab. If on the MDM console the default enrollment is set to Corporate Owned Work Managed or on the Honeywell Android Pie device the user does not see a Work tab, this is a finding.
Fix: F-38269r623277_fix
Configure Honeywell Android Pie devices in a Corporate Owned Work Managed configuration. On the MDM console, configure the default enrollment as Corporate Owned Work Managed. Refer to the MDM documentation to determine how to configure the device to enroll as Corporate Owned Work Managed.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- HONW-09-009800
- Vuln IDs
-
- V-235088
- Rule IDs
-
- SV-235088r626531_rule
Checks: C-38307r623279_chk
Review Chrome Browser in the Honeywell Android Pie device's Work Profile autofill setting. This procedure is performed only on the MDM Administrator console. On the MDM console, for the Work Profile, do the following: 1. Open the Chrome Browser Settings. 2. Verify "Enable autofill" is set to "Off". If on the MDM console autofill is set to "On" in the Chrome Browser Settings, this is a finding.
Fix: F-38270r623280_fix
Configure Chrome Browser in the Honeywell Android Pie device's Work Profile to disable autofill. On the MDM console, for the Work Profile: 1. Open the Chrome Browser Settings. 2. Set "Enable autofill" to "Off". Refer to the MDM documentation to determine how to configure Chrome Browser Settings.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- HONW-09-010000
- Vuln IDs
-
- V-235089
- Rule IDs
-
- SV-235089r626531_rule
Checks: C-38308r623282_chk
Review the Honeywell Mobility Edge Android Pie devices Workspace configuration settings to confirm that autofill services are disabled. This procedure is performed only on the MDM Administration console. On the MDM console, for the Workspace, in the "Android user restrictions" group, under the work profile, verify that "disallow autofill" is selected. If on the MDM console "disallow autofill" is selected, this is a finding.
Fix: F-38271r623283_fix
Configure Honeywell Mobility Edge Android Pie devices Workspace to disable the autofill services. On the MDM console, in the Android work profile restrictions, select "disallow autofill".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- HONW-09-010200
- Vuln IDs
-
- V-235090
- Rule IDs
-
- SV-235090r626531_rule
Checks: C-38309r623285_chk
Review the Honeywell Android Pie device's Work Profile configuration settings to confirm that autofill services are disabled. This procedure is performed on both the MDM Administration console and the Honeywell Android Pie device. On the MDM console, verify that "Set auto (network) time required" is set to "On". On the Honeywell Android Pie device: 1. Open Settings. 2. Tap "System". 3. Tap "Date & times". 4. Verify that "Automatic date & time" is grayed out. If on the MDM console "Set auto (network) time required" is not set to "On", or on the Honeywell Android Pie device "Automatic date & time" is grayed out, this is a finding.
Fix: F-38272r623286_fix
Configure the Honeywell Android Pie device's Work Profile to set auto network time. On the MDM console, in the Android user restrictions section, set "Set auto (network) time required" to "On".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- HONW-09-010400
- Vuln IDs
-
- V-235091
- Rule IDs
-
- SV-235091r626531_rule
Checks: C-38310r623288_chk
Review the Honeywell Android Pie device configuration settings to confirm that outgoing beam is disallowed. This procedure is performed on both the MDM Administration console and the Honeywell Android Pie device. On the MDM console, in the Android user restrictions section, verify that "Disallow outgoing beam" is set to "On". On the Honeywell Android Pie device: 1. Open Settings. 2. Tap "Connected devices". 3. Tap "Connection preferences". 4. Verify that "Android Beam" is off and grayed out. If on the MDM console "Disallow outgoing beam" is not set to "On", or on the Honeywell Android Pie device "Android Beam" is not off and grayed out, this is a finding.
Fix: F-38273r623289_fix
Configure Honeywell Android Pie devices to disallow outgoing beam. On the MDM console, in the Android user restrictions section, set "Disallow outgoing beam" to "On".
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- HONW-09-010900
- Vuln IDs
-
- V-235092
- Rule IDs
-
- SV-235092r626531_rule
Checks: C-38311r623291_chk
Review device configuration settings to confirm that version HON660-P-88.00.12 is installed (it is the NIAP-approved version). NOTE: This version of Android can only be installed on devices purchased directly from Honeywell. This procedure is performed on both the MDM console and the Honeywell Android Pie device. In the MDM management console, review the version of Honeywell Android Pie installed on a sample of managed devices. On the Honeywell Mobility Edge Android Pie device, to see the installed operating system version: 1. Open Settings. 2. Tap "About phone". 3. Verify "Build number". If the installed version of the Android operating system on any reviewed Honeywell devices is not the latest released by the wireless carrier, this is a finding. Honeywell's Android operating system patch website is available at https://source.android.com/security/bulletin/. If the installed version of the Android Pie operating system is not the NIAP-approved version, this is a finding.
Fix: F-38274r623292_fix
Install the latest released version of the Honeywell Android Pie operating system on all managed Honeywell devices. For Honeywell Android Pie devices, version HON660-P-88.00.12 must be installed (it is the NIAP-approved version). NOTE: This version of Android can only be installed on devices purchased directly from Honeywell. NOTE: In Honeywell Android devices, operating system updates are released by the wireless carrier (for example, Sprint, T-Mobile, Verizon Wireless, and ATT).
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- HONW-09-008400
- Vuln IDs
-
- V-235094
- Rule IDs
-
- SV-235094r626531_rule
Checks: C-38313r623301_chk
Review Honeywell Android device configuration settings to determine if the mobile device is in FIPS enforce mode. This validation procedure is performed on the Android Pie device. On the Honeywell Android Pie device: 1. Open Settings >> Honeywell Settings >> FIPS Enforce Mode. 2. Verify the option of "FIPS Enforce Mode" is enabled. If the option of "FIPS Enforce Mode" is disabled on the Honeywell Android Pie device, this is a finding.
Fix: F-38276r623297_fix
Configure the Honeywell Android device to enable FIPS mode. On the MDM console: 1. Ask the MDM Administrator to edit the following item in DeviceConfig.xml: Modify item: DeviceConfig >> HoneywellSetting >> EnforceOSFipsMode Value sample: 1: Enable OS FIPS mode; 0: Disable OS FIPS mode 2. In MDM console, the MDM Administrator will package this DeviceConfig.xml and push this package to the CN80G device. On the Honeywell Android Pie device: 1. Open Settings >> Honeywell Settings >> FIPS Enforce Mode. 2. Enable FIPS Enforce mode.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- HONW-09-999999
- Vuln IDs
-
- V-259208
- Rule IDs
-
- SV-259208r942501_rule
Checks: C-62947r939242_chk
Verify there are no installations of Honeywell Android 9 at the site. If Honeywell Android 9 is being used at the site, this is a finding.
Fix: F-62856r939245_fix
Remove all installations of Honeywell Android 9.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000205
- Version
- HONW-09-000100
- Vuln IDs
-
- V-259714
- Rule IDs
-
- SV-259714r942508_rule
Checks: C-63453r942506_chk
Review Honeywell Android device configuration settings to determine if the mobile device is enforcing a minimum password length of six characters. This validation procedure is performed on both the MDM Administration console and the Android Pie device. On the MDM console: 1. Open password requirements. 2. Open device password section. 3. Ensure the minimum password length is set to "6" characters. On the Honeywell Android Pie device: 1. Open Settings >> Security & location >> Screen lock. 2. Enter current password. 3. Tap on "Password". 4. Verify Password length listed is at least "6". If the device password length is not set to six characters or more on the MDM console or on the Honeywell Android Pie device, this is a finding.
Fix: F-63360r942507_fix
Configure the Honeywell Android device to enforce a minimum password length of six characters. On the MDM console: 1. Open password requirements. 2. Open device password section. 3. Enter in the number of characters as "6".