Zebra Android 11 COBO Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates No substantive changes
Comparison against the immediately-prior release (V1R2). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
No substantive changes detected against the previous release. 31 rules matched cleanly.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000205
- Version
- ZEBR-11-000100
- Vuln IDs
-
- V-252850
- Rule IDs
-
- SV-252850r820477_rule
Checks: C-56306r820475_chk
Review Zebra Android device configuration settings to determine if the mobile device is enforcing a minimum password length of six characters. This validation procedure is performed on both the EMM Administration Console and the Android 11 device. On the EMM console: 1. Open "Password constraints". 2. Select "Personal Profile". 3. Open "Minimum password quality". 4. Check that "Numeric Complex", "Alphabetic, Alphanumeric", or "Complex" is selected. 5. Verify that "Minimum password length" is "6". On the Android 11 device, do the following: 1. Open Settings >> Security >> Screen lock. 2. Enter current password. 3. Tap "Password or PIN". 4. Verify Password length listed is at least "6". If the device password length is not set to six characters or more on EMM console or on the Android 11 device, this is a finding.
Fix: F-56256r820476_fix
Configure the Zebra Android 11 device to enforce a minimum password length of six characters. On the EMM console: 1. Open "Password constraints". 2. Select "Personal Profile". 3. Open "Minimum password quality". 4. Choose "Numeric Complex", "Alphabetic", "Alphanumeric", or "Complex". 5. Open "Minimum password length". 6. Enter in the number of characters as "6".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- ZEBR-11-000200
- Vuln IDs
-
- V-252851
- Rule IDs
-
- SV-252851r820480_rule
Checks: C-56307r820478_chk
Review Zebra Android device configuration settings to determine if the mobile device is prohibiting passwords with more than four repeating or sequential characters. This validation procedure is performed on both the EMM Administration Console and the Android 11 device. On the EMM console, do the following: 1. Open "Password constraints". 2. Select "Personal Profile". 3. Verify that quality is set to "Numeric (Complex)". On the Android 11 device, do the following: 1. Open Settings >> Security >> Screen lock. 2. Enter current password. 3. Tap "Password". 4. Try to enter a new PIN or Password with repeating numbers or characters. 5. Verify Password complexity requirements are listed: Ascending, descending, or repeated sequence of digits is not allowed. If the EMM console device policy is set to a password with more than four repeating or sequential characters or on the Android 11 device, the device policy is set to a password with more than four repeating or sequential characters, this is a finding. Note: Alphabetic, Alphanumeric, and Complex are also acceptable selections, but these selections will cause the user to select a complex password, which is not required by the STIG.
Fix: F-56257r820479_fix
Configure the Zebra Android 11 device to prevent passwords from containing more than four repeating or sequential characters. On the EMM console: 1. Open "Password constraints". 2. Select "Personal Profile". 3. Set password quality to "Numeric (Complex)". Note: Alphabetic, Alphanumeric, and Complex are also acceptable selections, but these selections will cause the user to select a complex password, which is not required by the STIG.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000057
- Version
- ZEBR-11-000300
- Vuln IDs
-
- V-252852
- Rule IDs
-
- SV-252852r820483_rule
Checks: C-56308r820481_chk
Review Zebra Android device configuration settings to determine if the mobile device is enforcing a screen-lock policy that will lock the display after a period of inactivity. This validation procedure is performed on both the EMM Administration Console and the Android 11 device. On the EMM Console: 1. Open "Lock screen restrictions". 2. Select "Personal Profile". 3. Verify that "Max time to screen lock" is set to any number desired. The units are in seconds. On the Android 11 device, do the following: 1. Open Settings >> Display. 2. Tap "Screen timeout". 3. Ensure the Screen timeout value is set to the desired value and cannot be set to a larger value. If the EMM console device policy is not set to enable a screen-lock policy that will lock the display after a period of inactivity or on the Android 11 device, the device policy is not set to enable a screen-lock policy that will lock the display after a period of inactivity, this is a finding.
Fix: F-56258r820482_fix
Configure the Zebra Android 11 device to enable a screen-lock policy that will lock the display after a period of inactivity. On the EMM Console: 1. Open "Lock screen restrictions". 2. Select "Personal Profile". 3. Set "Max time to screen lock" to any number desired. The units are in seconds.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000057
- Version
- ZEBR-11-000400
- Vuln IDs
-
- V-252853
- Rule IDs
-
- SV-252853r820486_rule
Checks: C-56309r820484_chk
Review Zebra Android device configuration settings to determine if the mobile device has the screen lock timeout set to 15 minutes or less. This validation procedure is performed on both the EMM Administration Console and the Android 11 device. On the EMM Console: 1. Open "Lock screen restrictions". 2. Select "Personal Profile". 3. Verify that "Max time to screen lock" is set to any number between 1 and 900. Units are in seconds; therefore, 900 represents 15 minutes. On the Android 11 device, do the following: 1. Open Settings >> Display. 2. Tap "Screen timeout". 3. Ensure the Screen timeout value is set between 1 and 15 (minutes). If the EMM console device policy is not set to 15 minutes or less for the screen lock timeout or on the Android 11 device, the device policy is not set to 15 minutes or less for the screen lock timeout, this is a finding.
Fix: F-56259r820485_fix
Configure the Zebra Android 11 device to lock the device display after 15 minutes (or less) of inactivity. On the EMM Console: 1. Open "Lock screen restrictions". 2. Select "Personal Profile". 3. Set "Max time to screen lock" to any number between 1 and 15 (minutes).
- RMF Control
- AC-7
- Severity
- L
- CCI
- CCI-000044
- Version
- ZEBR-11-000500
- Vuln IDs
-
- V-252854
- Rule IDs
-
- SV-252854r820489_rule
Checks: C-56310r820487_chk
Review Zebra Android device configuration settings to determine if the mobile device has the maximum number of consecutive failed authentication attempts set at 10 or fewer. This validation procedure is performed on both the EMM Administration Console and the Android 11 device. On the EMM Console: 1. Open "Lock screen restrictions". 2. Select "Personal Profile". 3. Verify that "Max password failures for local wipe" is set to a number between 1 and 10. On the Android 11 device, do the following: 1. Lock the device screen. 2. Attempt to unlock the screen and validate that the device autowipes after specified number of invalid entries. If the EMM console device policy is not set to the maximum number of consecutive failed authentication attempts at 10 or fewer, or if on the Android 11 device the device policy is not set to the maximum number of consecutive failed authentication attempts at 10 or fewer, this is a finding.
Fix: F-56260r820488_fix
Configure the Zebra Android 11 device to allow only 10 or fewer consecutive failed authentication attempts. On the EMM Console: 1. Open "Lock screen restrictions". 2. Select "Personal Profile". 3. Set "Max password failures for local wipe" to a number between 1 and 10.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- ZEBR-11-000800
- Vuln IDs
-
- V-252855
- Rule IDs
-
- SV-252855r820492_rule
Checks: C-56311r820490_chk
Review Zebra Android device configuration settings to determine if the mobile device has only approved application repositories (DoD-approved commercial app repository, EMM server, and/or mobile application store). This validation procedure is performed on both the EMM Administration Console and the Android 11 device. On the EMM Console: 1. Open "Set user restrictions". 2. Verify that "Disallow install unknown sources" is toggled to "On". 3. Verify that "Disallow installs from unknown sources globally" is toggled to "On". On the Zebra device, do the following: 1. Open Settings >> Apps and notifications >> Advanced >> Special app access. 2. Open Install unknown apps. 3. Ensure the list of apps is blank or if an app is on the list, "Disabled by admin" is listed under the app name. If the EMM console device policy is not set to allow connections to "Only approved application repositories" or on the Android 11 device, the device policy is not set to allow connections to "Only approved application repositories, this is a finding.
Fix: F-56261r820491_fix
Configure the Zebra Android 11 device to disable unauthorized application repositories. On the EMM Console: 1. Open "Set user restrictions". 2. Toggle "Disallow install unknown sources" to "On". 3. Toggle "Disallow installs from unknown sources globally" to "On".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- ZEBR-11-001000
- Vuln IDs
-
- V-252856
- Rule IDs
-
- SV-252856r820495_rule
Checks: C-56312r820493_chk
Review Zebra Android device configuration settings to determine if the mobile device has an application allow list configured. Verify all applications listed on the allow list have been approved by the Approving Official (AO). On the EMM console, do the following: 1. Go to the Android app catalog for managed Google Play. 2. Verify all selected apps are AO approved. On the Android 11 device, do the following: 1. Open the managed Google Play store. 2. Verify that only the approved apps are visible. Note: Managed Google Play is an allowed App Store. If the EMM console list of selected Managed Google Play apps includes non-approved apps, this is a finding. Note: The application allow list will include approved core applications (included in the OS by the OS vendor) and pre-installed applications (provided by the MD vendor and wireless carrier), or the MD must provide an alternate method of restricting user access/execution to core and pre-installed applications. For Zebra Android, there are no pre-installed applications.
Fix: F-56262r820494_fix
Configure the Zebra Android 11 device to use an application allow list. On the EMM Console: 1. Go to the Android app catalog for managed Google Play. 2. Select apps to be available (only approved apps). 3. Push updated policy to the device. Note: Managed Google Play is an allowed App Store.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- ZEBR-11-001100
- Vuln IDs
-
- V-252857
- Rule IDs
-
- SV-252857r820498_rule
Checks: C-56313r820496_chk
Review Zebra Android device configuration settings to determine if the mobile device has an application allow list configured and that the application allow list does not include applications with the following characteristics: - back up MD data to non-DoD cloud servers (including user and application access to cloud backup services); - transmit MD diagnostic data to non-DoD servers; - voice assistant application if available when MD is locked; - voice dialing application if available when MD is locked; - allows synchronization of data or applications between devices associated with user; - payment processing; and - allows unencrypted (or encrypted but not FIPS 140-2 validated) data sharing with other MDs, display screens (screen mirroring), or printers. This validation procedure is performed only on the EMM Administration Console. On the EMM console, do the following: 1. Review the list of selected Managed Google Play apps. 2. Review the details and privacy policy of each selected app to ensure the app does not include prohibited characteristics. If the EMM console device policy includes applications with unauthorized characteristics, this is a finding.
Fix: F-56263r820497_fix
Configure the Zebra Android 11 device application allow list to exclude applications with the following characteristics: - back up MD data to non-DoD cloud servers (including user and application access to cloud backup services); - transmit MD diagnostic data to non-DoD servers; - voice assistant application if available when MD is locked; - voice dialing application if available when MD is locked; - allows synchronization of data or applications between devices associated with user; - payment processing; and - allows unencrypted (or encrypted but not FIPS 140-2 validated) data sharing with other MDs, display screens (screen mirroring), or printers. On the EMM Console: 1. Go to the Android app catalog for managed Google Play. 2. Before selecting an app, review the app details and privacy policy to ensure the app does not include prohibited characteristics.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- ZEBR-11-001400
- Vuln IDs
-
- V-252858
- Rule IDs
-
- SV-252858r820501_rule
Checks: C-56314r820499_chk
Determine if the AO has approved the use of Bluetooth at the site. If the AO has not approved the use of Bluetooth, verify Bluetooth has been disabled: On the EMM console, do the following: 1. Open "User restrictions on parent" section. 2. Verify that "Disallow Bluetooth" is toggled to "On". On the Android 11 device, do the following: 1. Go to Settings >> Connected Devices >> Connection Preferences >> Bluetooth. 2. Ensure that it is set to "Off" and cannot be toggled to "On". If the AO has approved the use of Bluetooth, on the Zebra Android 11 device do the following: 1. Go to Settings >> Connected Devices. 2. Verify only approved Bluetooth connected devices using approved profiles are listed. If the AO has not approved the use of Bluetooth, and Bluetooth use is not disabled via an EMM-managed device policy, this is a finding. If the AO has approved the use of Bluetooth, and Bluetooth devices using unauthorized Bluetooth profiles are listed on the device under "Connected devices", this is a finding.
Fix: F-56264r820500_fix
Configure the Zebra Android 11 device to disable Bluetooth or if the AO has approved the use of Bluetooth (for example, for car hands-free use), train the user to connect to only authorized Bluetooth devices using only HSP, HFP, or SPP profiles. To disable Bluetooth use the following procedure: On the EMM Console: 1. Open "User restrictions on parent" section. 2. Toggle "Disallow Bluetooth" to "On". The user training requirement is satisfied in requirement ZEBR-11-008700.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- ZEBR-11-001600
- Vuln IDs
-
- V-252859
- Rule IDs
-
- SV-252859r820504_rule
Checks: C-56315r820502_chk
Review Zebra Android device settings to determine if the Zebra Android device displays (work container) notifications on the lock screen. Notifications of incoming phone calls are acceptable even when the device is locked. This validation procedure is performed on both the EMM Administration Console and the Android 11 device. On the EMM console, do the following: 1. Open "Lock screen restrictions" section. 2. Select "Work Profile". 3. Verify that "Disable Unredacted Notifications" is toggled to "On". On the Android 11 device, do the following: 1. Go to Settings >> Display >> Advanced. 2. Tap on Lock screen display. 3. Ensure "Hide sensitive work content" is listed under "When work profile is locked". If the EMM console device policy allows work notifications on the lock screen, or the Android 11 device allows work notifications on the lock screen, this is a finding.
Fix: F-56265r820503_fix
Configure the Zebra Android 11 device to not display (work profile) notifications when the device is locked. On the EMM console: 1. Open "Lock screen restrictions" section. 2. Select "Work Profile". 3. Toggle "Disable Unredacted Notifications".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- ZEBR-11-002300
- Vuln IDs
-
- V-252860
- Rule IDs
-
- SV-252860r820507_rule
Checks: C-56316r820505_chk
Review device configuration settings to confirm that trust agents are disabled. This procedure is performed on both the EMM Administration console and the Zebra Android 11 device. On the EMM console: 1. Open "Lock screen restrictions" section. 2. Select "Personal Profile". 3. Verify that "Disable trust agents" is toggled to "On". 4. Select "Work Profile". 5. Verify that "Disable trust agents" is toggled to "On". On the Zebra Android 11 device: 1. Open "Settings". 2. Tap "Security". 3. Tap "Advanced". 4. Tap "Trust agents". 5. Verify that all listed trust agents are disabled and cannot be enabled. If on the EMM console "disable trust agents" is not selected, or on the Android 11 device a trust agent can be enabled, this is a finding.
Fix: F-56266r820506_fix
Configure Zebra Android 11 device to disable trust agents. On the EMM console: 1. Open "Lock screen restrictions" section. 2. Select "Personal Profile". 3. Toggle "Disable trust agents" to "On". 4. Select "Work Profile". 5. Toggle "Disable trust agents" to "On".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- ZEBR-11-002800
- Vuln IDs
-
- V-252861
- Rule IDs
-
- SV-252861r820510_rule
Checks: C-56317r820508_chk
Review Zebra Android device configuration settings to determine whether a developer mode is enabled. This validation procedure is performed on both the EMM Administration Console and the Android 11 device. On the EMM Console: 1. Open "Set user restrictions" section. 2. Verify that "Disallow debugging features" is toggled to "On". 3. Open "Set user restrictions on parent" section. 4. Verify that "Disallow debugging features" is toggled to "On". On the Android 11 device, do the following: 1. Go to Settings >> System. 2. Ensure "Developer Options" is not listed. 3. Go to Settings >> About Phone. 4. Tap on the "Build Number" to try to enable "Developer Options" and validate that action is blocked. If the EMM console device policy is not set to disable developer mode or on the Android 11 device, the device policy is not set to disable developer mode, this is a finding.
Fix: F-56267r820509_fix
Configure the Zebra Android 11 device to disable developer modes. On the EMM Console: 1. Open "Set user restrictions" section. 2. Toggle "Disallow debugging features" to "On". 3. Open "Set user restrictions on parent" section. 4. Toggle "Disallow debugging features" to "On".
- RMF Control
- AC-8
- Severity
- L
- CCI
- CCI-000048
- Version
- ZEBR-11-003400
- Vuln IDs
-
- V-252862
- Rule IDs
-
- SV-252862r820513_rule
Checks: C-56318r820511_chk
The DoD warning banner can be displayed by either of the following methods (required text is found in the Vulnerability Discussion): 1. By placing the DoD warning banner text in the user agreement signed by each Zebra Android device user (preferred method). 2. By configuring the warning banner text on the EMM console and installing the banner on each managed mobile device. Determine which method is used at the Zebra Android device site and follow the appropriate validation procedure below. Validation Procedure for Method #1: Review the signed user agreements for several Zebra Android device users and verify the agreement includes the required DoD warning banner text. Validation Procedure for Method #2: On the EMM Console: 1. Open "Lock screen restrictions". 2. Select "Personal Profile". 3. Select "Lock screen message". 4. Verify message. If, for Method #1, the required warning banner text is not on all signed user agreements reviewed, or for Method #2, the EMM console device policy is not set to display a warning banner with the appropriate designated wording or on the Android 11 device, the device policy is not set to display a warning banner with the appropriate designated wording, this is a finding.
Fix: F-56268r820512_fix
Configure the DoD warning banner by either of the following methods (required text is found in the Vulnerability Discussion): 1. By placing the DoD warning banner text in the user agreement signed by each Zebra Android 11 device user (preferred method). 2. By configuring the warning banner text on the EMM console and installing the banner on each managed mobile device. On the EMM Console: 1. Open "Lock screen restrictions". 2. Select "Personal Profile". 3. Select "Lock screen message". 4. Enter in message.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- ZEBR-11-003500
- Vuln IDs
-
- V-252863
- Rule IDs
-
- SV-252863r820516_rule
Checks: C-56319r820514_chk
Review Zebra Android device configuration settings to determine if the mobile device has a USB mass storage mode and whether it has been disabled. This validation procedure is performed on both the EMM Administration Console and the Android 11 device. On the EMM console, do the following: 1. Open "User restrictions on parent". 2. Verify that "Disallow USB file transfer" is toggled to "On". On the Android 11 device, do the following: 1. Plug a USB cable into Android 11 device and connect to a non-DoD network-managed PC. 2. Go to Settings >> Connected devices >> USB. 3. Ensure "No data transfer" is selected. If the EMM console device policy is not set to disable USB mass storage mode or on the Android 11 device, the device policy is not set to disable USB mass storage mode, this is a finding.
Fix: F-56269r820515_fix
Configure the Zebra Android 11 device to disable USB mass storage mode. On the EMM console: 1. Open "User restrictions on parent". 2. Toggle "Disallow USB file transfer".
- RMF Control
- AC-20
- Severity
- M
- CCI
- CCI-000097
- Version
- ZEBR-11-003700
- Vuln IDs
-
- V-252864
- Rule IDs
-
- SV-252864r820519_rule
Checks: C-56320r820517_chk
Review Zebra Android device configuration settings to determine if the capability to back up to a locally connected system has been disabled. This validation procedure is performed on both the EMM Administration Console and the Android 11 device. On the EMM console, do the following: 1. Open "Device owner management" section. 2. Verify that "Enable backup service" is toggled to "Off". 3. Open "User restrictions on parent". 4. Verify that "Disallow USB file transfer" is toggled to "On". On the Android 11 device, do the following: 1. Plug a USB cable into Android 11 device and connect to a non-DoD network-managed PC. 2. Go to Settings >> Connected devices >> USB. 3. Ensure “No data transfer” is selected. If the EMM console device policy is not set to disable the capability to back up to a locally connected system or on the Android 11 device, the device policy is not set to disable the capability to back up to a locally connected system, this is a finding.
Fix: F-56270r820518_fix
Configure the Zebra Android 11 device to disable backup to locally connected systems. Note: On Restrictions, the backup features for Zebra are not in the framework. On the EMM console: 1. Open "Device owner management" section. 2. Toggle "Enable backup service" to "Off". 3. Open "User restrictions on parent". 4. Select "Disallow USB file transfer".
- RMF Control
- AC-20
- Severity
- M
- CCI
- CCI-002338
- Version
- ZEBR-11-003900
- Vuln IDs
-
- V-252865
- Rule IDs
-
- SV-252865r820522_rule
Checks: C-56321r820520_chk
Review Zebra Android device configuration settings to determine if the capability to back up to a remote system has been disabled. This validation procedure is performed on both the EMM Administration Console and the Android 11 device. On the EMM console, do the following: 1. Open "User restrictions". 2. Verify that "Disallow backup service" is toggled to "Off". On the Android 11 device, do the following: 1. Go to Settings >> System. 2. Ensure Backup is set to "Off". If the EMM console device policy is not set to disable the capability to back up to a remote system or on the Android 11 device, the device policy is not set to disable the capability to back up to a remote system, this is a finding.
Fix: F-56271r820521_fix
Configure the Zebra Android 11 device to disable backup to remote systems (including commercial clouds). Note: On a Restriction, data in the work profile cannot be backed up by default. On the EMM console: 1. Open "Set user restrictions". 2. Ensure "Enable backup service" is not selected. Note: Since personal accounts cannot be added to the work profile (GOOG-11-009200), this control only impacts personal profile accounts. Site can allow backup based on local policy.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- ZEBR-11-004700
- Vuln IDs
-
- V-252866
- Rule IDs
-
- SV-252866r820525_rule
Checks: C-56322r820523_chk
Review documentation on the Zebra Android device and inspect the configuration on the Zebra Android device to disable multi-user modes. This validation procedure is performed on both the EMM Administration Console and the Android 11 device. On the EMM console, do the following: 1. Open "Set user restrictions". 2. Verify that "Disallow modify accounts" is toggled to "On". On the Android 11 device, do the following: 1. Go to Settings >> Accounts>> Work. 2. Validate that "Add Account" is grayed out. If the EMM console device policy is not set to disable multi-user modes or on the Android 11 device, the device policy is not set to disable multi-user modes, this is a finding.
Fix: F-56272r820524_fix
Configure the Zebra Android 11 device to disable multi-user modes. On the EMM console: 1. Open "Set user restrictions". 2. Toggle "Disallow modify accounts" to "On".
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- ZEBR-11-005200
- Vuln IDs
-
- V-252867
- Rule IDs
-
- SV-252867r820528_rule
Checks: C-56323r820526_chk
Review Zebra Android device configuration settings to determine if the mobile device has location services on/off. This validation procedure is performed on both the EMM Administration Console and the Android 11 device. On the EMM console, do the following: 1. Open "Set user restrictions on parent". 2. Verify that "Disallow config location" is toggled to "On". 3. Verify that "Disallow share location" is toggled to "On". On the Zebra device, do the following: 1. Open Settings >> Location. 2. Validate that Location Services is "off" for Work. If the mobile device has location services enabled, this is a finding.
Fix: F-56273r820527_fix
Configure the Zebra Android 11 device to enable/disable location services. On the EMM console: 1. Open "Set user restrictions on parent". 2. Toggle "Disallow config location" to "On". 3. Toggle "Disallow share location" to "On".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- ZEBR-11-005505
- Vuln IDs
-
- V-252868
- Rule IDs
-
- SV-252868r820531_rule
Checks: C-56324r820529_chk
Review documentation on the Zebra Android device and inspect the configuration on the Zebra Android device to enable audit logging. This validation procedure is performed on only on the EMM Administration Console. On the EMM console, do the following: 1. Open "Device owner management" section. 2. Verify that "Enable security logging" is toggled to "On". If the EMM console device policy is not set to enable audit logging, this is a finding.
Fix: F-56274r820530_fix
Configure the Zebra Android 11 device to enable audit logging. On the EMM console: 1. Open "Device owner management" section. 2. Toggle "Enable security logging" to "On".
- RMF Control
- AU-12
- Severity
- L
- CCI
- CCI-000169
- Version
- ZEBR-11-006100
- Vuln IDs
-
- V-252869
- Rule IDs
-
- SV-252869r820534_rule
Checks: C-56325r820532_chk
Review Zebra Android device configuration settings to determine if the mobile device is configured to generate audit records for the following auditable events: Detected integrity violations. This validation procedure is performed only on the EMM Administration Console. On the EMM console: 1. Open "Device owner management" section. 2. Verify that "Enable security logging" is toggled to "On". If the EMM console device policy is not set to enable security logging, this is a finding.
Fix: F-56275r820533_fix
Configure the Zebra Android 11 device to generate audit records for the following auditable events: Detected integrity violations. On the EMM console: 1. Open "Device owner management" section. 2. Toggle "Enable security logging" to "On".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- ZEBR-11-008700
- Vuln IDs
-
- V-252870
- Rule IDs
-
- SV-252870r820537_rule
Checks: C-56326r820535_chk
Review a sample of site User Agreements for Zebra device users or similar training records and training course content. Verify that Zebra device users have completed the required training. The intent is that required training is renewed periodically in a time period determined by the AO. If any Zebra device user has not completed the required training, this is a finding.
Fix: F-56276r820536_fix
All Zebra device users must complete training on the following training topics (users must acknowledge that they have reviewed training via a signed User Agreement or similar written record): - Operational security concerns introduced by unmanaged applications/unmanaged personal space, including applications using global positioning system (GPS) tracking. - Need to ensure no DoD data is saved to the personal space or transmitted from a personal app (for example, from personal email). (NA for COBO deployment) - If the Purebred key management app is used, users are responsible for maintaining positive control of their credentialed device at all times. The DoD PKI certificate policy requires subscribers to maintain positive control of the devices that contain private keys and to report any loss of control so the credentials can be revoked. Upon device retirement, turn-in, or reassignment, ensure that a factory data reset is performed prior to device hand-off. Follow mobility service provider decommissioning procedures as applicable. - How to configure the following UBE controls (users must configure the control) on the Zebra device: **Secure use of Calendar Alarm **Local screen mirroring and mirroring procedures (authorized/not authorized for use) **Do not upload DoD contacts via smart call and caller ID services **Do not remove DoD intermediate and root PKI digital certificates **Disable Wi-Fi Sharing **Do not configure a DoD network (work) VPN profile on any third-party VPN client installed in the personal space **If Bluetooth connections are approved for mobile device, types of allowed connections (for example car hands-free, but not Bluetooth wireless keyboard) **How to perform a full device wipe - AO guidance on acceptable use and restrictions, if any, on downloading and installing personal apps and data (music, photos, etc.) in the Zebra device personal space.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- ZEBR-11-008800
- Vuln IDs
-
- V-252871
- Rule IDs
-
- SV-252871r820540_rule
Checks: C-56327r820538_chk
Review device configuration settings to confirm Wi-Fi Sharing is disabled. Mobile Hotspot must be enabled to enable Wi-Fi Sharing. If the Authorizing Official (AO) has not approved Mobile Hotspot, and it has been verified as disabled on the EMM console, no further action is needed. If Mobile Hotspot is being used, use the following procedure to verify Wi-Fi Sharing is disabled: On the EMM console: 1. Open "Set user restrictions on parent". 2. Verify that "Disallow config tethering" is toggled to "On". On the Zebra Android 11 device, do the following: 1. Open Settings. 2. Tap "Networks & internet". 3. Verify that "Hotspots & tethering" is disabled. If on the Zebra Android 11 device "Wi-Fi sharing" is enabled, this is a finding.
Fix: F-56277r820539_fix
Configure Zebra Android 11 device to disable Wi-Fi Sharing. Mobile Hotspot must be enabled to enable Wi-Fi Sharing. If the AO has not approved Mobile Hotspot, and it has been disabled on the EMM console, no further action is needed. If Mobile Hotspot is being used, use the following procedure to disable Wi-Fi Sharing: On the EMM console: 1. Open "Set user restrictions on parent". 2. Toggle "Disallow config tethering" to "On".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- ZEBR-11-009000
- Vuln IDs
-
- V-252872
- Rule IDs
-
- SV-252872r820543_rule
Checks: C-56328r820541_chk
Review device configuration settings to confirm that the DoD root and intermediate PKI certificates are installed. This procedure is performed on both the EMM Administration console and the Zebra Android 11 device. The current DoD root and intermediate PKI certificates may be obtained in self-extracting zip files at http://cyber.mil/pki-pke (for NIPRNet). On the EMM console verify that the DoD root and intermediate certificates are part of a device and/or work profile that is being pushed down to the devices. On the Zebra Android 11 device, do the following: 1. Open "Settings". 2. Tap "Security". 3. Tap "Advanced". 4. Tap "Encryption & credentials". 5. Tap "Trusted credentials". 6. Verify that DoD root and intermediate PKI certificates are listed under the User tab in the Work section. If on the EMM console the DoD root and intermediate certificates are not listed in a profile, or the Zebra Android 11 device does not list the DoD root and intermediate certificates under the user tab, this is a finding.
Fix: F-56278r820542_fix
Configure Zebra Android 11 device to install DoD root and intermediate certificates. On the EMM console upload DoD root and intermediate certificates as part of a device and/or work profile. The current DoD root and intermediate PKI certificates may be obtained in self-extracting zip files at http://cyber.mil/pki-pke (for NIPRNet).
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- ZEBR-11-009100
- Vuln IDs
-
- V-252873
- Rule IDs
-
- SV-252873r820546_rule
Checks: C-56329r820544_chk
Review the device configuration to confirm that the user is unable to remove DoD root and intermediate PKI certificates. On the EMM console: 1. Open "Set user restrictions". 2. Verify that "Disallow config credentials" is toggled to "On". On the Zebra Android 11 device, do the following: 1. Open "Settings". 2. Tap "Security". 3. Tap "Advanced". 4. Tap "Encryption & credentials". 5. Tap "Trusted credentials". 6. Verify that the user is unable to untrust or remove any work certificates. If on the Zebra Android 11 device the user is able to remove certificates, this is a finding.
Fix: F-56279r820545_fix
Configure Zebra Android 11 device to prevent a user from removing DoD root and intermediate PKI certificates. On the EMM console: 1. Open "Set user restrictions". 2. Toggle "Disallow config credentials" to "On".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- ZEBR-11-009400
- Vuln IDs
-
- V-252874
- Rule IDs
-
- SV-252874r820549_rule
Checks: C-56330r820547_chk
Review the Zebra Android 11 Work Profile configuration settings to confirm the system application disable list is enforced. This setting is enforced by default. Verify only approved system apps have been placed on the core allow list. This procedure is performed on the EMM Administrator console. Review the system app allow list and verify only approved apps are on the list. 1. Open "Apps management" section. 2. Select "Hide apps on parent". 3. Verify package names of apps. If on the EMM console the system app allow list contains unapproved core apps, this is a finding.
Fix: F-56280r820548_fix
Configure Zebra Android 11 device Work to enforce the system application disable list. The required configuration is the default configuration when the device is enrolled. If the device configuration is changed, use the following procedure to bring the device back into compliance: On the EMM console: 1. Open "Apps management" section. 2. Select "Hide apps on parent". 3. Enter package names of apps. Configure a list of approved Zebra core and preinstalled apps in the core app allow list.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- ZEBR-11-009800
- Vuln IDs
-
- V-252875
- Rule IDs
-
- SV-252875r820552_rule
Checks: C-56331r820550_chk
Review Chrome Browser in Zebra Android 11 Work Profile autofill setting. This procedure is performed only on the EMM Administrator console. On the EMM console: 1. Open "Managed Configurations" section. 2. Select the Chrome Browser version from the work profile. 3.Verify that "SearchSuggestEnabled" is turned off. If on the EMM console autofill is set to "On" in the Chrome Browser Settings, this is a finding.
Fix: F-56281r820551_fix
Configure Chrome Browser in Zebra Android 11 device Work Profile to disable autofill. On the EMM console: 1. Open "Managed Configurations" section. 2. Select the Chrome Browser version from the work profile. 3. Ensure "SearchSuggestEnabled" is turned off. Refer to the EMM documentation to determine how to configure Chrome Browser Settings.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- ZEBR-11-010000
- Vuln IDs
-
- V-252876
- Rule IDs
-
- SV-252876r820555_rule
Checks: C-56332r820553_chk
Review the Zebra Android 11 work profile configuration settings to confirm that autofill services are disabled. This procedure is performed only on the EMM Administration console. On the EMM console: 1. Open "Set user restrictions". 2. Verify that "Disable autofill" is toggled to "On". If on the EMM console "disallow autofill" is not selected, this is a finding.
Fix: F-56282r820554_fix
Configure Zebra Android 11 device work profile to disable the autofill services. On the EMM console: 1. Open "Set user restrictions". 2. Toggle "Disable autofill" to "On".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- ZEBR-11-010200
- Vuln IDs
-
- V-252877
- Rule IDs
-
- SV-252877r820558_rule
Checks: C-56333r820556_chk
Review the Zebra Android 11 Work Profile configuration settings to confirm that autofill services are disabled. This procedure is performed on both the EMM Administration console and the Zebra Android 11 device. On the EMM console: 1. Open "Set user restrictions on parent". 2. Verify that "Disallow config date time" is toggled to "On". On the Zebra Android 11 device, do the following: 1. Open "Settings". 2. Tap "System". 3. Tap "Date & time". 4. Validate that "Use network-provided time" is grayed out. If on the EMM console "Disallow config date time" is not set to "On", or on the Zebra Android 11 device "User network-provided time" is not grayed out, this is a finding.
Fix: F-56283r820557_fix
Configure Zebra Android 11 work Profile to set auto network time. On the EMM console: 1. Open "Set user restrictions on parent". 2. Toggle "Disallow config date time" to "On".
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- ZEBR-11-010800
- Vuln IDs
-
- V-252878
- Rule IDs
-
- SV-252878r820561_rule
Checks: C-56334r820559_chk
Review device configuration settings to confirm the Zebra Android device has the most recently released version of Zebra Android 11 installed. This procedure is performed on both the EMM console and the Zebra Android 11 device. In the EMM management console, review the version of Zebra Android 11 installed on a sample of managed devices. This procedure will vary depending on the EMM product. On the Zebra Android 11 device, to see the installed operating system version: 1. Open "Settings". 2. Tap "About phone". 3. Verify "Build number". If the installed version of the Android operating system on any reviewed Zebra devices is not the latest released by Zebra, this is a finding.
Fix: F-56284r820560_fix
Install the latest released version of the Zebra Android 11 operating system on all managed Zebra devices. Note: Zebra Android device operating system updates are released directly by Zebra or can be distributed via the EMM.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- ZEBR-11-011000
- Vuln IDs
-
- V-252879
- Rule IDs
-
- SV-252879r820564_rule
Checks: C-56335r820562_chk
Review device configuration settings to confirm that no third-party keyboards are enabled. This procedure is performed on the EMM console. On the EMM console, configure application allow list for Google Play that does not have any third-party keyboards. If third-party keyboards are allowed, this is a finding.
Fix: F-56285r820563_fix
Configure Zebra Android 11 device to disallow the use of third-party keyboards. On the EMM console, configure application allow list for Google Play that does not have any third-party keyboards.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- ZEBR-11-011100
- Vuln IDs
-
- V-252880
- Rule IDs
-
- SV-252880r820567_rule
Checks: C-56336r820565_chk
Review device configuration settings to confirm CC mode is enabled. This procedure is performed on the EMM console. In the EMM management console, verify CC Mode has been enabled. If CC mode is not enabled, this is a finding.
Fix: F-56286r820566_fix
Configure Zebra Android 11 device to implement CC Mode. On the EMM console, enable "CC Mode".