Zebra Android 13 COBO Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
- RMF Control
- AU-6
- Severity
- M
- CCI
- CCI-000154
- Version
- ZEBR-13-002800
- Vuln IDs
-
- V-270007
- Rule IDs
-
- SV-270007r1052761_rule
Checks: C-74040r1052759_chk
Inspect the configuration on the managed Zebra Android 13 device to enable audit logging. This validation procedure is performed only on the EMM Administration Console. On the EMM console: COBO and COPE: 1. Open the "Device owner management" section. 2. Verify "Enable security logging" is toggled to "ON". If the EMM console device policy is not set to enable audit logging, this is a finding.
Fix: F-73941r1052760_fix
Configure the Zebra Android 13 device to enable audit logging. On the EMM console: COBO and COPE: 1. Open the "Device owner management" section. 2. Toggle "Enable security logging" to "ON".
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- ZEBR-13-006000
- Vuln IDs
-
- V-270030
- Rule IDs
-
- SV-270030r1052830_rule
Checks: C-74063r1052828_chk
Review managed Zebra Android 13 device configuration settings to determine if the mobile device is enforcing a minimum password length of six characters. This validation procedure is performed on both the EMM Administration Console and the managed Zebra Android 13 device. On the EMM console: COBO: 1. Open "Lock screen" settings. 2. Open "Password constraints". 3. Open "Minimum password quality". 4. Verify Numeric Complex, Alphabetic, Alphanumeric, or Complex is selected. 5. Open "Minimum password length". 6. Verify "6" is set for number of characters. COPE: 1. Open "Lock screen" settings. 2. Open "Password constraints". 3. Select "Personal Profile". 4. Verify "Minimum password quality" is set to Numeric Complex, Alphabetic, Alphanumeric, or Complex. 5. Open "Minimum password length". 6. Verify the number of characters is set to "6" or higher. _____________________________ On the managed Zebra Android 13 device: COBO and COPE: 1. Open Settings >> Security >> Screen lock. 2. Enter current password. 3. Tap "Pin or Password". 4. Verify Password length required is at least "6". If the device password length is not set to six characters or more on EMM console or on the managed Zebra Android 13 device, this is a finding.
Fix: F-73964r1052829_fix
Configure the Zebra Android 13 device to enforce a minimum password length of six characters. On the EMM console: COBO: 1. Open "Lock screen" settings. 2. Open "Password constraints". 3. Open "Minimum password quality". 4. Choose Numeric Complex, Alphabetic, Alphanumeric, or Complex. 5. Open "Minimum password length". 6. Enter in the number of characters as "6". COPE: 1. Open "Lock screen" settings. 2. Open "Password constraints". 3. Select "Personal Profile". 4. Open "Minimum password quality". 5. Choose Numeric Complex, Alphabetic, Alphanumeric, or Complex. 6. Open "Minimum password length". 7. Enter in the number of characters as "6".
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- ZEBR-13-006100
- Vuln IDs
-
- V-270031
- Rule IDs
-
- SV-270031r1052833_rule
Checks: C-74064r1052831_chk
Review managed Zebra Android 13 device configuration settings to determine if the mobile device is prohibiting passwords with more than four repeating or sequential characters. This validation procedure is performed on both the EMM Administration Console and the managed Zebra Android 13 device. On the EMM console: COBO: 1. Open "Lock screen" settings. 2. Open "Password constraints". 3. Verify that quality is set to "Numeric (Complex)" or higher. COPE: 1. Open "Lock screen" settings. 2. Open "Password constraints". 3. Select "Personal Profile". 4. Verify that quality is set to "Numeric (Complex)" or higher. ____________________________ On the managed Zebra Android 13 device: COBO and COPE: 1. Open Settings >> Security >> Screen lock. 2. Enter current password. 3. Select "PIN". 4. Try to enter a new PIN with repeating numbers. 5. Verify Password complexity requirements are listed: Ascending, descending, or repeated sequence of digits is not allowed. If the EMM console device policy is set to a password with more than two repeating or sequential characters or on the managed Zebra Android 13 device, the device policy is set to a password with more than two repeating or sequential characters, this is a finding. Note: Alphabetic, Alphanumeric, and Complex are also acceptable selections, but these selections will cause the user to select a complex password, which is not required by the STIG.
Fix: F-73965r1052832_fix
Configure the Zebra Android 13 device to prevent passwords from containing more than four repeating or sequential characters. On the EMM console: COBO: 1. Open "Lock screen" settings. 2. Open "Password constraints". 3. Set password quality to "Numeric (Complex)". COPE: 1. Open "Password constraints". 2. Select "Personal Profile". 3. Set password quality to "Numeric (Complex)". Note: Alphabetic, Alphanumeric, and Complex are also acceptable selections, but these selections will cause the user to select a complex password, which is not required by the STIG.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000057
- Version
- ZEBR-13-006300
- Vuln IDs
-
- V-270032
- Rule IDs
-
- SV-270032r1052836_rule
Checks: C-74065r1052834_chk
Review managed Zebra Android device configuration settings to determine if the mobile device is enforcing a screen-lock policy that will lock the display after a period of 15 minutes or less of inactivity. Note: Zebra Android 13 does not support the 15-minute increment. The available allowable selection is 10 mins then increases to 30 minutes. Therefore, the control should be set to 10 minutes. This validation procedure is performed on both the EMM Administration Console and the Android 13 device. On the EMM Console: COBO: 1. Open "Lock screen restrictions". 2. Verify that "Max time to screen lock" is set to "600". Note: The units are in seconds. COPE: 1. Open "Lock screen restrictions". 2. Select "Personal Profile". 3. Verify that "Max time to screen lock" is set to "600". Note: The units are in seconds. On the managed Zebra Android 13 device: COBO and COPE: 1. Open Settings >> Display. 2. Tap "Screen timeout". 3. Ensure the Screen timeout value is set to "600" seconds. If the EMM console device policy is not set to enable a screen-lock policy that will lock the display after a period of inactivity of 600 seconds, this is a finding.
Fix: F-73966r1052835_fix
Configure the Zebra Android 13 device to enable a screen-lock policy of 15 minutes for the max period of inactivity. Note: Zebra Android 13 does not support the 15-minute increment. The available allowable selection is 10 mins then increases to 30 minutes. Therefore, the control will be set to 10 minutes. On the EMM Console: COBO: 1. Open "Lock screen restrictions". 2. Set "Max time to screen lock" to "600". Note: The units are in seconds. COPE: 1. Open "Lock screen restrictions". 2. Select "Personal Profile". 3. Set "Max time to screen lock" to "600". Note: The units are in seconds.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- ZEBR-13-006400
- Vuln IDs
-
- V-270033
- Rule IDs
-
- SV-270033r1052839_rule
Checks: C-74066r1052837_chk
Review managed Zebra Android 13 device configuration settings to determine if the mobile device has the maximum number of consecutive failed authentication attempts set at 10 or fewer. This validation procedure is performed on both the EMM Administration Console and the managed Zebra Android 13 device. On the EMM Console: COBO: 1. Open "Lock screen" settings. 2. Open "Lock screen restrictions". 3. Verify that "Max password failures for local wipe" is set to a number between 1 and 10. COPE: 1. Open "Lock screen" settings. 2. Open "Lock screen restrictions". 3. Select "Personal Profile". 4. Verify that "Max password failures for local wipe" is set to a number between 1 and 10. _________________________ On the managed Zebra Android 13 device: COBO and COPE: 1. Lock the device screen. 2. Attempt to unlock the screen and validate that the device autowipes after a specified number of invalid entries. Note: Perform this verification only with a test phone set up with a production profile. If the EMM console device policy is not set to the maximum number of consecutive failed authentication attempts at 10 or fewer, or if on the managed Zebra Android 13 device the device policy is not set to the maximum number of consecutive failed authentication attempts at 10 or fewer, this is a finding.
Fix: F-73967r1052838_fix
Configure the Zebra Android 13 device to allow only 10 or fewer consecutive failed authentication attempts. On the EMM Console: COBO: 1. Open "Lock screen" settings. 2. Open "Lock screen restrictions". 3. Set "Max password failures for local wipe" to a number between 1 and 10. COPE: 1. Open "Lock screen" settings. 2. Open "Lock screen restrictions". 3. Select "Personal Profile". 4. Set "Max password failures for local wipe" to a number between 1 and 10.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- ZEBR-13-006500
- Vuln IDs
-
- V-270034
- Rule IDs
-
- SV-270034r1052842_rule
Checks: C-74067r1052840_chk
Review managed Zebra Android 13 device configuration settings to determine if the mobile device has only approved application repositories (DOD-approved commercial app repository, EMM server, and/or mobile application store). This validation procedure is performed on both the EMM Administration Console and the managed Zebra Android 13 device. On the EMM Console: COBO and COPE: 1. Open "Set user restrictions". 2. Verify that "Disallow install unknown sources" is toggled to "ON". 3. Verify that "Disallow installs from unknown sources globally" is toggled to "ON". On the Zebra Android 13 device: COBO and COPE: 1. Open Settings >> Apps >> Special app access. 2. Open "Install unknown apps". 3. Ensure the list of apps is blank or if an app is on the list, "Disabled by admin" is listed under the app name. If the EMM console device policy is not set to allow connections to only approved application repositories or on the managed Zebra Android 13 device, the device policy is not set to allow connections to only approved application repositories, this is a finding.
Fix: F-73968r1052841_fix
Configure the Zebra Android 13 device to disable unauthorized application repositories. On the EMM Console: COBO and COPE: 1. Open "Set user restrictions". 2. Toggle "Disallow install unknown sources" to "ON". 3. Toggle "Disallow installs from unknown sources globally" to "ON".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001764
- Version
- ZEBR-13-006600
- Vuln IDs
-
- V-270035
- Rule IDs
-
- SV-270035r1053270_rule
Checks: C-74068r1053270_chk
Review managed Zebra Android 13 device configuration settings to determine if the mobile device has an application allowlist configured. Verify all applications listed on the allowlist have been approved by the authorizing official (AO). On the EMM console: COBO and COPE: 1. Go to the Android app catalog for managed Google Play. 2. Verify all selected apps are AO approved. On the managed Zebra Android 13 device: COBO and COPE: 1. Open the managed Google Play Store. 2. Verify that only the approved apps are visible. Note: Managed Google Play is an allowed App Store. If the EMM console list of selected managed Google Play apps includes nonapproved apps, this is a finding. Note: The application allowlist will include approved core applications (included in the OS by the OS vendor) and preinstalled applications (provided by the MD vendor and wireless carrier), or the MD must provide an alternate method of restricting user access/execution to core and pre-installed applications. For Zebra Android, there are no preinstalled applications.
Fix: F-73969r1052844_fix
Configure the Zebra Android 13 device to use an application allowlist. On the EMM Console: COBO and COPE: 1. Go to the Android app catalog for managed Google Play. 2. Select apps to be available (only approved apps). 3. Push updated policy to the device. Note: Managed Google Play is an allowed App Store.
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- ZEBR-13-006700
- Vuln IDs
-
- V-270036
- Rule IDs
-
- SV-270036r1052848_rule
Checks: C-74069r1052846_chk
Review managed Zebra Android 13 device configuration settings to determine if the mobile device has an application allowlist configured and that the application allowlist does not include applications with the following characteristics: - Back up MD data to non-DOD cloud servers (including user and application access to cloud backup services); - Transmit MD diagnostic data to non-DOD servers; - Voice assistant application if available when MD is locked; - Voice dialing application if available when MD is locked; - Allows synchronization of data or applications between devices associated with user; - Payment processing; and - Allows unencrypted (or encrypted but not FIPS 140-2/140-3 validated) data sharing with other MDs, display screens (screen mirroring), or printers. This validation procedure is performed only on the EMM Administration Console. On the EMM console: 1. Review the list of selected Managed Google Play apps. 2. Review the details and privacy policy of each selected app to ensure the app does not include prohibited characteristics. If the EMM console device policy includes applications with unauthorized characteristics, this is a finding.
Fix: F-73970r1052847_fix
Configure the Zebra Android 13 device application allowlist to exclude applications with the following characteristics: - Back up MD data to non-DOD cloud servers (including user and application access to cloud backup services); - Transmit MD diagnostic data to non-DOD servers; - Voice assistant application if available when MD is locked; - Voice dialing application if available when MD is locked; - Allows synchronization of data or applications between devices associated with user; - Payment processing; and - Allows unencrypted (or encrypted but not FIPS 140-2/140-3 validated) data sharing with other MDs, display screens (screen mirroring), or printers. On the EMM Console: 1. Go to the Android app catalog for managed Google Play. 2. Before selecting an app, review the app details and privacy policy to ensure the app does not include prohibited characteristics.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000060
- Version
- ZEBR-13-006800
- Vuln IDs
-
- V-270037
- Rule IDs
-
- SV-270037r1052851_rule
Checks: C-74070r1052849_chk
Review managed Zebra Android 13 device settings to determine if the Zebra Android 13 device displays (work profile) notifications on the lock screen. Notifications of incoming phone calls are acceptable even when the device is locked. This validation procedure is performed on both the EMM Administration Console and the managed Zebra Android 13 device. On the EMM console: COBO: 1. Open "Lock screen" settings. 2. Open "Lock screen restrictions". 3. Verify that "Disable unredacted notifications" is toggled to "ON". COPE: 1. Open "Lock screen" settings. 2. Open "Lock screen restrictions". 3. Select "Work Profile". 4. Verify that "Disable unredacted notifications" is toggled to "ON". ___________________________ On the managed Zebra Android 13 device: COBO: 1. Go to Settings >> Display >> Lock screen. 2. Tap on "Privacy". 3. Verify that "Show sensitive content only when unlocked" is selected. COPE: 1. Go to Settings >> Display >> Lock screen. 2. Tap on "When work profile is locked". 3. Verify that "Hide sensitive work content" is selected. If the EMM console device policy allows work notifications on the lock screen, or the managed Zebra Android 13 device allows work notifications on the lock screen, this is a finding.
Fix: F-73971r1052850_fix
Configure the Zebra Android 13 device to not display (work profile) notifications when the device is locked. On the EMM console: COBO: 1. Open "Lock screen" settings. 2. Open "Lock screen restrictions". 3. Toggle "Disable unredacted notifications". COPE: 1. Open "Lock screen" settings. 2. Open "Lock screen restrictions". 3. Select "Work Profile". 4. Toggle "Disable unredacted notifications".
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000765
- Version
- ZEBR-13-007200
- Vuln IDs
-
- V-270041
- Rule IDs
-
- SV-270041r1052863_rule
Checks: C-74074r1052861_chk
Review device configuration settings to confirm that trust agents are disabled. This procedure is performed on both the EMM Administration console and the managed Zebra Android 13 device. On the EMM console: COBO: 1. Open "Lock screen restrictions". 2. Verify "Disable trust agents" is toggled to "ON". COPE: 1. Open "Lock screen restrictions". 2. Select "Personal Profile". 3. Verify "Disable trust agents" is toggled to "ON". 4. Select "Work Profile". 5. Verify "Disable trust agents" is toggled to "ON". ____________________________ On the managed Zebra Android 13 device: COBO and COPE: 1. Open Settings. 2. Tap "Security". 3. Tap "Advanced". 4. Tap "Trust agents". 5. Verify all listed trust agents are disabled and cannot be enabled. If on the EMM console, "disable trust agents" is not selected, or on the managed Zebra Android 13 device a trust agent can be enabled, this is a finding.
Fix: F-73975r1052862_fix
Configure the Zebra Android 13 device to disable trust agents. On the EMM console: COBO: 1. Open "Lock screen restrictions". 2. Toggle "Disable trust agents" to "ON". COPE: 1. Open "Lock screen restrictions". 2. Select "Personal Profile". 3. Toggle "Disable trust agents" to "ON". 4. Select "Work Profile". 5. Toggle "Disable trust agents" to "ON".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- ZEBR-13-007400
- Vuln IDs
-
- V-270043
- Rule IDs
-
- SV-270043r1052869_rule
Checks: C-74076r1052867_chk
Review managed Zebra Android 13 device configuration settings to determine whether a developer mode is enabled. This validation procedure is performed on both the EMM Administration Console and the managed Zebra Android 13 device. On the EMM Console: COBO: 1. Open "Set user restrictions". 2. Verify "Disallow debugging features" is toggled to "ON". COPE: 1. Open "Set user restrictions". 2. Verify "Disallow debugging features" is toggled to "ON". 3. Open "Set user restrictions on parent". 4. Verify "Disallow debugging features" is toggled to "ON". ____________________________ On the managed Zebra Android 13 device: COBO and COPE: 1. Go to Settings >> System. 2. Ensure "Developer Options" is not listed. 3. Go to Settings >> About Phone. 4. Tap on the Build Number to try to enable Developer Options and validate the action is blocked. If the EMM console device policy is not set to disable developer mode or on the managed Zebra Android 13 device, the device policy is not set to disable developer mode, this is a finding.
Fix: F-73977r1052868_fix
Configure the Zebra Android 13 device to disable developer modes. On the EMM Console: COBO: 1. Open "Set user restrictions". 2. Toggle "Disallow debugging features" to "ON". COPE: 1. Open "Set user restrictions". 2. Toggle "Disallow debugging features" to "ON". 3. Open "Set user restrictions on parent". 4. Toggle "Disallow debugging features" to "ON".
- RMF Control
- AC-8
- Severity
- L
- CCI
- CCI-000048
- Version
- ZEBR-13-007700
- Vuln IDs
-
- V-270046
- Rule IDs
-
- SV-270046r1052878_rule
Checks: C-74079r1052876_chk
The DOD warning banner can be displayed by either of the following methods (required text is found in the Vulnerability Discussion): 1. By placing the DOD warning banner text in the user agreement signed by each managed Android 13 device user (preferred method). 2. By configuring the warning banner text on the EMM console and installing the banner on each managed Android 13 mobile device. Determine which method is used at the Zebra Android 13 device site and follow the appropriate validation procedure below. Validation Procedure for Method #1: Review the signed user agreements for several Zebra Android 13 device users and verify the agreement includes the required DOD warning banner text. Validation Procedure for Method #2: On the EMM Console: COBO: 1. Open "Lock screen restrictions". 2. Select "Lock screen message". 3. Verify the message. COPE: 1. Open "Lock screen restrictions". 2. Select "Personal Profile". 3. Select "Lock screen message". 4. Verify the message. If, for Method #1, the required warning banner text is not on all signed user agreements reviewed, or for Method #2, the EMM console device policy is not set to display a warning banner with the appropriate designated wording or on the managed Zebra Android 13 device, the device policy is not set to display a warning banner with the appropriate designated wording, this is a finding.
Fix: F-73980r1052877_fix
Configure the DOD warning banner by either of the following methods (required text is found in the Vulnerability Discussion): 1. By placing the DOD warning banner text in the user agreement signed by each Zebra Android 13 device user (preferred method). 2. By configuring the warning banner text on the EMM console and installing the banner on each Zebra Android 13 mobile device. On the EMM Console: COBO: 1. Open "Lock screen restrictions". 2. Select "Lock screen message". 3. Enter in message. COPE: 1. Open "Lock screen restrictions". 2. Select "Personal Profile". 3. Select "Lock screen message". 4. Enter in message.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- ZEBR-13-007800
- Vuln IDs
-
- V-270047
- Rule IDs
-
- SV-270047r1052881_rule
Checks: C-74080r1052879_chk
Review managed Zebra Android 13 device configuration settings to determine if the mobile device is configured to generate audit records for the following auditable events: Detected integrity violations. This validation procedure is performed only on the EMM Administration Console. On the EMM console: COBO and COPE: 1. Open "Device owner management" section. 2. Verify that "Enable security logging" is toggled to "ON". If the EMM console device policy is not set to enable security logging, this is a finding.
Fix: F-73981r1052880_fix
Configure the Zebra Android 13 device to generate audit records for the following auditable events: Detected integrity violations. On the EMM console: COBO and COPE: 1. Open "Device owner management" section. 2. Toggle "Enable security logging" to "ON".
- RMF Control
- SC-41
- Severity
- M
- CCI
- CCI-002546
- Version
- ZEBR-13-008400
- Vuln IDs
-
- V-270051
- Rule IDs
-
- SV-270051r1052893_rule
Checks: C-74084r1052891_chk
Review managed Zebra Android 13 device configuration settings to determine if the mobile device has a USB mass storage mode and whether it has been disabled. This validation procedure is performed on both the EMM Administration Console and the managed Zebra Android 13 device. On the EMM console: COBO: 1. Open "User restrictions". 2. Open "Set user restrictions". 3. Verify that "Disallow USB file transfer" is toggled to "ON". COPE: 1. Open "User restrictions". 2. Open "Set user restrictions on parent". 3. Verify "Disallow USB file transfer" is toggled to "ON". ______________________________ On the managed Zebra Android 13 device: 1. Plug a USB cable into the managed Zebra Android 13 device and connect to a non-DOD network-managed PC. 2. Go to Settings >> Connected devices >> USB. 3. Verify "No data transfer" is selected. If the EMM console device policy is not set to disable USB mass storage mode or on the managed Zebra Android 13 device, the device policy is not set to disable USB mass storage mode, this is a finding.
Fix: F-73985r1052892_fix
Configure the Zebra Android 13 device to disable USB mass storage mode. On the EMM console: COBO: 1. Open "User restrictions". 2. Open "Set user restrictions". 3. Toggle "Disallow USB file transfer" to "ON". COPE: 1. Open "User restrictions". 2. Open "Set user restrictions on parent". 3. Toggle "Disallow USB file transfer" to "ON".
- RMF Control
- SC-4
- Severity
- M
- CCI
- CCI-001090
- Version
- ZEBR-13-008500
- Vuln IDs
-
- V-270052
- Rule IDs
-
- SV-270052r1052896_rule
Checks: C-74085r1052894_chk
Review managed Zebra Android 13 device configuration settings to determine if the capability to back up to a locally connected system has been disabled. This validation procedure is performed on both the EMM Administration Console and the managed Zebra Android 13 device. On the EMM console: COBO and COPE: 1. Open "Device owner management". 2. Verify "Enable backup service" is toggled to "OFF". On the managed Zebra Android 13 device: COBO: 1. Go to Settings >> System >> Backup. 2. Verify Backup settings is "Not available". COPE: 1. Go to Settings >> System >> Backup. 2. Select "Work". 3. Verify Backup settings is "Not available". If the EMM console device policy is not set to disable the capability to back up to a locally connected system or on the managed Zebra Android 13 device, the device policy is not set to disable the capability to back up to a locally connected system, and this is a finding.
Fix: F-73986r1052895_fix
Configure the Zebra Android 13 device to disable backup to locally connected systems. On the EMM console: COBO and COPE: 1. Open "Device owner management". 2. Toggle "Enable backup service" to "OFF".
- RMF Control
- SC-4
- Severity
- M
- CCI
- CCI-001090
- Version
- ZEBR-13-008600
- Vuln IDs
-
- V-270053
- Rule IDs
-
- SV-270053r1052899_rule
Checks: C-74086r1052897_chk
Review managed Zebra Android 13 device configuration settings to determine if the capability to back up to a remote system has been disabled. Note: Since personal accounts cannot be added to the work profile (ZEBR-13-009800), this control only impacts personal profile accounts. Site can allow backup based on local policy. This validation procedure is performed on both the EMM Administration Console and the managed Zebra Android 13 device. On the EMM console: COBO and COPE: 1. Open "Device owner management". 2. Verify "Enable backup service" is toggled to "OFF". On the managed Zebra Android 13 device: COBO: 1. Go to Settings >> System >> System >> Backup. 2. Verify Backup settings is "Not available". COPE: 1. Go to Settings >> System >> System >> Backup. 2. Select "Work". 3. Verify Backup settings is "Not available". If the EMM console device policy is not set to disable the capability to back up to a remote system or on the managed Zebra Android 13 device, the device policy is not set to disable the capability to back up to a remote system, this is a finding.
Fix: F-73987r1052898_fix
Configure the Zebra Android 13 device to disable backup to remote systems (including commercial clouds). On the EMM console: COBO and COPE: 1. Open "Device owner management". 2. Toggle "Enable backup service" to "OFF". Note: Since personal accounts cannot be added to the work profile (ZEBR-13-009800), this control only impacts personal profile accounts. Site can allow backup based on local policy.
- RMF Control
- AC-18
- Severity
- M
- CCI
- CCI-001443
- Version
- ZEBR-13-008700
- Vuln IDs
-
- V-270054
- Rule IDs
-
- SV-270054r1052902_rule
Checks: C-74087r1052900_chk
This is a User-Based Enforcement (UBE) control. Check a sample of Pixel phones at the site and verify the Wi-Fi hotspot pre-shared key (password) is set to "WPA2/WPA3-Personal" or "WPA3-Personal". 1. Go to Settings >> Network & Internet >> Hotspot & tethering. 2. Enable "Wi-Fi hotspot". 3. On the left of the slide, tap "Wi-Fi Hotspot" to bring up the configuration options. 4. Click the "Security" link and verify either "WPA2/WPA3-Personal" or "WPA3-Personal" is selected. If the Wi-Fi hotspot security is not set to "WPA2/WPA3-Personal" or "WPA3-Personal", this is a finding.
Fix: F-73988r1052901_fix
This is a User-Based Enforcement (UBE) control. Train users to not change the default Wi-Fi hotspot security setting: 15-character complex Wi-Fi hotspot pre-shared key (password) ("WPA2/WPA3-Personal" or WPA3-Personal"). (ZEBR-15-009800) If the required pre-shared key is not set up, train users to use the following procedure to set up the required setting: 1. Go to Settings >> Network & Internet >> Hotspot & tethering. 2. Enable "Wi-Fi hotspot". 3. On the left of the slide, tap "Wi-Fi Hotspot" to bring up the configuration options. 4. Click the "Security" link and select either "WPA2/WPA3-Personal" or "WPA3-Personal".
- RMF Control
- SC-39
- Severity
- M
- CCI
- CCI-002530
- Version
- ZEBR-13-008900
- Vuln IDs
-
- V-270055
- Rule IDs
-
- SV-270055r1052905_rule
Checks: C-74088r1052903_chk
Review documentation on the managed Zebra Android 13 device and inspect the configuration on the Zebra Android device to verify the access control policy that prevents [selection: application processes] from accessing [selection: all] data stored by other [selection: application processes] is enabled. This validation procedure is performed only on the EMM Administration Console. On the EMM console: COPE: 1. Open "User restrictions". 2. Open "Set user restrictions". 3. Verify "Disallow cross profile copy/paste" is toggled to "ON". 4. Verify "Disallow sharing data into the profile" is toggled to "ON". If the EMM console device policy is not set to disable data sharing between profiles, this is a finding.
Fix: F-73989r1052904_fix
Configure the Zebra Android 13 device to enable the access control policy that prevents [selection: application processes, groups of application processes] from accessing [selection: all, private] data stored by other [selection: application processes, groups of application processes]. Note: All application data is inherently sandboxed and isolated from other applications. To disable copy/paste on the EMM Console: COPE: 1. Open "User restrictions". 2. Open "Set user restrictions". 3. Toggle "Disallow cross profile copy/paste" to "ON". 4. Toggle "Disallow sharing data into the profile" to "ON".
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-002110
- Version
- ZEBR-13-009000
- Vuln IDs
-
- V-270056
- Rule IDs
-
- SV-270056r1052908_rule
Checks: C-74089r1052906_chk
Review documentation on the managed Zebra Android 13 device and inspect the configuration on the Zebra Android device to disable multiuser modes. This validation procedure is performed on both the EMM Administration Console and the managed Zebra Android 13 device. On the EMM console: COBO and COPE: 1. Open "User restrictions". 2. Open "Set user restrictions". 3. Verify "Disallow modify accounts" is toggled to "ON". On the managed Zebra Android 13 device: COBO and COPE: 1. Go to Settings >> Passwords & Accounts >> Accounts for Owner. 2. Tap "Add account". 3. Verify the action is not allowed. If the EMM console device policy is not set to disable multi-user modes or on the managed Zebra Android 13 device, the device policy is not set to disable multi-user modes, this is a finding.
Fix: F-73990r1052907_fix
Configure the Zebra Android 13 device to disable multi-user modes. On the EMM console: COBO and COPE: 1. Open "User restrictions". 2. Open "Set user restrictions". 3. Toggle "Disallow modify accounts" to "ON".
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000381
- Version
- ZEBR-13-009400
- Vuln IDs
-
- V-270060
- Rule IDs
-
- SV-270060r1052920_rule
Checks: C-74093r1052918_chk
Determine if the authorizing official (AO) has approved the use of Bluetooth at the site. If the AO has not approved the use of Bluetooth, verify Bluetooth has been disabled. On the EMM console: COBO: 1. Open "User restrictions" section. 2. Verify "Disallow Bluetooth" is toggled to "ON". COPE: 1. Open "User restrictions on parent" section. 2. Verify "Disallow Bluetooth" is toggled to "ON". On the managed Zebra Android 13 device: COBO and COPE: 1. Go to Settings >> Connected Devices >> Connection Preferences >> Bluetooth. 2. Verify "Use Bluetooth" is set to OFF and cannot be toggled to "ON". If the AO has approved the use of Bluetooth, on the managed Android 13 device: 1. Go to Settings >> Connected Devices. 2. Verify only approved Bluetooth connected devices using approved profiles are listed. If the AO has not approved the use of Bluetooth, and Bluetooth use is not disabled via an EMM-managed device policy, this is a finding. If the AO has approved the use of Bluetooth, and Bluetooth devices using unauthorized Bluetooth profiles are listed on the device under "Connected devices", this is a finding.
Fix: F-73994r1052919_fix
Configure the Zebra Android 13 device to disable Bluetooth or if the AO has approved the use of Bluetooth (for example, for car hands-free use), train the user to connect to only authorized Bluetooth devices using only HSP, HFP, or SPP Bluetooth capable devices (UBE). To disable Bluetooth use the following procedure: On the EMM Console: COBO: 1. Open "User restrictions" section. 2. Toggle "Disallow Bluetooth" to "ON". COPE: 1. Open "User restrictions on parent" section. 2. Toggle "Disallow Bluetooth" to "ON". The user training requirement is satisfied in requirement ZEBR-13-009800.
- RMF Control
- SC-40
- Severity
- M
- CCI
- CCI-002536
- Version
- ZEBR-13-009500
- Vuln IDs
-
- V-270061
- Rule IDs
-
- SV-270061r1052923_rule
Checks: C-74094r1052921_chk
Review the configuration to determine if the Zebra Android devices are disallowing Wi-Fi Direct. This validation procedure is performed on both the management tool and the Zebra Android device. On the management tool, in the user restrictions, verify "Wi-Fi Direct" has been set to "Disallow". On the Zebra Android device: 1. Open Settings >> Connections >> Wi-Fi. 2. From the hamburger menu, select Wi-Fi Direct. 3. Verify that Wi-Fi Direct cannot be selected. If on the management tool "Wi-Fi Direct" is not set to "Disallow", or on the Zebra Android device a Wi-Fi direct device is listed that can be connected to, this is a finding.
Fix: F-73995r1052922_fix
Configure the Zebra Android devices to disallow Wi-Fi Direct. On the management tool, in the user restrictions, set "Wi-Fi Direct" to "Disallow". Wi-Fi direct connections and pairing between devices will become unavailable.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- ZEBR-13-009800
- Vuln IDs
-
- V-270063
- Rule IDs
-
- SV-270063r1052929_rule
Checks: C-74096r1052927_chk
Review a sample of site User Agreements for Zebra Android 13 device users or similar training records and training course content. Verify that the Zebra Android 13 device users have completed the required training. The intent is that required training is renewed on a periodic basis in a time period determined by the AO. If any Zebra Android 13 device user has not completed the required training, this is a finding.
Fix: F-73997r1052928_fix
All Zebra Android 13 device users must complete training on the following training topics (users must acknowledge that they have reviewed training via a signed User Agreement or similar written record): - Operational security concerns introduced by unmanaged applications/unmanaged personal space, including applications using global positioning system (GPS) tracking. - Must ensure no DOD data is saved to the personal space or transmitted from a personal app (for example, from personal email). - If the Purebred key management app is used, users are responsible for maintaining positive control of their credentialed device at all times. The DOD PKI certificate policy requires subscribers to maintain positive control of the devices that contain private keys and to report any loss of control so the credentials can be revoked. Upon device retirement, turn-in, or reassignment, ensure that a factory data reset is performed prior to device hand-off. Follow mobility service provider decommissioning procedures as applicable. - How to configure the following UBE controls (users must configure the control) on the Zebra device: **Secure use of Calendar Alarm. **Local screen mirroring and mirroring procedures (authorized/not authorized for use). **Do not upload DOD contacts via smart call and caller ID services. **Do not configure a DOD network (work) VPN profile on any third-party VPN client installed in the personal space. **If Bluetooth connections are approved for mobile device, types of allowed connections (for example car hands-free, but not Bluetooth wireless keyboard). **How to perform a full device wipe. **Use default Wi-Fi hotspot password: 15-character complex Wi-Fi hotspot pre-shared password enabled ("WPA2/WPA3-personal") - AO guidance on acceptable use and restrictions, if any, on downloading and installing personal apps and data (music, photos, etc.) in the Zebra device personal space.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- ZEBR-13-009900
- Vuln IDs
-
- V-270064
- Rule IDs
-
- SV-270064r1052932_rule
Checks: C-74097r1052930_chk
Review device configuration settings to confirm Wi-Fi Sharing is disabled. Mobile Hotspot must be enabled to enable Wi-Fi Sharing. If the authorizing official (AO) has not approved Mobile Hotspot, and it has been verified as disabled on the EMM console, no further action is needed. If Mobile Hotspot is being used, use the following procedure to verify Wi-Fi Sharing is disabled: On the EMM console: COBO: 1. Open "Set user restrictions". 2. Verify "Disallow config tethering" is toggled to "ON". COPE: 1. Open "Set user restrictions on parent". 2. Toggle "Disallow config tethering" to "ON". On the managed Zebra Android 13 device: COBO and COPE: 1. Go to Settings >> Network & Internet. 2. Verify "Hotspot & tethering" is "Controlled by admin". 3. Verify that tapping "Hotspot & tethering" provides a prompt to the user specifying "Action not allowed". If on the managed Zebra Android 13 device "Hotspot & tethering" is enabled, this is a finding.
Fix: F-73998r1052931_fix
Configure the Zebra Android 13 device to disable Wi-Fi Sharing. Mobile Hotspot must be enabled to enable Wi-Fi Sharing. If the AO has not approved Mobile Hotspot, and it has been disabled on the EMM console, no further action is needed. If Mobile Hotspot is being used, use the following procedure to disable Wi-Fi Sharing: On the EMM console: COBO: 1. Open "Set user restrictions". 2. Toggle "Disallow config tethering" to "ON". COPE: 1. Open "Set user restrictions on parent". 2. Toggle "Disallow config tethering" to "ON".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- ZEBR-13-010100
- Vuln IDs
-
- V-270065
- Rule IDs
-
- SV-270065r1052935_rule
Checks: C-74098r1052933_chk
Review the managed Zebra Android 13 work profile configuration settings to confirm that users are prevented from adding personal email accounts to the work email app. This procedure is performed on both the EMM Administrator console and the managed Zebra Android 13 device. COPE: On the EMM console: 1. Open "Set user restrictions". 2. Verify "Disallow modify accounts" is toggled to "ON". On the managed Zebra Android 13 device: 1. Open "Settings". 2. Tap "Passwords & accounts". 3. Select "Work". 4. Tap "Add account". 5. Verify a message is displayed to the user stating, "Action not allowed". If on the EMM console the restriction to "Disallow modify accounts" is not set, or on the managed Zebra Android 13 device the user is able to add an account in the Work section, this is a finding.
Fix: F-73999r1052934_fix
Configure the Zebra Android 13 device to prevent users from adding personal email accounts to the work email app. On the EMM console: COPE: 1. Open "Set user restrictions". 2. Toggle "Disallow modify accounts" to "ON". Refer to the EMM documentation to determine how to provision users' work email accounts for the work email app.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- ZEBR-13-010500
- Vuln IDs
-
- V-270066
- Rule IDs
-
- SV-270066r1052938_rule
Checks: C-74099r1052936_chk
Review the Zebra Android 13 work profile configuration settings to confirm that autofill services are disabled. This procedure is performed only on the EMM Administration console. On the EMM console: COPE: 1. Open "Set user restrictions". 2. Verify "Disable autofill" is toggled to "ON". If on the EMM console "disallow autofill" is not selected, this is a finding.
Fix: F-74000r1052937_fix
Configure the Zebra Android 13 device work profile to disable the autofill services. On the EMM console: COPE: 1. Open "Set user restrictions". 2. Toggle "Disable autofill" to "ON".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- ZEBR-13-010600
- Vuln IDs
-
- V-270067
- Rule IDs
-
- SV-270067r1052941_rule
Checks: C-74100r1052939_chk
Review the managed Zebra Android 13 device configuration settings to confirm that autofill services are disabled. This procedure is performed on both the EMM Administration console and the managed Zebra Android 13 device. On the EMM console: COBO: 1. Open "Set user restrictions". 2. Verify "Disallow config date time" is toggled to "ON". COPE: 1. Open "Set user restrictions on parent". 2. Verify "Disallow config date time" is toggled to "ON". On the managed Zebra Android 13 device: COBO and COPE: 1. Open Settings. 2. Tap "System". 3. Tap "Date & times". 4. Verify "Set time automatically" is grayed out and is "Enabled by admin". If on the EMM console "Disallow config date time" is not set to "On", or on the managed Android 13 device "User network-provided time" is not grayed out, this is a finding.
Fix: F-74001r1052940_fix
Configure the Zebra Android 13 device to set auto network time. On the EMM console: COBO: 1. Open "Set user restrictions". 2. Toggle "Disallow config date time" to "ON". COPE: 1. Open "Set user restrictions on parent". 2. Toggle "Disallow config date time" to "ON".
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- ZEBR-13-010800
- Vuln IDs
-
- V-270069
- Rule IDs
-
- SV-270069r1052947_rule
Checks: C-74102r1052945_chk
Review device configuration settings to confirm the Zebra Android device has the most recently released version of managed Zebra Android 13 installed. This procedure is performed on both the EMM console and the managed Zebra Android 13 device. In the EMM management console, review the version of Zebra Android 13 installed on a sample of managed devices. This procedure will vary depending on the EMM product. On the managed Zebra Android 13 device, to determine the installed operating system version: COBO and COPE: 1. Open Settings. 2. Tap "About phone". 3. Verify "Build number". If the installed version of the Zebra Android 13 operating system on any reviewed devices is not the latest released by Zebra, this is a finding.
Fix: F-74003r1052946_fix
Install the latest released version of the Zebra Android 13 operating system on all managed Zebra devices. Note: Zebra Android device operating system updates are released directly by Zebra or can be distributed via the EMM. Check each device manufacturer and/or carriers for current updates.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- ZEBR-13-010900
- Vuln IDs
-
- V-270070
- Rule IDs
-
- SV-270070r1052950_rule
Checks: C-74103r1052948_chk
Review the managed Zebra Android 13 configuration settings to confirm that no third-party keyboards are enabled. This procedure is performed on the EMM console. On the EMM console: COBO and COPE: 1. Open "Input methods". 2. Tap "Set input methods". 3. Verify only the approved keyboards are selected. If third-party keyboards are allowed, this is a finding.
Fix: F-74004r1052949_fix
Configure the Zebra Android 13 device to disallow the use of third-party keyboards. On the EMM console: COBO and COPE: 1. Open "Input methods". 2. Tap "Set input methods". 3. Select only the approved keyboard. Additionally, Admins can configure application allowlists for Zebra Play that do not have any third-party keyboards for user installation.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- ZEBR-13-011000
- Vuln IDs
-
- V-270071
- Rule IDs
-
- SV-270071r1052953_rule
Checks: C-74104r1052951_chk
Review the managed Zebra Android 13 configuration settings to confirm CC mode is enabled. This procedure is performed on the EMM console. COBO and COPE: 1. Open Device owner management. 2. Verify "Enable Common Criteria mode" is toggled to "ON". If CC mode is not enabled, this is a finding.
Fix: F-74005r1052952_fix
Configure the Zebra Android 13 device to implement CC Mode. On the EMM console: COBO and COPE: 1. Open Device owner management. 2. Toggle "Enable Common Criteria mode" to "ON".
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- ZEBR-13-012200
- Vuln IDs
-
- V-270072
- Rule IDs
-
- SV-270072r1052956_rule
Checks: C-74105r1052954_chk
Review the device configuration to confirm that the USB port is disabled except for charging the device. On the EMM console: 1. Open "Set user restrictions". 2. Verify "Enable USB" is toggled to "OFF". If on EMM console the USB port is not disabled, this is a finding.
Fix: F-74006r1052955_fix
Configure Zebra Android 13 device to disable the USB port (except for charging the device). COPE and COBO: On the EMM console: 1. Open "Set user restrictions". 2. Toggle "Enable USB" to "OFF".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000370
- Version
- ZEBR-13-012300
- Vuln IDs
-
- V-270073
- Rule IDs
-
- SV-270073r1052959_rule
Checks: C-74106r1052957_chk
Review the device configuration to confirm the user is unable to remove DOD root and intermediate PKI certificates. On the EMM console: 1. Open "Set user restrictions". 2. Verify "Disallow config credentials" is toggled to "ON". On the Zebra Android 13 device: 1. Open Settings. 2. Tap "Security". 3. Tap "Advanced". 4. Tap "Encryption & credentials". 5. Tap "Trusted credentials". 6. Verify the user is unable to untrust or remove any work certificates. If the user is able to remove certificates on the Zebra Android 13 device, this is a finding.
Fix: F-74007r1052958_fix
Configure Zebra Android 13 device to prevent a user from removing DOD root and intermediate PKI certificates. On the EMM console: 1. Open "Set user restrictions". 2. Toggle "Disallow config credentials" to "ON".