STIGQter STIGQter: STIG Summary: Motorola Android 9.x COPE Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 14 Oct 2020:

The Motorola Android Pie must be configured to disable developer modes.

DISA Rule

SV-230088r569708_rule

Vulnerability Number

V-230088

Group Title

GOOG-09-002800

Rule Version

MOTO-09-002800

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the Motorola Android device to disable developer modes.

On the MDM console:
1. Open Restrictions section.
2. Set "Debugging Features" to "Disallow".

Check Contents

Review Motorola Android device configuration settings to determine whether a developer mode is enabled.

This validation procedure is performed on both the MDM Administration Console and the Android Pie device.

On the MDM console:
1. Open Restrictions section.
2. Verify "Debugging Features" is set to "Disallow".

On the Android Pie device:
1. Go to Settings >> System.
2. Verify "Developer Options" is not listed.

If the MDM console device policy is not set to disable developer mode, or on the Android Pie device, the device policy is not set to disable developer mode, this is a finding.

Vulnerability Number

V-230088

Documentable

False

Rule Version

MOTO-09-002800

Severity Override Guidance

Review Motorola Android device configuration settings to determine whether a developer mode is enabled.

This validation procedure is performed on both the MDM Administration Console and the Android Pie device.

On the MDM console:
1. Open Restrictions section.
2. Verify "Debugging Features" is set to "Disallow".

On the Android Pie device:
1. Go to Settings >> System.
2. Verify "Developer Options" is not listed.

If the MDM console device policy is not set to disable developer mode, or on the Android Pie device, the device policy is not set to disable developer mode, this is a finding.

Check Content Reference

M

Target Key

4230

Comments