STIGQter STIGQter: STIG Summary: Motorola Android 9.x COPE Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 14 Oct 2020:

Motorola Android Pie users must complete required training.

DISA Rule

SV-230097r569708_rule

Vulnerability Number

V-230097

Group Title

GOOG-09-008700

Rule Version

MOTO-09-008700

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Have all Motorola device users complete training on the following topics. Users should acknowledge that they have reviewed training via a signed User Agreement or similar written record.

Training topics:

- Operational security concerns introduced by unmanaged applications/unmanaged personal space, including applications using global positioning system (GPS) tracking.
- Need to ensure no DoD data is saved to the personal space or transmitted from a personal app (for example, from personal email).
- If the Purebred key management app is used, users are responsible for maintaining positive control of their credentialed device at all times. The DoD PKI certificate policy requires subscribers to maintain positive control of the devices that contain private keys and to report any loss of control so the credentials can be revoked. Upon device retirement, turn-in, or reassignment, ensure that a factory data reset is performed prior to device handoff. Follow mobility service provider decommissioning procedures as applicable.
- How to configure the following UBE controls (users must configure the control) on the Motorola device:
**Secure use of Calendar Alarm.
**Local screen mirroring and Mirroring procedures (authorized/not authorized for use).
**Do not upload DoD contacts via smart call and caller ID services.
**Do not remove DoD intermediate and root PKI digital certificates.
**Disable Wi-Fi Sharing.
**Do not configure a DoD network (work) VPN profile on any third-party VPN client installed in the personal space.
**If Bluetooth connections are approved for mobile device, types of allowed connections (for example car hands free but not Bluetooth wireless keyboard).
- AO guidance on acceptable use and restrictions, if any, on downloading and installing personal apps and data (music, photos, etc.) in the Motorola device personal space.

Motorola provides an Administrative Guide for the LEX L11 device to NIAP customers (refer to https://www.niap-ccevs.org/MMO/Product/st_vid11002-agd.pdf). The guide includes procedures for configuring Common Criteria on the Motorola Solutions, Inc. LEX L11 device.

Check Contents

Review a sample of site User Agreements for Motorola device users or similar training records and training course content.

Verify that Motorola device users have completed the required training. The intent is that required training is renewed on a periodic basis in a time period determined by the AO.

If any Motorola device user has not completed the required training, this is a finding.

Vulnerability Number

V-230097

Documentable

False

Rule Version

MOTO-09-008700

Severity Override Guidance

Review a sample of site User Agreements for Motorola device users or similar training records and training course content.

Verify that Motorola device users have completed the required training. The intent is that required training is renewed on a periodic basis in a time period determined by the AO.

If any Motorola device user has not completed the required training, this is a finding.

Check Content Reference

M

Target Key

4230

Comments