STIGQter STIGQter: STIG Summary: Honeywell Android 9.x COPE Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 14 Jan 2021:

The Honeywell Mobility Edge Android Pie device whitelist must be configured to not include applications with the following characteristics: - back up MD data to non-DoD cloud servers (including user and application access to cloud backup services); - transmit MD diagnostic data to non-DoD servers; - voice assistant application if available when MD is locked; - voice dialing application if available when MD is locked; - allows synchronization of data or applications between devices associated with user; and - allows unencrypted (or encrypted but not FIPS 140-2 validated) data sharing with other MDs or printers.

DISA Rule

SV-235069r626527_rule

Vulnerability Number

V-235069

Group Title

PP-MDF-301100

Rule Version

HONW-09-001100

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the Honeywell Android device application whitelist to exclude applications with the following characteristics:

- back up MD data to non-DoD cloud servers (including user and application access to cloud backup services);
- transmit MD diagnostic data to non-DoD servers;
- voice assistant application if available when MD is locked;
- voice dialing application if available when MD is locked;
- allows synchronization of data or applications between devices associated with user;
- payment processing; and
- allows unencrypted (or encrypted but not FIPS 140-2 validated) data sharing with other MDs, display screens (screen mirroring), or printers.

On the MDM console:
1. Go to the Android app catalog for managed Honeywell Play.
2. Before selecting an app, review the app details and privacy policy to ensure the app does not include prohibited characteristics.

Check Contents

Review Honeywell Android device configuration settings to determine if the mobile device has an application whitelist configured and that the application whitelist does not include applications with the following characteristics:

- back up MD data to non-DoD cloud servers (including user and application access to cloud backup services);
- transmit MD diagnostic data to non-DoD servers;
- voice assistant application if available when MD is locked;
- voice dialing application if available when MD is locked;
- allows synchronization of data or applications between devices associated with user;
- payment processing; and
- allows unencrypted (or encrypted but not FIPS 140-2 validated) data sharing with other MDs, display screens (screen mirroring), or printers.

This validation procedure is performed only on the MDM Administration console.

On the MDM console:
1. Review the list of selected Managed Honeywell Play apps.
2. Review the details and privacy policy of each selected app to ensure the app does not include prohibited characteristics.

If the MDM console device policy includes applications with unauthorized characteristics, this is a finding.

Vulnerability Number

V-235069

Documentable

False

Rule Version

HONW-09-001100

Severity Override Guidance

Review Honeywell Android device configuration settings to determine if the mobile device has an application whitelist configured and that the application whitelist does not include applications with the following characteristics:

- back up MD data to non-DoD cloud servers (including user and application access to cloud backup services);
- transmit MD diagnostic data to non-DoD servers;
- voice assistant application if available when MD is locked;
- voice dialing application if available when MD is locked;
- allows synchronization of data or applications between devices associated with user;
- payment processing; and
- allows unencrypted (or encrypted but not FIPS 140-2 validated) data sharing with other MDs, display screens (screen mirroring), or printers.

This validation procedure is performed only on the MDM Administration console.

On the MDM console:
1. Review the list of selected Managed Honeywell Play apps.
2. Review the details and privacy policy of each selected app to ensure the app does not include prohibited characteristics.

If the MDM console device policy includes applications with unauthorized characteristics, this is a finding.

Check Content Reference

M

Target Key

5276

Comments