STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Honeywell Android 13 COPE Security Technical Implementation Guide

V-274382

CAT II (Medium)

Honeywell Android 13 must be configured to enforce an application installation policy by specifying one or more authorized application repositories, including [selection: DOD-approved commercial app repository, MDM server, mobile application store].

Rule ID

SV-274382r1100716_rule

STIG

Honeywell Android 13 COPE Security Technical Implementation Guide

Version

V1R1

CCIs

CCI-000366

Discussion

Forcing all applications to be installed from authorized application repositories can prevent unauthorized and malicious applications from being installed and executed on mobile devices. Allowing such installations and executions could cause a compromise of DOD data accessible by these unauthorized/malicious applications. SFR ID: FMT_SMF_EXT.1.1 #8a

Check Content

Review managed Honeywell Android 13 device configuration settings to determine if the mobile device has only approved application repositories (DOD-approved commercial app repository, EMM server, and/or mobile application store).

This validation procedure is performed on both the EMM Administration Console and the managed Honeywell Android 13 device. 

On the EMM console:

COBO and COPE:

1. Open "Set user restrictions".
2. Verify that "Disallow install unknown sources" is toggled to "ON".
3. Verify that "Disallow installs from unknown sources globally" is toggled to "ON".

On the Honeywell Android 13 device:

COBO and COPE:

1. Open Settings >> Apps >> Special app access.
2. Open "Install unknown apps".
3. Verify that the list of apps is blank or if an app is on the list, "Disabled by admin" is listed under the app name.

If the EMM console device policy is not set to allow connections to only approved application repositories, or on the managed Honeywell Android 13 device, the device policy is not set to allow connections to only approved application repositories, this is a finding.

Fix Text

Configure the Honeywell Android 13 device to disable unauthorized application repositories.

On the EMM console:

COBO and COPE:

1. Open "Set user restrictions".
2. Toggle "Disallow install unknown sources" to "ON".
3. Toggle "Disallow installs from unknown sources globally" to "ON".