STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Motorola Solutions Android 13 COPE Security Technical Implementation Guide

V-272350

CAT II (Medium)

Motorola Solutions Android 13 users must complete required training.

Rule ID

SV-272350r1093479_rule

STIG

Motorola Solutions Android 13 COPE Security Technical Implementation Guide

Version

V1R1

CCIs

CCI-000366

Discussion

The security posture of Motorola Solutions devices requires the device user to configure several required policy rules on their device. User-Based Enforcement (UBE) is required for these controls. In addition, if the authorizing official (AO) has approved the use of an unmanaged personal space, the user must receive training on risks. If a user is not aware of their responsibilities and does not comply with UBE requirements, the security posture of the Motorola Solutions mobile device may become compromised and DOD sensitive data may become compromised. SFR ID: NA

Check Content

Review a sample of site User Agreements for Motorola Solutions Android 13 device users or similar training records and training course content. 
 
Verify that the Motorola Solutions Android 13 device users have completed the required training. The intent is that required training is renewed on a periodic basis in a time period determined by the AO. 
 
If any Motorola Solutions Android 13 device user has not completed the required training, this is a finding.

Fix Text

All Motorola Solutions Android 13 device users must complete training on the following training topics (users must acknowledge that they have reviewed training via a signed User Agreement or similar written record): 
- Operational security concerns introduced by unmanaged applications/unmanaged personal space, including applications using global positioning system (GPS) tracking.
- Need to ensure no DOD data is saved to the personal space or transmitted from a personal app (for example, from personal email). 
- If the Purebred key management app is used, users are responsible for maintaining positive control of their credentialed device at all times. The DOD PKI certificate policy requires subscribers to maintain positive control of the devices that contain private keys and to report any loss of control so the credentials can be revoked. Upon device retirement, turn-in, or reassignment, ensure that a factory data reset is performed prior to device hand-off. Follow mobility service provider decommissioning procedures as applicable.

- How to configure the following UBE controls (users must configure the control) on the Motorola Solutions device: 
**Secure use of Calendar Alarm.
**Local screen mirroring and mirroring procedures (authorized/not authorized for use). 
**Do not upload DOD contacts via smart call and caller ID services.
**Do not configure a DOD network (work) VPN profile on any third-party VPN client installed in the personal space. 
**If Bluetooth connections are approved for mobile device, types of allowed connections (for example car hands-free, but not Bluetooth wireless keyboard).
**How to perform a full device wipe.
**Use default Wi-Fi hotspot password: 15-character complex Wi-Fi hotspot preshared password enabled ("WPA2/WPA3-personal")

- AO guidance on acceptable use and restrictions, if any, on downloading and installing personal apps and data (music, photos, etc.) in the Motorola Solutions device personal space.