STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Honeywell Android 9.x COPE Security Technical Implementation Guide

V-235073

CAT II (Medium)

The Honeywell Mobility Edge Android Pie device must be configured to disable developer modes.

Rule ID

SV-235073r626531_rule

STIG

Honeywell Android 9.x COPE Security Technical Implementation Guide

Version

V1R2

CCIs

CCI-000381

Discussion

Developer modes expose features of the Honeywell Android device that are not available during standard operation. An adversary may leverage a vulnerability inherent in a developer mode to compromise the confidentiality, integrity, and availability of DoD sensitive information. Disabling developer modes mitigates this risk. SFR ID: FMT_SMF_EXT.1.1 #26

Check Content

Review Honeywell Android device configuration settings to determine whether a developer mode is enabled.

This validation procedure is performed on both the MDM Administration console and the Android Pie device. 

On the MDM console:
1. Open Restrictions section.
2. Confirm that "Debugging Features" is set to "Disallow".

On the Honeywell Android Pie device:
1. Go to Settings >> System.
2. Ensure Developer Options is not listed.

If the MDM console device policy is not set to disable developer mode or on the Honeywell Android Pie device, the device policy is not set to disable developer mode, this is a finding.

Fix Text

Configure the Honeywell Android device to disable developer modes.

On the MDM console:
1. Open Restrictions section.
2. Set "Debugging Features" to "Disallow".