STIGhubSTIGhub
STIGsSearchCompareAbout

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to STIGs

Honeywell Android 9.x COBO Security Technical Implementation Guide

Version

V1R2

Release Date

Dec 1, 2023

SCAP Benchmark ID

HW_Android_9-x_COBO_STIG

Total Checks

29

Tags

mobile
CAT I: 3CAT II: 22CAT III: 4

This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Export CKLExport CSVExport JSONDownload STIG ZIP

Checks (29)

V-235035MEDIUMThe Honeywell Mobility Edge Android Pie device must be configured to enforce a minimum password length of six characters.V-235036MEDIUMThe Honeywell Mobility Edge Android Pie device must be configured to not allow passwords that include more than two repeating or sequential characters.V-235037MEDIUMThe Honeywell Mobility Edge Android Pie device must be configured to enable a screen-lock policy that will lock the display after a period of inactivity.V-235038MEDIUMThe Honeywell Mobility Edge Android Pie device must be configured to lock the display after 15 minutes (or less) of inactivity.V-235039LOWThe Honeywell Mobility Edge Android Pie device must be configured to not allow more than 10 consecutive failed authentication attempts.V-235040MEDIUMThe Honeywell Mobility Edge Android Pie device must be configured to enforce an application installation policy by specifying one or more authorized application repositories, including [selection: DoD-approved commercial app repository, MDM server, mobile application store].V-235041MEDIUMThe Honeywell Mobility Edge Android Pie device must be configured to enforce an application installation policy by specifying an application whitelist that restricts applications by the following characteristics: [selection: list of digital signatures, cryptographic hash values, names, application version].V-235042MEDIUMThe Honeywell Mobility Edge Android Pie device whitelist must be configured to not include applications with the following characteristics: - back up MD data to non-DoD cloud servers (including user and application access to cloud backup services); - transmit MD diagnostic data to non-DoD servers; - voice assistant application if available when MD is locked; - voice dialing application if available when MD is locked; - allows synchronization of data or applications between devices associated with user; and - allows unencrypted (or encrypted but not FIPS 140-2 validated) data sharing with other MDs or printers.V-235043LOWThe Honeywell Mobility Edge Android Pie device must be configured to disable Bluetooth or configured via User Based Enforcement (UBE) to allow Bluetooth for only HSP (Headset Profile), HFP (HandsFree Profile), or SPP (Serial Port Profile) capable devices.V-235044MEDIUMThe Honeywell Mobility Edge Android Pie device must be configured to disable trust agents. NOTE: This requirement is not applicable (NA) for specific biometric authentication factors included in the product's Common Criteria evaluation.V-235045MEDIUMThe Honeywell Mobility Edge Android Pie device must be configured to disable developer modes.V-235046LOWThe Honeywell Mobility Edge Android Pie device must be configured to display the DoD advisory warning message at start-up or each time the user unlocks the device.V-235047MEDIUMThe Honeywell Mobility Edge Android Pie device must be configured to disable USB mass storage mode.V-235048MEDIUMThe Honeywell Mobility Edge Android Pie device must be configured to not allow backup of [all applications, configuration data] to locally connected systems.V-235049MEDIUMThe Honeywell Mobility Edge Android Pie device must be configured to not allow backup of all applications and configuration data to remote systems.V-235050MEDIUMThe Honeywell Mobility Edge Android Pie device must be configured to disable multi-user modes.V-235051MEDIUMThe Honeywell Mobility Edge Android Pie device must be configured to enable audit logging.V-235052LOWThe Honeywell Mobility Edge Android Pie device must be configured to generate audit records for the following auditable events: detected integrity violations.V-235053MEDIUMThe Honeywell Android Pie must wipe all data upon unenrollment from MDM.V-235054MEDIUMHoneywell Mobility Edge Android Pie devices users must complete required training.V-235055MEDIUMHoneywell Mobility Edge Android Pie devices must have the DoD root and intermediate PKI certificates installed.V-235056MEDIUMThe Honeywell Mobility Edge Android Pie must allow only the administrator (MDM) to install/remove DoD root and intermediate PKI certificates.V-235057MEDIUMHoneywell Mobility Edge Android Pie devices work profile must be configured to disable automatic completion of workspace internet browser text input.V-235058MEDIUMHoneywell Mobility Edge Android Pie devices Work Profile must be configured to disable the autofill services.V-235059MEDIUMHoneywell Mobility Edge Android Pie devices must be configured to disallow configuration of date and time.V-235060MEDIUMHoneywell Mobility Edge Android Pie devices must configured to disallow outgoing beam.V-235061HIGHHoneywell Mobility Edge Android Pie devices must have a NIAP validated Honeywell Mobility Edge Android Pie devices operating system installed.V-235093HIGHOn all Honeywell Mobility Edge Android Pie devices, cryptography must be configured to be in FIPS 140-2 validated mode.V-259207HIGHAll Honeywell Android 9 installations must be removed.