STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to STIGs

Zebra Android 11 COBO Security Technical Implementation Guide

Version

V1R4

Release Date

Dec 1, 2025

SCAP Benchmark ID

Zebra_Android_11_COBO_STIG

Total Checks

32

Tags

mobile
CAT I: 2CAT II: 23CAT III: 7

This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Export CKLExport CSVExport JSONDownload STIG ZIP

Checks (32)

V-252850MEDIUMZebra Android 11 must be configured to enforce a minimum password length of six characters.V-252851MEDIUMZebra Android 11 must be configured to not allow passwords that include more than four repeating or sequential characters.V-252852MEDIUMZebra Android 11 must be configured to enable a screen-lock policy that will lock the display after a period of inactivity.V-252853MEDIUMZebra Android 11 must be configured to lock the display after 15 minutes (or less) of inactivity.V-252854LOWZebra Android 11 must be configured to not allow more than 10 consecutive failed authentication attempts.V-252855MEDIUMZebra Android 11 must be configured to enforce an application installation policy by specifying one or more authorized application repositories, including [selection: DoD-approved commercial app repository, EMM server, mobile application store].V-252856MEDIUMZebra Android 11 must be configured to enforce an application installation policy by specifying an application allow list that restricts applications by the following characteristics: [selection: list of digital signatures, cryptographic hash values, names, application version].V-252857MEDIUMZebra Android 11 allow list must be configured to not include applications with the following characteristics: - back up MD data to non-DoD cloud servers (including user and application access to cloud backup services); - transmit MD diagnostic data to non-DoD servers; - voice assistant application if available when MD is locked; - voice dialing application if available when MD is locked; - allows synchronization of data or applications between devices associated with user; and - allows unencrypted (or encrypted but not FIPS 140-2 validated) data sharing with other MDs or printers.V-252858LOWZebra Android 11 must be configured to disable Bluetooth or configured via User Based Enforcement (UBE) to allow Bluetooth for only Headset Profile (HSP), HandsFree Profile (HFP), and Serial Port Profile (SPP).V-252859MEDIUMZebra Android 11 must be configured to not display the following (work profile) notifications when the device is locked: [selection: - email notifications - calendar appointments - contact associated with phone call notification - text message notification - other application-based notifications - all notifications].V-252860MEDIUMZebra Android 11 must be configured to disable trust agents.V-252861MEDIUMZebra Android 11 must be configured to disable developer modes.V-252862LOWZebra Android 11 must be configured to display the DoD advisory warning message at start-up or each time the user unlocks the device.V-252863MEDIUMZebra Android 11 must be configured to disable USB mass storage mode.V-252864MEDIUMZebra Android 11 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.V-252865MEDIUMZebra Android 11 must be configured to not allow backup of all applications and configuration data to remote systems.V-252866MEDIUMZebra Android 11 must be configured to disable multi-user modes.V-252867LOWZebra Android 11 must allow only the Administrator (EMM) to perform the following management function: Enable/disable location services.V-252868MEDIUMZebra Android 11 must be configured to enable audit logging.V-252869LOWZebra Android 11 must be configured to generate audit records for the following auditable events: Detected integrity violations.V-252870MEDIUMZebra Android 11 users must complete required training.V-252871MEDIUMZebra Android 11 must be configured to enforce that Wi-Fi Sharing is disabled.V-252872MEDIUMZebra Android 11 must have the DoD root and intermediate PKI certificates installed.V-252873MEDIUMZebra Android 11 must allow only the administrator (EMM) to install/remove DoD root and intermediate PKI certificates.V-252874MEDIUMZebra Android 11 work profile must be configured to enforce the system application disable list.V-252875MEDIUMZebra Android 11 work profile must be configured to disable automatic completion of work space internet browser text input.V-252876MEDIUMZebra Android 11 Work Profile must be configured to disable the autofill services.V-252877MEDIUMZebra Android 11 must be configured to disallow configuration of date and time.V-252878HIGHZebra Android 11 devices must have the latest available Zebra Android 11 operating system installed.V-252879LOWZebra Android 11 devices must be configured to disable the use of third-party keyboards.V-252880LOWZebra Android 11 devices must be configured to enable Common Criteria Mode (CC Mode).V-279907HIGHAll Zebra Android 11 installations must be removed.