STIGQter STIGQter: STIG Summary: Honeywell Android 9.x COBO Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 14 Jan 2021:

The Honeywell Mobility Edge Android Pie must allow only the administrator (MDM) to install/remove DoD root and intermediate PKI certificates.

DISA Rule

SV-235056r626530_rule

Vulnerability Number

V-235056

Group Title

PP-MDF-992000

Rule Version

HONW-09-009100

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure Honeywell Mobility Edge Android Pie devices to prevent a user from removing DoD root and intermediate PKI certificates.

On the MDM console:
1. Open the User restrictions setting.
2. Set "Disallow config credentials" to "on" for the work profile.

Check Contents

Review the device configuration to confirm that the user is unable to remove DoD root and intermediate PKI certificates.

On the MDM console:
1. Open the User restrictions setting.
2. Verify that "Disallow config credentials" is set to "on" for the work profile.

On the Honeywell Android Pie device:
1. Open Settings.
2. Tap "Security & Location".
3. Tap on "Advanced".
4. Tap on "Encryption & credentials".
5. Tap on "Trusted credentials".
6. Verify that the user is unable to untrust or remove any work certificates.

If on the Honeywell Android Pie device the user is able to remove certificates, this is a finding.

Vulnerability Number

V-235056

Documentable

False

Rule Version

HONW-09-009100

Severity Override Guidance

Review the device configuration to confirm that the user is unable to remove DoD root and intermediate PKI certificates.

On the MDM console:
1. Open the User restrictions setting.
2. Verify that "Disallow config credentials" is set to "on" for the work profile.

On the Honeywell Android Pie device:
1. Open Settings.
2. Tap "Security & Location".
3. Tap on "Advanced".
4. Tap on "Encryption & credentials".
5. Tap on "Trusted credentials".
6. Verify that the user is unable to untrust or remove any work certificates.

If on the Honeywell Android Pie device the user is able to remove certificates, this is a finding.

Check Content Reference

M

Target Key

5275

Comments