AirWatch - DISA Zebra Android 10 COPE v1r2

Audit Details

Name: AirWatch - DISA Zebra Android 10 COPE v1r2

Updated: 6/17/2024

Authority: DISA STIG

Plugin: MDM

Revision: 1.2

Estimated Item Count: 34

File Details

Filename: DISA_STIG_Zebra_Android_10_COPE_v1r2-AirWatch.audit

Size: 71.8 kB

MD5: 3dd2408ed02c5faf44f254c1343d8608
SHA256: a848f9452fc6ae05933dcb50534747ec84ce1707c3e7bcbdd0304eadc7e3d4d2

Audit Items

DescriptionCategories
ZEBR-10-000100 - Zebra Android 10 must be configured to enforce a minimum password length of six characters.

IDENTIFICATION AND AUTHENTICATION

ZEBR-10-000200 - Zebra Android 10 must be configured to not allow passwords that include more than two repeating or sequential characters - Characters

CONFIGURATION MANAGEMENT

ZEBR-10-000200 - Zebra Android 10 must be configured to not allow passwords that include more than two repeating or sequential characters - Numbers

CONFIGURATION MANAGEMENT

ZEBR-10-000300 - Zebra Android 10 must be configured to enable a screen-lock policy that will lock the display after a period of inactivity.

ACCESS CONTROL

ZEBR-10-000400 - Zebra Android 10 must be configured to lock the display after 15 minutes (or less) of inactivity.

ACCESS CONTROL

ZEBR-10-000500 - Zebra Android 10 must be configured to not allow more than 10 consecutive failed authentication attempts.

ACCESS CONTROL

ZEBR-10-000800 - Zebra Android 10 must be configured to enforce an application installation policy by specifying one or more authorized application repositories, including [selection: DoD-approved commercial app repository, MDM server, mobile application store] - Unknown Sources

CONFIGURATION MANAGEMENT

ZEBR-10-001000 - Zebra Android 10 must be configured to enforce an application installation policy by specifying an application whitelist that restricts applications by the following characteristics: [selection: list of digital signatures, cryptographic hash values, names, application version].

CONFIGURATION MANAGEMENT

ZEBR-10-001100 - Zebra Android 10 whitelist must be configured to not include applications with the following characteristics:

CONFIGURATION MANAGEMENT

ZEBR-10-001400 - Zebra Android 10 must be configured to disable Bluetooth or configured via User Based Enforcement (UBE) to allow Bluetooth for only Headset Profile (HSP), HandsFree Profile (HFP), and Serial Port Profile (SPP) - Serial Port Profile capable devices.

CONFIGURATION MANAGEMENT

ZEBR-10-001600 - Zebra Android 10 must be configured to not display the following (work profile) notifications when the device is locked:

CONFIGURATION MANAGEMENT

ZEBR-10-002300 - Zebra Android 10 must be configured to disable trust agents - NA for specific biometric authentication factors included in the products Common Criteria evaluation.

CONFIGURATION MANAGEMENT

ZEBR-10-002800 - Zebra Android 10 must be configured to disable developer modes.

CONFIGURATION MANAGEMENT

ZEBR-10-003400 - Zebra Android 10 must be configured to display the DoD advisory warning message at startup or each time the user unlocks the device.

ACCESS CONTROL

ZEBR-10-003500 - Zebra Android 10 must be configured to disable USB mass storage mode.

CONFIGURATION MANAGEMENT

ZEBR-10-003700 - Zebra Android 10 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.

ACCESS CONTROL

ZEBR-10-003900 - Zebra Android 10 must be configured to not allow backup of all applications and configuration data to remote systems.

ACCESS CONTROL

ZEBR-10-004500 - Zebra Android 10 must be configured to disable exceptions to the access control policy that prevents application processes from accessing all data stored by other application processes.

ACCESS CONTROL, CONFIGURATION MANAGEMENT

ZEBR-10-004700 - Zebra Android 10 must be configured to disable multi-user modes.

ACCESS CONTROL, CONFIGURATION MANAGEMENT

ZEBR-10-005505 - Zebra Android 10 must be configured to enable audit logging.

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

ZEBR-10-006100 - Zebra Android 10 must be configured to generate audit records for the following auditable events: detected integrity violations.

AUDIT AND ACCOUNTABILITY

ZEBR-10-008700 - Zebra Android 10 users must complete required training.

CONFIGURATION MANAGEMENT

ZEBR-10-008800 - Zebra Android 10 must be configured to enforce that Wi-Fi Sharing is disabled.

CONFIGURATION MANAGEMENT

ZEBR-10-009000 - Zebra Android 10 must have the DoD root and intermediate PKI certificates installed.

CONFIGURATION MANAGEMENT

ZEBR-10-009100 - Zebra Android 10 must allow only the administrator (MDM) to install/remove DoD root and intermediate PKI certificates - MDM to install/remove DoD root and intermediate PKI certificates.

CONFIGURATION MANAGEMENT

ZEBR-10-009200 - The Zebra Android 10 Work Profile must be configured to prevent users from adding personal email accounts to the work email app.

CONFIGURATION MANAGEMENT

ZEBR-10-009400 - The Zebra Android 10 Work Profile must be configured to enforce the system application disable list.

CONFIGURATION MANAGEMENT

ZEBR-10-009600 - Zebra Android 10 must be provisioned as a fully managed device and configured to create a Work Profile.

CONFIGURATION MANAGEMENT

ZEBR-10-009800 - Zebra Android 10 Work Profile must be configured to disable automatic completion of work space internet browser text input.

CONFIGURATION MANAGEMENT

ZEBR-10-010000 - Zebra Android 10 Work Profile must be configured to disable the autofill services.

CONFIGURATION MANAGEMENT

ZEBR-10-010200 - Zebra Android 10 must be configured to disallow configuration of date and time.

CONFIGURATION MANAGEMENT

ZEBR-10-010800 - Zebra Android 10 devices must have the latest available Zebra Android 10 operating system installed.

CONFIGURATION MANAGEMENT

ZEBR-10-011000 - Zebra Android 10 devices must be configured to disable the use of third-party keyboards.

CONFIGURATION MANAGEMENT

ZEBR-10-999999 - All Zebra Android 10 installations must be removed.

CONFIGURATION MANAGEMENT