HONW-13-009600 - All mobile Honeywell cryptography must be configured to be in FIPS 140-3 validated mode.

Information

Unapproved cryptographic algorithms cannot be relied on to provide confidentiality or integrity, and DOD data could be compromised as a result. The most common vulnerabilities with cryptographic modules are those associated with poor implementation. FIPS 140-3 validation provides assurance that the relevant cryptography has been implemented correctly. FIPS 140-3 validation is also a strict requirement for use of cryptography in the federal government for protecting unclassified data.

SFR ID: FCS

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

On the MDM console (for SDM660 only):

1. Ask the MDM administrator to edit the following item in DeviceConfig.xml:
Modify item: DeviceConfig >> HoneywellSetting >> EnforceOSFipsMode
Value sample: 1: Enable OS FIPS mode; 0: Disable OS FIPS mode.
2. In the MDM console, the MDM administrator will package this DeviceConfig.xml and push this package to the CN80G device.

On the Honeywell Android 13 device (SDM660 only):

1. Open Settings >> Honeywell Settings >> FIPS Enforce Mode.
2. Enable 'FIPS Enforce Mode'

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_HW_Android_13_Y25M04_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-13, CAT|I, CCI|CCI-002450, Rule-ID|SV-274411r1100864_rule, STIG-ID|HONW-13-009600, Vuln-ID|V-274411

Plugin: MDM

Control ID: 964142f9ee6b78b128b46be8626ce5702257e53b104dfcbf5334a6b366239f34