Information
Unapproved cryptographic algorithms cannot be relied upon to provide confidentiality or integrity, and DoD data could be compromised as a result. The Honeywell Android devices common vulnerabilities with cryptographic modules are those associated with poor implementation. FIPS 140-2 validation provides assurance that the relevant cryptography has been implemented correctly. FIPS 140-2 validation is also a strict requirement for use of cryptography in the Federal Government for protecting unclassified data.
SFR ID: FCS
NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.
Solution
Configure the Honeywell Android device to enable FIPS mode.
On the MDM console:
1. Ask the MDM Administrator to edit the following item in DeviceConfig.xml:
Modify item: DeviceConfig >> HoneywellSetting >> EnforceOSFipsMode
Value sample: 1: Enable OS FIPS mode; 0: Disable OS FIPS mode
2. In MDM console, the MDM Administrator will package this DeviceConfig.xml and push this package to the CN80G device.
On the Honeywell Android Pie device:
1. Open Settings >> Honeywell Settings >> FIPS Enforce Mode.
2. Enable FIPS Enforce mode.