HONW-09-008400 - On all Honeywell Mobility Edge Android Pie devices, cryptography must be configured to be in FIPS 140-2 validated mode.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Unapproved cryptographic algorithms cannot be relied upon to provide confidentiality or integrity, and DoD data could be compromised as a result. The Honeywell Android devices common vulnerabilities with cryptographic modules are those associated with poor implementation. FIPS 140-2 validation provides assurance that the relevant cryptography has been implemented correctly. FIPS 140-2 validation is also a strict requirement for use of cryptography in the Federal Government for protecting unclassified data.

SFR ID: FCS

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Configure the Honeywell Android device to enable FIPS mode.

On the MDM console:
1. Ask the MDM Administrator to edit the following item in DeviceConfig.xml:
Modify item: DeviceConfig >> HoneywellSetting >> EnforceOSFipsMode
Value sample: 1: Enable OS FIPS mode; 0: Disable OS FIPS mode
2. In MDM console, the MDM Administrator will package this DeviceConfig.xml and push this package to the CN80G device.

On the Honeywell Android Pie device:
1. Open Settings >> Honeywell Settings >> FIPS Enforce Mode.
2. Enable FIPS Enforce mode.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_HW_Android_9-x_STIG.zip

Item Details

References: CAT|I, CCI|CCI-000366, Rule-ID|SV-235093r626530_rule, STIG-ID|HONW-09-008400, Vuln-ID|V-235093

Plugin: MDM

Control ID: f9859dfa7d0471835908e0d9000f9be4ee9c378db4b7ff14984669bcde500f7f