Skip to content

Zebra Android 13 COBO Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • Zebra Android 13 must be configured to enable audit logging.

    Audit logs enable monitoring of security-relevant events and subsequent forensics when breaches occur. To be useful, administrators must have the ability to view the audit logs. SFR ID: FMT_SMF_EX...
    Rule Medium Severity
  • Zebra Android 13 must be configured to enforce a minimum password length of six characters.

    Password strength is a measure of the effectiveness of a password in resisting guessing and brute force attacks. The ability to crack a password is a function of how many attempts an adversary is p...
    Rule Medium Severity
  • Zebra Android 13 must be configured to lock the display after 15 minutes (or less) of inactivity.

    The screen lock timeout must be set to a value that helps protect the device from unauthorized access. Having a too-long timeout would increase the window of opportunity for adversaries who gain ph...
    Rule Medium Severity
  • Zebra Android 13 must be configured to enforce an application installation policy by specifying an application allowlist that restricts applications by the following characteristics: [selection: list of digital signatures, cryptographic hash values, names, application version].

    The application allowlist, in addition to controlling the installation of applications on the MD, must control user access/execution of all core and preinstalled applications, or the MD must provid...
    Rule Medium Severity
  • Zebra Android 13 must be configured to disable developer modes.

    Developer modes expose features of the mobile operating system (MOS) that are not available during standard operation. An adversary may leverage a vulnerability inherent in a developer mode to comp...
    Rule Medium Severity
  • Zebra Android 13 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.

    Data on mobile devices is protected by numerous mechanisms, including user authentication, access control, and cryptography. When the data is backed up to an external system (either locally connect...
    Rule Medium Severity
  • Zebra Android 13 must be configured to enable authentication of personal hotspot connections to the device using a pre-shared key.

    If no authentication is required to establish personal hotspot connections, an adversary may be able to use that device to perform attacks on other devices or networks without detection. A sophisti...
    Rule Medium Severity
  • Zebra Android 13 must be configured to disable exceptions to the access control policy that prevent [selection: application processes, groups of application processes] from accessing [selection: all, private] data stored by other [selection: application processes, groups of application processes].

    App data sharing gives apps the ability to access the data of other apps for enhanced user functionality. However, sharing also poses a significant risk that unauthorized users or apps will obtain ...
    Rule Medium Severity
  • Zebra Android 13 users must complete required training.

    The security posture of Zebra devices requires the device user to configure several required policy rules on their device. User-Based Enforcement (UBE) is required for these controls. In addition, ...
    Rule Medium Severity
  • The Zebra Android 13 work profile must be configured to disable the autofill services.

    The autofill services allow the user to complete text inputs that could contain sensitive information, such as personally identifiable information (PII), without previous knowledge of the informati...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules