Back
This checklist converts the Google Android 16 STIG (Y25M08) into a practical set of configuration and compliance tasks for IT, security, and device management teams. It’s intended for organizations deploying corporate-owned Android 16 devices (COPE/COBO) that must meet DoD security requirements.
Progress
0 / 18
- Enroll devices via zero-touch enrollment — Use zero-touch for bulk COPE/COBO provisioning to ensure managed state from first boot.
- Configure Android Enterprise work profile for COPE devices — Use the native work profile (NIAP-certified) for data separation on COPE devices.
- Enforce device encryption — Require file- or full-disk encryption for all corporate devices to protect stored data.
- Set strong screen lock policies — Require authenticated unlock and reasonable auto-lock timeout.
- Require minimum PIN/password complexity — Set minimum PIN length and complexity per organizational policy.
- Configure biometric and fallback rules — Control biometric use and require fallback authentication where appropriate.
- Enable automatic OS and security updates — Allow automatic installs or enforce timely patching via MDM.
- Disable installation from unknown sources — Block sideloading and require apps from managed Play or approved stores.
- Disable developer options and USB debugging — Prevent user-enabled debugging to reduce attack surface.
- Enable Play Protect and app scanning — Turn on Google Play Protect or equivalent runtime app scanning.
- Restrict app installation to managed or approved apps — Allow unmanaged app installs only with Authorizing Official (AO) approval.
- Implement MDM enrollment and apply configuration profiles — Use an enterprise MDM to enforce STIG profiles, restrictions, and reporting.
- Configure approved Wi‑Fi and verify network compliance — Allow only approved Wi‑Fi; ensure network infrastructure meets STIG requirements.
- Disable Bluetooth auto-pairing and restrict connections — Limit wireless pairing to approved peripherals only.
- Enforce data separation using a NIAP-certified solution — Implement work profile or another NIAP-certified tech for work/personal separation.
- Configure logging, reporting, and periodic compliance scans — Enable device logging and schedule automated compliance checks and reports.
- Test compliance and generate STIG reports — Run scans, validate settings against the STIG, and export a compliance report.
- Document AO approvals, exceptions, and configuration baselines — Maintain records of AO approvals and any accepted deviations from STIG controls.
Your Stats
🏆
0
Completed
📅
—
Last Done
⏱️
—
Last Time
Completion Rate
Items checked per run
⚡
—
Fastest Run
🔥
0
Streak
🚫
—
Most Skipped Step
🔄
0
Resets
📝 My Notes