NIAP: Compliant Product
  NIAP  »»  Product Compliant List  »»  Compliant Product  
Compliant Product - Motorola Lex L11

Certificate Date:  2020.01.23

Validation Report Number:  CCEVS-VR-VID11002-2020

Product Type:    Mobility

Conformance Claim:  Protection Profile Compliant

PP Identifier:    Protection Profile for Mobile Device Fundamentals Version 3.1
  Extended Package for Wireless LAN Client Version 1.0

CC Testing Lab:  Gossamer Security Solutions

CC Certificate [PDF] Security Target [PDF] Validation Report [PDF]

Assurance Activity [PDF]

Administrative Guide [PDF]

Product Description

The Target of Evaluation (TOE) is Motorola Lex L11. The TOE is a mobile device to support enterprises and individual users alike.  The Android 9.0 operating system includes a Linux 4.4.153 kernel. Additional libraries are provided to developers to help ensure secure application development and use for features such as Sensitive Data Protection.

The TOE provides a rich API to mobile applications whicht provides users installing an application the option to either approve or reject an application based upon the API access that the application requires (or to grant applications access at runtime).

Further, the TOE can interact with a Mobile Device Management system (not part of this evaluation) to allow enterprise control of the configuration and operation of the device so as to ensure adherence to enterprise-wide policies (for example, restricting use of a corporate provide device’s camera, forced configuration of maximum login attempts, pulling of audit logs off the TOE, etc.) as well as policies governing enterprise applications and data (in a an employee-owned device [BYOD] scenario).


Evaluated Configuration

The following modes and version are included in the evaluation:



OS version


 Build number

WFA Cert#

Motorola Lex L11


Android 9.0





Security Evaluation Summary

The evaluation was carried out in accordance to the Common Criteria Evaluation and Validation Scheme (CCEVS) requirements and guidance. The evaluation demonstrated that the TOE meets the security requirements contained in the Security Target.  The criteria against which the TOE was judged are described in the Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 5, April 2017. The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Evaluation Methodology, Version 3.1, Revision 5, April 2017.  The product, when delivered and configured as identified in the Administrator Guidance Instructions, Version 0.4, 01/08/2020, satisfies all of the security functional requirements stated in the Motorola Lex L11 (MDFPP31/WLANCEP10) Security Target, Version 0.6, 01/08/2020.  The project underwent CCEVS Validator review.  The evaluation was completed in January 2020.  Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report (report number CCEVS-VR-VID11002-2020) prepared by CCEVS.

Environmental Strengths

The logical boundaries of the Motorola Lex L11 are realized in the security functions that it implements. Each of these security functions is summarized below.

Vendor Information

Motorola Solutions, Inc.
Sam Novick
Site Map              Contact Us              Home