UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Apple iOS 11 Security Technical Implementation Guide


Overview

Date Finding Count (42)
2018-09-19 CAT I (High): 3 CAT II (Med): 27 CAT III (Low): 12
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Available Profiles



Findings (MAC III - Administrative Sensitive)

Finding ID Severity Title
V-78403 High Apple iOS must require a valid password be successfully entered before the mobile device data is unencrypted.
V-78421 High Apple iOS device must have the latest available iOS operating system installed.
V-81067 High Only authorized versions of the Apple iOS must be used.
V-78391 Medium Apple iOS must not allow backup to remote systems (My Photo Stream).
V-78393 Medium Apple iOS must not allow backup to remote systems (iCloud Photo Sharing, also known as Shared Photo Streams).
V-78395 Medium Apple iOS must not allow backup to remote systems (managed applications data stored in iCloud).
V-78425 Medium Apple iOS must implement the management setting: not allow messages in an ActiveSync Exchange account to be forwarded or moved to other accounts in the Apple iOS Mail app.
V-78397 Medium Apple iOS must not allow non-DoD applications to access DoD data.
V-78373 Medium Apple iOS must not display notifications when the device is locked.
V-78423 Medium Apple iOS must implement the management setting: use SSL for Exchange ActiveSync.
V-78371 Medium Apple iOS must not include applications with the following characteristics: Voice dialing application if available when MD is locked.
V-78375 Medium Apple iOS must not display notifications (calendar information) when the device is locked.
V-78419 Medium Apple iOS must implement the management setting: Disable Allow iCloud Photo Library.
V-78387 Medium Apple iOS must not allow backup to remote systems (iCloud document and data synchronization).
V-78385 Medium Apple iOS must not allow backup to remote systems (iCloud).
V-78383 Medium Apple iOS must not allow backup of managed app data to locally connected systems.
V-78389 Medium Apple iOS must not allow backup to remote systems (iCloud Keychain).
V-78437 Medium Apple iOS users must complete required training.
V-78431 Medium Apple iOS must implement the management setting: not share location data through iCloud.
V-78433 Medium Apple iOS must implement the management setting: not allow a user to remove Apple iOS configuration profiles that enforce DoD security requirements.
V-78417 Medium Apple iOS must implement the management setting: Disable Allow MailDrop.
V-78369 Medium Apple iOS must not include applications with the following characteristics: Siri when the device is locked.
V-78427 Medium Apple iOS must implement the management setting: Treat Airdrop as an unmanaged destination.
V-78363 Medium Apple iOS must lock the display after 15 minutes (or less) of inactivity.
V-78367 Medium Apple iOS must be configured to enforce an application installation policy by specifying one or more authorized application repositories, including [selection: Apple App Store].
V-78409 Medium Apple iOS must implement the management setting: Encrypt iTunes backups.
V-78439 Medium If an unmanaged third-party VPN client is installed on the iOS device, it must not be configured with a DoD network (work) VPN profile.
V-78401 Medium Apple iOS must implement the management setting: remove managed applications upon unenrollment from MDM (including sensitive and protected data).
V-78441 Medium A managed photo app must be used to take and store work related photos.
V-78443 Medium Apple iOS must not allow backup to remote systems (managed applications data stored in iCloud).
V-78355 Low Apple iOS must enforce a minimum password length of six characters.
V-78399 Low Apple iOS must disable automatic transfer of diagnostic data to an external device other than an MDM service with which the device has enrolled.
V-78405 Low Apple iOS must implement the management setting: limit Ad Tracking.
V-78407 Low Apple iOS must implement the management setting: not allow automatic completion of Safari browser passcodes.
V-78381 Low Apple iOS must be configured to display the DoD advisory warning message at start-up or each time the user unlocks the device.
V-78435 Low Apple iOS must implement the management setting: force Apple Watch wrist detection.
V-78415 Low Apple iOS must implement the management setting: require the user to enter a password when connecting to an AirPlay-enabled device for the first time.
V-78413 Low Apple iOS must implement the management setting: not allow use of Handoff.
V-78411 Low Apple iOS must not allow backup to remote systems (enterprise books).
V-78429 Low Apple iOS must implement the management setting: not have any Family Members in Family Sharing.
V-78361 Low Apple iOS must not allow passwords that include more than two repeating or sequential characters.
V-78365 Low Apple iOS must not allow more than 10 consecutive failed authentication attempts.