UCF STIG Viewer Logo

Apple iOS 11 Security Technical Implementation Guide


Overview

Date Finding Count (43)
2017-12-14 CAT I (High): 2 CAT II (Med): 29 CAT III (Low): 12
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Available Profiles



Findings (MAC I - Mission Critical Classified)

Finding ID Severity Title
V-78403 High Apple iOS must require a valid password be successfully entered before the mobile device data is unencrypted.
V-78421 High Apple iOS device must have the latest available iOS operating system installed.
V-78391 Medium Apple iOS must not allow backup to remote systems (My Photo Stream).
V-78393 Medium Apple iOS must not allow backup to remote systems (iCloud Photo Sharing, also known as Shared Photo Streams).
V-78395 Medium Apple iOS must not allow backup to remote systems (managed applications data stored in iCloud).
V-78425 Medium Apple iOS must implement the management setting: not allow messages in an ActiveSync Exchange account to be forwarded or moved to other accounts in the Apple iOS Mail app.
V-78397 Medium Apple iOS must not allow non-DoD applications to access DoD data.
V-78379 Medium Apple iOS must be configured to disable authentication mechanisms providing user access to protected data other than a Password Authentication Factor, including [selection: Face ID).
V-78373 Medium Apple iOS must not display notifications when the device is locked.
V-78423 Medium Apple iOS must implement the management setting: use SSL for Exchange ActiveSync.
V-78371 Medium Apple iOS must not include applications with the following characteristics: Voice dialing application if available when MD is locked.
V-78377 Medium Apple iOS must be configured to disable authentication mechanisms providing user access to protected data other than a Password Authentication Factor, including [selection: Touch ID).
V-78375 Medium Apple iOS must not display notifications (calendar information) when the device is locked.
V-78419 Medium Apple iOS must implement the management setting: Disable Allow iCloud Photo Library.
V-78387 Medium Apple iOS must not allow backup to remote systems (iCloud document and data synchronization).
V-78385 Medium Apple iOS must not allow backup to remote systems (iCloud).
V-78383 Medium Apple iOS must not allow backup of managed app data to locally connected systems.
V-78389 Medium Apple iOS must not allow backup to remote systems (iCloud Keychain).
V-78437 Medium Apple iOS users must complete required training.
V-78431 Medium Apple iOS must implement the management setting: not share location data through iCloud.
V-78433 Medium Apple iOS must implement the management setting: not allow a user to remove Apple iOS configuration profiles that enforce DoD security requirements.
V-78417 Medium Apple iOS must implement the management setting: Disable Allow MailDrop.
V-78369 Medium Apple iOS must not include applications with the following characteristics: Siri when the device is locked.
V-78427 Medium Apple iOS must implement the management setting: Treat Airdrop as an unmanaged destination.
V-78363 Medium Apple iOS must lock the display after 15 minutes (or less) of inactivity.
V-78367 Medium Apple iOS must be configured to enforce an application installation policy by specifying one or more authorized application repositories, including [selection: Apple App Store].
V-78409 Medium Apple iOS must implement the management setting: Encrypt iTunes backups.
V-78439 Medium If an unmanaged third-party VPN client is installed on the iOS device, it must not be configured with a DoD network (work) VPN profile.
V-78401 Medium Apple iOS must implement the management setting: remove managed applications upon unenrollment from MDM (including sensitive and protected data).
V-78441 Medium A managed photo app must be used to take and store work related photos.
V-78443 Medium Apple iOS must not allow backup to remote systems (managed applications data stored in iCloud).
V-78355 Low Apple iOS must enforce a minimum password length of six characters.
V-78399 Low Apple iOS must disable automatic transfer of diagnostic data to an external device other than an MDM service with which the device has enrolled.
V-78405 Low Apple iOS must implement the management setting: limit Ad Tracking.
V-78407 Low Apple iOS must implement the management setting: not allow automatic completion of Safari browser passcodes.
V-78381 Low Apple iOS must be configured to display the DoD advisory warning message at start-up or each time the user unlocks the device.
V-78435 Low Apple iOS must implement the management setting: force Apple Watch wrist detection.
V-78415 Low Apple iOS must implement the management setting: require the user to enter a password when connecting to an AirPlay-enabled device for the first time.
V-78413 Low Apple iOS must implement the management setting: not allow use of Handoff.
V-78411 Low Apple iOS must not allow backup to remote systems (enterprise books).
V-78429 Low Apple iOS must implement the management setting: not have any Family Members in Family Sharing.
V-78361 Low Apple iOS must not allow passwords that include more than two repeating or sequential characters.
V-78365 Low Apple iOS must not allow more than 10 consecutive failed authentication attempts.