UCF STIG Viewer Logo

Apple iOS 12 Security Technical Implementation Guide


Overview

Date Finding Count (42)
2018-11-28 CAT I (High): 2 CAT II (Med): 26 CAT III (Low): 14
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Available Profiles



Findings (MAC I - Mission Critical Sensitive)

Finding ID Severity Title
V-81807 High Apple iOS must require a valid password be successfully entered before the mobile device data is unencrypted.
V-81823 High Apple iOS device must have the latest available iOS operating system installed.
V-81813 Medium Apple iOS must implement the management setting: Encrypt iTunes backups.
V-81819 Medium Apple iOS must implement the management setting: Disable Allow MailDrop.
V-81795 Medium Apple iOS must not allow non-DoD applications to access DoD data.
V-81789 Medium Apple iOS must not allow backup to remote systems (iCloud Photo Sharing, also known as Shared Photo Streams).
V-81783 Medium Apple iOS must not allow backup to remote systems (iCloud Keychain).
V-81833 Medium Apple iOS must implement the management setting: not share location data through iCloud.
V-81837 Medium Apple iOS users must complete required training.
V-81777 Medium Apple iOS must not allow backup of managed app data to locally connected systems.
V-81781 Medium Apple iOS must not allow backup to remote systems (iCloud document and data synchronization).
V-81791 Medium Apple iOS must not allow backup to remote systems (managed applications data stored in iCloud).
V-81787 Medium Apple iOS must not allow backup to remote systems (My Photo Stream).
V-81765 Medium Apple iOS must be configured to enforce an application installation policy by specifying one or more authorized application repositories, including [selection: Apple App Store].
V-81767 Medium Apple iOS must not include applications with the following characteristics: Siri when the device is locked.
V-81769 Medium Apple iOS must not include applications with the following characteristics: Voice dialing application if available when MD is locked.
V-81771 Medium Apple iOS must not display notifications when the device is locked.
V-81841 Medium Apple iOS must implement the management setting: enable USB Restricted Mode.
V-81759 Medium Apple iOS must be configured to lock the display after 15 minutes (or less) of inactivity.
V-81829 Medium Apple iOS must implement the management setting: Treat Airdrop as an unmanaged destination.
V-81799 Medium Apple iOS must implement the management setting: remove managed applications upon unenrollment from MDM (including sensitive and protected data).
V-81821 Medium Apple iOS must implement the management setting: Disable Allow Shared Albums.
V-81827 Medium Apple iOS must implement the management setting: not allow messages in an ActiveSync Exchange account to be forwarded or moved to other accounts in the Apple iOS Mail app.
V-81825 Medium Apple iOS must implement the management setting: use SSL for Exchange ActiveSync.
V-81839 Medium A managed photo app must be used to take and store work related photos.
V-81793 Medium Apple iOS must not allow backup to remote systems (enterprise books).
V-81773 Medium Apple iOS must not display notifications (calendar information) when the device is locked.
V-81779 Medium Apple iOS must not allow backup to remote systems (iCloud).
V-81811 Low Apple iOS must implement the management setting: not allow automatic completion of Safari browser passcodes.
V-81817 Low Apple iOS must implement the management setting: require the user to enter a password when connecting to an AirPlay-enabled device for the first time.
V-81815 Low Apple iOS must implement the management setting: not allow use of Handoff.
V-81931 Low Apple iOS must not allow managed apps to write contacts to unmanaged contacts accounts.
V-81933 Low Apple iOS must not allow unmanaged apps to read contacts from managed contacts accounts.
V-81831 Low Apple iOS must implement the management setting: not have any Family Members in Family Sharing.
V-81835 Low Apple iOS must implement the management setting: force Apple Watch wrist detection.
V-81761 Low Apple iOS must be configured to not allow more than 10 consecutive failed authentication attempts.
V-81763 Low If an unmanaged third-party VPN client is installed on the iOS device, it must not be configured with a DoD network (work) VPN profile.
V-81755 Low Apple iOS must be configured to enforce a minimum password length of six characters.
V-81809 Low Apple iOS must implement the management setting: limit Ad Tracking.
V-81775 Low Apple iOS must be configured to display the DoD advisory warning message at start-up or each time the user unlocks the device.
V-81757 Low Apple iOS must be configured to not allow passwords that include more than two repeating or sequential characters.
V-81797 Low Apple iOS must be configured to disable automatic transfer of diagnostic data to an external device other than an MDM service with which the device has enrolled.