Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-81763 | AIOS-12-000800 | SV-96477r1_rule | Low |
Description |
---|
Access to the DoD network must be limited for unmanaged apps because they are considered untrusted. SFR ID: FMT_SMF_EXT.1.1 #3 |
STIG | Date |
---|---|
Apple iOS 12 Security Technical Implementation Guide | 2018-11-28 |
Check Text ( C-81543r1_chk ) |
---|
Review the list of unmanaged apps installed on the iOS device and determine if any third-party VPN clients are installed. If yes, verify the VPN app is not configured with a DoD network (work) VPN profile. This validation procedure is performed on the iOS device only. On the iOS device, do the following: 1. Under Settings, VPN look to see if any "Personal VPN" exists. 2. If no, requirement has been met. 3. If yes, open each VPN app in turn. Review the list of VPN profiles configured on the VPN client. 4. Verify there are no DoD network VPN profiles configured on the VPN client. If any third-party unmanaged VPN apps are installed (personal VPN) and has a DoD network VPN profile configured on the client, this is a finding. Note: This setting cannot be managed by the MDM administrator and is a User Based Enforcement (UBE) requirement. |
Fix Text (F-88611r1_fix) |
---|
If a third-party unmanaged VPN app is installed on the iOS 12 device, do not configure the VPN app with a DoD network VPN profile. |