Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-27635 | WIR-MOS-iOS-G-008 | SV-35228r2_rule | ECCR-1 ECWN-1 | Medium |
Description |
---|
Sensitive DoD data could be compromised if mobile OS device data could not be wiped when directed by the system administrator. |
STIG | Date |
---|---|
Apple iOS 6 Interim Security Configuration Guide (ISCG) | 2013-01-17 |
Check Text ( C-35072r5_chk ) |
---|
1. Make a list of all iOS security policies listed on the MDM server that have been assigned to iOS devices and review each policy. 2. Select each security policy iOS devices are assigned to, and in turn, verify the required settings are in the policy. Verify the MDM has a setting that will wipe all data and non-core applications when a wipe commend is sent to managed mobile devices. Mark as a finding if the required rule is not set up on the MDM server. Note: If there is a finding, note the name of the policy in the Findings Details section in VMS/Component Provided Tracking Database. If the Good Technology MDM server is used, complete the following: -Verify "Enable remote full device wipe" is checked. |
Fix Text (F-30358r2_fix) |
---|
Enable remote full device wipe on iOS devices. |