UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Apple iOS must remove managed applications upon unenrollment from MDM.


Overview

Finding ID Version Rule ID IA Controls Severity
V-54305 AIOS-10-080102 SV-68551r1_rule Medium
Description
When a device is unenrolled from MDM, it is possible to relax the security policies that the MDM had implemented on the device. This may cause apps and data to be more vulnerable than they were prior to enrollment. Removing managed apps (and consequently the data they maintain) upon unenrollment mitigates this risk because on appropriately configured iOS devices, DoD-sensitive information exists only within managed apps. SFR ID: FMT_SMF_EXT.1
STIG Date
Apple iOS 8 Interim Security Configuration Guide 2014-09-16

Details

Check Text ( C-54941r3_chk )
Note: Not all iOS deployments involve MDM. If the site uses an authorized alternative to MDM for distribution of Configuration Profiles, this check procedure is not applicable.

This check procedure is performed on the iOS management tool.

In the iOS management tool, for each managed app, verify the app is configured to be removed when the MDM profile is removed.

If one or more managed apps are not set to be removed upon device MDM unenrollment, this is a finding.
Fix Text (F-59159r1_fix)
Configure the MDM to delete all managed apps upon device unenrollment.