UCF STIG Viewer Logo

Apple iOS must not allow backup to remote systems (managed applications data stored in iCloud)).


Overview

Finding ID Version Rule ID IA Controls Severity
V-61929 AIOS-02-080103 SV-76419r1_rule Medium
Description
Storing data with a non-DoD cloud provider may leave the data vulnerable to breach. Disabling non-DoD cloud services mitigates this risk. SFR ID: FMT_SMF_EXT.1.1 #45
STIG Date
Apple iOS 9 Interim Security Configuration Guide 2015-12-07

Details

Check Text ( C-62811r1_chk )
Review configuration settings to confirm “Allow managed apps to store data in iCloud” is disabled.

This check procedure is performed on both the Apple iOS management tool and the Apple iOS device.

Note: If an organization has multiple configuration profiles, then the check procedure must be performed on the relevant configuration profiles applicable to the scope of the review.

In the Apple iOS management tool, verify "Allow managed apps to store data in iCloud" is unchecked.

Alternatively, verify the text "allowManagedAppsCloudSync " appears in the configuration profile (.mobileconfig file).

On the Apple iOS device:
1. Open the Settings app.
2. Tap "General".
3. Tap "Profiles" or "Profiles & Device Management" or "Device Management".
4. Tap the Configuration Profile from the Apple iOS management tool containing the restrictions policy.
5. Tap "Restrictions".
6. Verify "Managed apps cloud sync not allowed" is listed.

If "Allow managed apps to store data in iCloud" is checked in the Apple iOS management tool, "allowManagedAppsCloudSync " appears in the configuration profile, or the restrictions policy on the Apple iOS device from the Apple iOS management tool does not list "Managed apps cloud sync not allowed", this is a finding.
Fix Text (F-67847r1_fix)
Install a Configuration Profile to prevent DoD applications from storing data in iCloud.