UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Apple iOS must wipe protected or sensitive data upon unenrollment from MDM.


Overview

Finding ID Version Rule ID IA Controls Severity
V-61959 AIOS-11-080202 SV-76449r1_rule Medium
Description
When a mobile device is no longer going to be managed by MDM technologies, its protected/sensitive data must be sanitized because it will no longer be protected by the MDM software, so it is at much greater risk of unauthorized access and disclosure. SFR ID: FMT_SMF_EXT.2.1
STIG Date
Apple iOS 9 Interim Security Configuration Guide 2015-12-07

Details

Check Text ( C-62841r1_chk )
Note: The procedure below is exactly the same for requirement AIOS-10-080102. This procedure needs to be performed only once.

Note: Not all Apple iOS deployments involve MDM. If the site uses an authorized alternative to MDM for distribution of Configuration Profiles, this check procedure is not applicable.

This check procedure is performed on the Apple iOS management tool.

In the Apple iOS management tool, for each managed app, verify the app is configured to be removed when the MDM profile is removed.

If one or more managed apps are not set to be removed upon device MDM unenrollment, this is a finding.
Fix Text (F-67877r1_fix)
Install a Configuration Profile to delete all managed apps upon device unenrollment.