Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-250981 | AIOS-15-014600 | SV-250981r802034_rule | Medium |
Description |
---|
If a user is able to configure the security setting, the user could inadvertently or maliciously set it to a value that poses unacceptable risk to DoD information systems. An adversary could exploit vulnerabilities created by the weaker configuration to compromise DoD sensitive information. Translation information could contain sensitive DoD information and therefore should not leave the DoD control. SFR ID: FMT_SMF_EXT.1.1 #47 |
STIG | Date |
---|---|
Apple iOS/iPadOS 15 Security Technical Implementation Guide | 2022-06-07 |
Check Text ( C-54416r802032_chk ) |
---|
This a supervised-only control. If the iPhone or iPad being reviewed is not supervised by the MDM, this control is automatically a finding. If the iPhone or iPad being reviewed is supervised by the MDM, review configuration settings to confirm "Require managed pasteboard" is set to "True". This check procedure is performed on the device management tool. Note: If an organization has multiple configuration profiles, the check procedure must be performed on the relevant configuration profiles applicable to the scope of the review. In the iOS management tool, verify "Require managed pasteboard" is set to "True". If "Require managed pasteboard" is not set to "True", this is a finding. |
Fix Text (F-54370r802045_fix) |
---|
Configure the Apple iOS configuration profile to disable copy/paste of data from managed to unmanaged applications. The procedure for implementing this control will vary depending on the MDM/EMM used by the mobile service provider. In the MDM console, set "Require managed pasteboard" to "True". |