V-259759 | High | The mobile device used for BYOAD must be NIAP validated. | Note: For a virtual mobile infrastructure (VMI) solution, both the client and server components must be NIAP compliant.
Nonapproved mobile devices may not include sufficient controls to protect... |
V-259751 | High | The BYOAD and DOD enterprise must be configured to limit access to only enterprise IT resources approved by the authorizing official (AO). | Note: IT resources includes DOD networks and applications (for example, DOD email).
The system administrator must have the capability to limit access of the BYOAD to DOD networks and DOD IT... |
V-259755 | High | The EMM system supporting the iOS/iPadOS 17 BYOAD must be NIAP validated (included on the NIAP list of compliant products or products in evaluation) unless the DOD CIO has granted an approved Exception to Policy (E2P). | Note: For a virtual mobile infrastructure (VMI) solution, both the client and server components must be NIAP compliant.
Nonapproved EMM systems may not include sufficient controls to protect work... |
V-259742 | Medium | The EMM system supporting the iOS/iPadOS 17 BYOAD must be configured for autonomous monitoring, compliance, and validation to ensure security/configuration settings of mobile devices do not deviate from the approved configuration baseline. | DOD policy requires BYOAD devices with DOD data be managed by a DOD MDM server, MAM server, or VMI system. This ensures the device can be monitored for compliance with the approved security... |
V-259743 | Medium | The EMM system supporting the iOS/iPadOS 17 BYOAD must be configured to initiate autonomous monitoring, compliance, and validation prior to granting the BYOAD access to DOD information and IT resources. | DOD policy requires BYOAD devices with DOD data be managed by a DOD MDM server, MAM server, or VMI system. This ensures the device can be monitored for compliance with the approved security... |
V-259744 | Medium | The EMM system supporting the iOS/iPadOS 17 BYOAD must be configured to detect if the BYOAD native security controls are disabled. | Examples of indicators that the device native security controls have been disabled include jailbroken or rooted devices.
DOD policy requires BYOAD devices with DOD data be managed by a DOD MDM... |
V-259745 | Medium | The EMM system supporting the iOS/iPadOS 17 BYOAD must be configured to detect if known malicious, blocked, or prohibited applications are installed on the BYOAD (DOD-managed segment only). | DOD policy requires BYOAD devices with DOD data be managed by a DOD MDM server, MAM server, or VMI system. This ensures the device can be monitored for compliance with the approved security... |
V-259746 | Medium | The EMM system supporting the iOS/iPadOS 17 BYOAD must be configured to detect if the BYOAD is configured to access nonapproved third-party applications stores (DOD-managed segment only). | DOD policy requires BYOAD devices with DOD data be managed by a DOD MDM server, MAM server, or VMI system. This ensures the device can be monitored for compliance with the approved security... |
V-259747 | Medium | The EMM detection/monitoring system must use continuous monitoring of enrolled iOS/iPadOS 17 BYOAD. | DOD policy requires BYOAD devices with DOD data be managed by a DOD MDM server, MAM server, or VMI system. This ensures the device can be monitored for compliance with the approved security... |
V-259748 | Medium | The iOS/iPadOS 17 BYOAD must be configured to either disable access to DOD data, IT systems, and user accounts or wipe managed data and apps if the EMM system detects native security controls are disabled. | Examples of indicators that the native device security controls have been disabled include jailbroken or rooted devices.
When a BYOAD is out of compliance, DOD data and apps must be removed to... |
V-259749 | Medium | The iOS/iPadOS 17 BYOAD must be configured to either disable access to DOD data, IT systems, and user accounts or wipe managed data and apps if the EMM system detects the BYOAD device has known malicious, blocked, or prohibited applications or is configured to access nonapproved managed third-party applications stores. | When a BYOAD is out of compliance, DOD data and apps must be removed to protect against compromise of sensitive DOD information.
Reference: DOD policy "Use of Non-Government Mobile Devices".... |
V-259754 | Medium | The iOS/iPadOS 17 BYOAD must be deployed in Device Enrollment mode or User Enrollment mode. | DOD policy requires BYOAD devices with DOD data be managed by a DOD MDM server, MAM server, or VMI system. This ensures the device can be monitored for compliance with the approved security... |
V-259750 | Medium | The iOS/iPadOS 17 BYOAD must be configured so that managed data and apps are removed if the device is no longer receiving security or software updates. | When a BYOAD is out of compliance, DOD data and apps must be removed to protect against compromise of sensitive DOD information.
Reference: DOD policy "Use of Non-Government Mobile Devices".... |
V-259757 | Medium | The DOD Mobile Service Provider must not allow BYOADs in facilities where personally owned mobile devices are prohibited. | DOD policy requires BYOAD devices with DOD data be managed by a DOD MDM server, MAM server, or VMI system. This ensures the device can be monitored for compliance with the approved security... |
V-259758 | Medium | The iOS/iPadOS 17 BYOAD must be configured to disable device cameras and/or microphones when brought into DOD facilities where mobile phone cameras and/or microphones are prohibited. | In some DOD operational environments, the use of the mobile device camera or microphone could lead to a security incident or compromise of DOD information. The system administrator must have the... |
V-259753 | Low | The EMM system supporting the iOS/iPadOS 17 BYOAD must be configured to only wipe managed data and apps and not unmanaged data and apps when the user's access is revoked or terminated, the user no longer has the need to access DOD data or IT, or the user reports a registered device as lost, stolen, or showing indicators of compromise. | DOD policy requires the protection and privacy of personal data and activities to the maximum extent possible on BYOADs.
Reference: DOD policy "Use of Non-Government Mobile Devices".... |
V-259752 | Low | The iOS/iPadOS 17 BYOAD must be configured to protect users' privacy, personal information, and applications. | A key construct of a BYOAD is that user personal information and data are protected from exposure to the enterprise.
Reference: DOD policy "Use of Non-Government Mobile Devices". 3.b.(4),... |
V-259756 | Low | The User Agreement must include a description of what personal data and information is being monitored, collected, or managed by the EMM system or deployed agents or tools. | DOD policy states BYOAD owners must sign a user agreement and be made aware of what personal data and activities will be monitored by the enterprise by including this information in the user... |