UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Apple iOS/iPadOS 17 MDFPP 3.3 BYOAD Security Technical Implementation Guide


Overview

Date Finding Count (35)
2024-01-31 CAT I (High): 3 CAT II (Med): 24 CAT III (Low): 8
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Available Profiles



Findings (MAC III - Administrative Sensitive)

Finding ID Severity Title
V-259768 High Apple iOS/iPadOS 17 must be configured to enforce a passcode reuse prohibition of at least two generations.
V-259782 High iPhone and iPad must have the latest available iOS/iPadOS operating system installed.
V-259778 High Apple iOS/iPadOS 17 must require a valid password be successfully entered before the mobile device data is unencrypted.
V-259766 Medium Apple iOS/iPadOS 17 must be configured to lock the display after 15 minutes (or less) of inactivity.
V-259767 Medium Apple iOS/iPadOS 17 must be configured to not allow more than 10 consecutive failed authentication attempts.
V-259764 Medium Apple iOS/iPadOS 17 must be configured to not allow passwords that include more than four repeating or sequential characters.
V-259765 Medium Apple iOS/iPadOS 17 must be configured to enable a screen-lock policy that will lock the display after a period of inactivity.
V-259762 Medium Apple iOS/iPadOS 17 must not allow backup to remote systems (enterprise books).
V-259763 Medium Apple iOS/iPadOS 17 must be configured to enforce a minimum password length of six characters.
V-259761 Medium Apple iOS/iPadOS 17 must not allow backup to remote systems (managed applications data stored in iCloud).
V-259769 Medium Apple iOS/iPadOS 17 must be configured to enforce an application installation policy by specifying one or more authorized application repositories, including [selection: DOD-approved commercial app repository, MDM server, mobile application store].
V-259784 Medium Apple iOS/iPadOS 17 must implement the management setting: not allow messages in an ActiveSync Exchange account to be forwarded or moved to other accounts in the Apple iOS/iPadOS 17 Mail app.
V-259785 Medium Apple iOS/iPadOS 17 must implement the management setting: Treat AirDrop as an unmanaged destination.
V-259787 Medium Apple iOS/iPadOS 17 users must complete required training.
V-259783 Medium Apple iOS/iPadOS 17 must implement the management setting: use SSL for Exchange ActiveSync.
V-259788 Medium A managed photo app must be used to take and store work-related photos.
V-259779 Medium Apple iOS/iPadOS 17 must implement the management setting: Encrypt backups/Encrypt local backup.
V-259771 Medium Apple iOS/iPadOS 17 must be configured to not display notifications when the device is locked.
V-259770 Medium Apple iOS/iPadOS 17 allow list must be configured to not include applications with the following characteristics: - backs up MD data to non-DOD cloud servers (including user and application access to cloud backup services); - transmits MD diagnostic data to non-DOD servers; - allows synchronization of data or applications between devices associated with user; and - allows unencrypted (or encrypted but not FIPS 140-2/FIPS 140-3 validated) data sharing with other MDs or printers.
V-259772 Medium Apple iOS/iPadOS 17 must not display notifications (calendar information) when the device is locked.
V-259775 Medium Apple iOS/iPadOS 17 must not allow non-DOD applications to access DOD data.
V-259774 Medium Apple iOS/iPadOS 17 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.
V-259777 Medium Apple iOS/iPadOS 17 must be configured to [selection: remove Enterprise applications, remove all noncore applications (any nonfactory installed application)] upon unenrollment from MDM.
V-259776 Medium Apple iOS/iPadOS 17 must be configured to [selection: wipe protected data, wipe sensitive data] upon unenrollment from MDM.
V-259794 Medium Apple iOS/iPadOS 17 must not allow DOD applications to access non-DOD data.
V-259793 Medium Apple iOS/iPadOS 17 must have DOD root and intermediate PKI certificates installed.
V-259792 Medium Apple iOS/iPadOS 17 must disable copy/paste of data from managed to unmanaged applications.
V-259760 Low Apple iOS/iPadOS 17 must allow the administrator (MDM) to perform the following management function: enable/disable VPN protection across the device.
V-259786 Low Apple iOS/iPadOS 17 must implement the management setting: force Apple Watch wrist detection.
V-259780 Low Apple iOS/iPadOS 17 must implement the management setting: require the user to enter a password when connecting to an AirPlay-enabled device.
V-259781 Low Apple iOS/iPadOS 17 must implement the management setting: require passcode for incoming Airplay connection requests.
V-259789 Low Apple iOS/iPadOS 17 must not allow managed apps to write contacts to unmanaged contacts accounts.
V-259773 Low Apple iOS/iPadOS 17 must be configured to display the DOD advisory warning message at startup or each time the user unlocks the device.
V-259791 Low The Apple iOS must be configured to disable automatic transfer of diagnostic data to an external device other than an MDM service with which the device has enrolled.
V-259790 Low Apple iOS/iPadOS 17 must not allow unmanaged apps to read contacts from managed contacts accounts.