UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Previously used passwords of the MDM server security container on the mobile device must be disallowed.


Overview

Finding ID Version Rule ID IA Controls Severity
V-24989 WIR-WMS-GD-009-02 SV-30822r2_rule ECWN-1 IAIA-1 Low
Description
Previously used passwords are more susceptible to being compromised by a hacker, which could lead to a possible compromise of the smartphone and sensitive DoD data stored on the smartphone.
STIG Date
Mobile Device Management (MDM) Server Security Technical Implementation Guide (STIG) 2013-01-17

Details

Check Text ( C-31242r8_chk )
This check is not applicable if CAC authentication is used for the security container. Password history is only required if the DAA deems it necessary due to the operational risk and mission need. If used, recommend the value be set at 3 or more.

1. Make a list of all iOS security policies listed on the MDM server that have been assigned to iOS devices and review each policy.
2. Select each security policy iOS devices are assigned to and, in turn, verify the required settings are in the policy. Verify the security policy for the security container password is set to disallow 3 or more previously used passwords.

Mark as a finding if “Disallow previously used passwords” is not set to 3 or more, if the setting is required by the DAA.

Note: If there is a finding, note the name of the policy in the Findings Details section in VMS/Component Provided Tracking Database.
Fix Text (F-27630r3_fix)
Set security policy for the security container password to disallow 3 or more previously used passwords, if DAA determines setting is required.