Apple iOS6 Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
- RMF Control
- Severity
- M
- CCI
- Version
- WIR-MOS-iOS-034-01
- Vuln IDs
-
- V-18627
- Rule IDs
-
- SV-40265r3_rule
Checks: C-39120r5_chk
This check is not applicable if the installed VPN client is not used for remote access to DoD networks. Note: Use of a VPN to access DoD email on a mobile device is not required. Interview the IAO and/or site wireless device administrator and inspect a sample (3-4) of site devices. Review VPN client specification sheets and FIPS 140-2 certificate. Verify the VPN client leverages FIPS 140-2 validated cryptographic modules. It may accomplish this either by using its own FIPS 140-2 validated cryptographic module or the FIPS 140-2 validated Apple iOS CoreCrypto Kernel Module. Only VPN client applications that Apple has granted the VPN entitlement have the capability to leverage this module. Verify the VPN client has the Apple iOS VPN entitlement or check that it has its own FIPS 140-2 certificate. If the VPN client does not leverage FIPS 140-2 validated cryptography, this is a finding.
Fix: F-37266r2_fix
Install a VPN client that uses FIPS 140-2 validated cryptographic modules to protect data in transit.
- RMF Control
- Severity
- M
- CCI
- Version
- WIR-MOS-iOS-034-02
- Vuln IDs
-
- V-19897
- Rule IDs
-
- SV-36449r2_rule
Checks: C-35553r3_chk
This check is not applicable if the installed VPN client is not used for remote access to DoD networks. Note: Use of a VPN to access DoD email on a mobile device is not required. Interview the IAO and/or site wireless device administrator and inspect a sample (3-4) of site devices. Review VPN client specification sheets and the configuration of the VPN client. Verify the VPN client supports AES encryption. Verify the VPN client is configured to required AES. Mark as a finding if the VPN does not support AES or is not configured to require AES.
Fix: F-37263r1_fix
Install an AES Encrypted VPN client.
- RMF Control
- Severity
- M
- CCI
- Version
- WIR-MOS-iOS-034-03
- Vuln IDs
-
- V-19898
- Rule IDs
-
- SV-36450r2_rule
Checks: C-35554r4_chk
This check is not applicable if the installed VPN client is not used for remote access to DoD networks. Note: Use of a VPN to access DoD email on a mobile device is not required. Interview the IAO and/or site wireless device administrator and inspect a sample (3-4) of site devices. Review VPN client specification sheets and verify the VPN client support CAC authentication. Mark as a finding if the VPN does not support CAC authentication or the client is not configured to require CAC authentication.
Fix: F-37265r4_fix
Install a VPN client that supports CAC authentication and configure the client to require CAC authentication.
- RMF Control
- Severity
- M
- CCI
- Version
- WIR-MOS-iOS-034-04
- Vuln IDs
-
- V-19899
- Rule IDs
-
- SV-36451r2_rule
Checks: C-41594r2_chk
This check is not applicable if the installed VPN client is not used for remote access to DoD networks. Note: Use of a VPN to access DoD email on a mobile device is not required. Interview the IAO and/or site wireless device administrator and inspect a sample (3-4) of site devices. Review VPN client specification sheets and verify the VPN client supports disabling split tunneling. Verify the VPN client is configured disable split tunneling. Mark as a finding if the VPN does not support disabling split tunneling or it is not disabled on the client.
Fix: F-37267r1_fix
Disable split tunneling on VPN client.
- RMF Control
- Severity
- L
- CCI
- Version
- WIR-MOS-iOS-002
- Vuln IDs
-
- V-24982
- Rule IDs
-
- SV-30781r3_rule
Checks: C-31197r6_chk
Detailed Policy Requirements: If a Bluetooth smart card reader is used, only the following models and firmware versions should be used: SCR: Biometric Associates, LP (BAL) baiMobile BAL-3000MP Bluetooth Smart Card Reader. Firmware version v2.01.00 or later should be used (version v2.02.00 is recommended). Bluetooth adapter: Biometric Associates, LP (BAL) baiMobile BAL-BTA001 Bluetooth Adapter. Firmware version 1.4.0 or later should be used (version 1.4.4 is recommended). Check Procedures: SCR: The version of the reader firmware is displayed when the user presses and holds the Action button on the reader for a couple of seconds after the CAC is inserted into the reader. Bluetooth adapter: Model and firmware are printed on the label attached to the adapter. For wired smart card readers, check to see if the vendor has completed JITC PKI interoperability testing. Ask to see a copy of the JITC certification. The firmware version should be the same as listed in the JITC certification (or later version). Mark as a finding if the firmware version on the SCR and adapter are not the approved versions.
Fix: F-27623r1_fix
Install required SCR software version.
- RMF Control
- Severity
- M
- CCI
- Version
- WIR-MOS-iOS-003
- Vuln IDs
-
- V-24983
- Rule IDs
-
- SV-30782r3_rule
Checks: C-31198r9_chk
Launch the mobile email client and verify S/MIME is installed in the client. The exact procedures will depend on which mobile email product is being used. Mark as a finding if the mobile email client does not have S/MIME configured. If the mobile email client does not have S/MIME configuration settings that can be viewed on the device, try to send a signed encrypted message to a known recipient and verify the recipient can decrypt and verify the digital signature. Mark as a finding if you are unable to send a signed and encrypted message or if the recipient is unable to decrypt and verify the digital signature. If the Good Technology client is used: •Log into the iOS device. •Open the Good application. •Go to Preferences. •Verify Smartcard and S/MIME specific settings are listed.
Fix: F-27624r5_fix
Provision the mobile email client with S/MIME so users can digitally sign and encrypt email.
- RMF Control
- Severity
- L
- CCI
- Version
- WIR-MOS-iOS-004
- Vuln IDs
-
- V-24984
- Rule IDs
-
- SV-30783r2_rule
Checks: C-31199r6_chk
Launch the mobile email client and verify that if the email auto signature feature is used, it is compliant with the requirement. The exact procedures will depend on which mobile email product is being used. Mark as a finding if not compliant. If the Good Technology client is used: •Log into the iOS device. •Open the Good application. •Go to Preferences > Signature.
Fix: F-27625r4_fix
Configure the iOS email auto-signature message, so it does not disclose the email originated from the iOS device (e.g., Sent From My Wireless Handheld).
- RMF Control
- Severity
- L
- CCI
- Version
- WIR-MOS-iOS-005
- Vuln IDs
-
- V-24985
- Rule IDs
-
- SV-30784r3_rule
Checks: C-31201r7_chk
There are two acceptable implementations for this requirement: 1. The device uses a mobile VPN to route all data traffic to the DoD enclave, which forces all browser traffic to the DoD Internet gateway. Note: This method is only acceptable if the VPN client is configured so that all data downloaded to the mobile device is saved in a FIPS 140-2 validated encrypted container; otherwise, the data at rest requirements in check V-32707/WIR-MOS-iOS-65-09 are not met. 2. The device browser is installed inside an iOS security container and the security container provides the capability to route all browser traffic to the MDM or authorized proxy server where it will be routed to the DoD Internet gateway. Using a browser without a mobile VPN and installed outside the iOS device security container is not an approved implementation. Verify one of the approved browser implementations is used. Talk to the IAO and review 3-4 sample devices. Mark as a finding if a required browser implementation is not used.
Fix: F-27626r3_fix
Use a compliant browser implementation on the iOS device.
- RMF Control
- Severity
- M
- CCI
- Version
- WIR-MOS-iOS-030-01
- Vuln IDs
-
- V-25003
- Rule IDs
-
- SV-34937r3_rule
Checks: C-31332r6_chk
1. Make a list of all iOS security policies listed on the MDM server that have been assigned to iOS devices and review each policy. 2. Select each security policy iOS devices are assigned to, and in turn, verify the required settings are in the policy. Verify a compliance rule has been set up defining iOS 6 or later as approved versions. Mark as a finding if the required compliance rule is not set up on the MDM server. Note: If there is a finding, note the name of the policy in the Findings Details section in VMS/Component Provided Tracking Database. If the Good Technology MDM server is used, complete the following: -Launch the MDM console and click on the Policies tab. -Select the iOS security policy. -Verify a compliance rule has been set up defining iOS 6 or later versions. -Launch the Good Mobile Control Web console and click on the Policies tab. -Select a policy set to review and click on the policy. -On the left tab, select Compliance Manager. -Verify “OS Version Verification” rule is listed. (Note that the rule title does not have to be exact.) -Open the rule by checking the box next to the rule and then click on Edit. -Verify the following are set. Platform: iPhone Check to Run: OS Version Verification Conditions: 6.0 or later Failure Action: “Quit Good for Enterprise” Check Every: “6 hours” Check: “Permit newer (previously unknown) OS versions”
Fix: F-27651r3_fix
Install the required OS version.
- RMF Control
- Severity
- M
- CCI
- Version
- WIR-MOS-iOS-G-010
- Vuln IDs
-
- V-25007
- Rule IDs
-
- SV-30789r2_rule
Checks: C-31207r5_chk
1. Make a list of all iOS security policies listed on the MDM server that have been assigned to iOS devices and review each policy. 2. Select each security policy iOS devices are assigned to, and in turn, verify the required settings are in the policy. Verify “Require passcode” is checked. Mark as a finding if the required rule is not set up on the MDM server. Note: If there is a finding, note the name of the policy in the Findings Details section in VMS/Component Provided Tracking Database.
Fix: F-27657r3_fix
Configure the MDM server to require a passcode for device unlock.
- RMF Control
- Severity
- L
- CCI
- Version
- WIR-MOS-iOS-G-012-01
- Vuln IDs
-
- V-25008
- Rule IDs
-
- SV-30790r3_rule
Checks: C-31208r5_chk
1. Make a list of all iOS security policies listed on the MDM server that have been assigned to iOS devices and review each policy. 2. Select each security policy iOS devices are assigned to and, in turn, verify the required settings are in the policy. Verify “Allow simple value” is not checked. If the required rule is not set up on the MDM server, this is a finding. Note: If there is a finding, note the name of the policy in the Findings Details section in VMS/Component Provided Tracking Database.
Fix: F-27658r4_fix
Disable (uncheck) "Allow simple value" in the iOS policy on the MDM server.
- RMF Control
- Severity
- L
- CCI
- Version
- WIR-MOS-iOS-G-013
- Vuln IDs
-
- V-25009
- Rule IDs
-
- SV-30792r2_rule
Checks: C-31210r6_chk
Password expiration is only required if the DAA deems it necessary due to the operational risk and mission need. It is most appropriate when, for whatever reason, the iOS device is outside of the user’s possession and readily accessible to others on a regular or periodic basis. If used, the recommended value is 120 days or less. If used, verify the setting has been set correctly using the following procedure: 1. Make a list of all iOS security policies listed on the MDM server that have been assigned to iOS devices and review each policy. 2. Select each security policy iOS devices are assigned to, and in turn, verify the required settings are in the policy. Verify "Maximum passcode age" is checked and set to 120 days or less in the iOS security policy. Mark as a finding if the required rule is not set up on the MDM server, if the DAA requires this setting. Note: If there is a finding, note the name of the policy in the Findings Details section in VMS/Component Provided Tracking Database.
Fix: F-27659r4_fix
Set maximum passcode age to 120 days or less if the DAA requires this setting.
- RMF Control
- Severity
- M
- CCI
- Version
- WIR-MOS-iOS-G-016
- Vuln IDs
-
- V-25010
- Rule IDs
-
- SV-30795r3_rule
Checks: C-31213r7_chk
1. Make a list of all iOS security policies listed on the MDM server that have been assigned to iOS devices and review each policy. 2. Select each security policy iOS devices are assigned to and, in turn, verify the required settings are in the policy. Verify that "Grace period" is checked and the sum of the "Auto-Lock" and "Grace period" values is 15 minutes or less. Acceptable combinations include a 15-minute "Auto-Lock" and an "Immediate" (or null) "Grace period", or a 5-minute "Auto-Lock" and a 5-minute "Grace period". On some MDM systems, the "Grace period" may be called "Passcode Lock" or a similar label. If the required rule is not set up on the MDM server, this is a finding. Note: If there is a finding, note the name of the policy in the Findings Details section in VMS/Component Provided Tracking Database.
Fix: F-27661r4_fix
Enforce the CMD inactivity timeout requirement of 15 minutes or less through a combination of "Auto-Lock" and "Grace period" values that do not sum to greater than 15 minutes.
- RMF Control
- Severity
- M
- CCI
- Version
- WIR-MOS-iOS-G-017
- Vuln IDs
-
- V-25011
- Rule IDs
-
- SV-30796r2_rule
Checks: C-31214r5_chk
1. Make a list of all iOS security policies listed on the MDM server that have been assigned to iOS devices and review each policy. 2. Select each security policy iOS devices are assigned to, and in turn, verify the required settings are in the policy. Verify “Maximum failed attempts” is checked and set to 10 or less. Mark as a finding if the required rule is not set up on the MDM server. Note: If there is a finding, note the name of the policy in the Findings Details section in VMS/Component Provided Tracking Database.
Fix: F-27662r2_fix
Set password/passcode maximum failed attempts to 10 or less.
- RMF Control
- Severity
- M
- CCI
- Version
- WIR-MOS-iOS-G-019
- Vuln IDs
-
- V-25012
- Rule IDs
-
- SV-30797r3_rule
Checks: C-31215r6_chk
1. Make a list of all iOS security policies listed on the MDM server that have been assigned to iOS devices and review each policy. 2. Select each security policy iOS devices are assigned to, and in turn, verify the required settings are in the policy. Verify “Allow use of iTunes Music Store” is unchecked. Mark as a finding if the required rule is not set up on the MDM server. Note: If there is a finding, note the name of the policy in the Findings Details section in VMS/Component Provided Tracking Database.
Fix: F-27663r2_fix
Disable access to public media stores.
- RMF Control
- Severity
- M
- CCI
- Version
- WIR-MOS-iOS-G-020
- Vuln IDs
-
- V-25013
- Rule IDs
-
- SV-30798r3_rule
Checks: C-31216r7_chk
1. Make a list of all iOS security policies listed on the MDM server that have been assigned to iOS devices and review each policy. 2. Select each security policy iOS devices are assigned to and, in turn, verify the required settings are in the policy. Verify “Allow installing apps” is disabled or not checked. Mark as a finding if the required rule is not set up on the MDM. Note: If there is a finding, note the name of the policy in the Findings Details section in VMS/Component Provided Tracking Database.
Fix: F-27664r4_fix
On the MDM server, set “Allow installing apps” to disabled (unchecked).
- RMF Control
- Severity
- L
- CCI
- Version
- WIR-MOS-iOS-G-021
- Vuln IDs
-
- V-25014
- Rule IDs
-
- SV-30799r3_rule
Checks: C-31218r7_chk
Note: The site has the ability to disable the camera by using the iPhone profile if camera use is not approved, or allow the use of the camera if use is approved and documented in the site physical security policy. 1. Make a list of all iOS security policies listed on the MDM server that have been assigned to iOS devices and review each policy. 2. Select each security policy iOS devices are assigned to, and in turn, verify the required settings are in the policy. Determine if “Allow use of camera” is unchecked or checked. If checked, verify the site physical security policy allows the use of CMD cameras. Mark as a finding if “Allow use of camera” is checked in the iOS policy on the MDM and the site physical security policy does not allow the use of CMD cameras. Note: If there is a finding, note the name of the policy in the Findings Details section in VMS/Component Provided Tracking Database.
Fix: F-27665r3_fix
Disable (uncheck) "Allow use of camera" in the iOS policy on the MDM server unless documented approval exists in the site physical security policy.
- RMF Control
- Severity
- M
- CCI
- Version
- WIR-MOS-iOS-G-022
- Vuln IDs
-
- V-25015
- Rule IDs
-
- SV-30801r2_rule
Checks: C-31219r5_chk
1. Make a list of all iOS security policies listed on the MDM server that have been assigned to iOS devices and review each policy. 2. Select each security policy iOS devices are assigned to, and in turn, verify the required settings are in the policy. Verify “Allow screen capture” is unchecked. Mark as a finding if the required rule is not set up on the MDM server. Note: If there is a finding, note the name of the policy in the Findings Details section in VMS/Component Provided Tracking Database.
Fix: F-27666r2_fix
Disable (uncheck) "Allow screen capture" in the iOS policy on the MDM server.
- RMF Control
- Severity
- M
- CCI
- Version
- WIR-MOS-iOS-G-011
- Vuln IDs
-
- V-25016
- Rule IDs
-
- SV-32026r3_rule
Checks: C-32252r7_chk
1. Make a list of all iOS security policies listed on the MDM server that have been assigned to iOS devices and review each policy. 2. Select each security policy iOS devices are assigned to, and in turn, verify the required settings are in the policy. Verify "Minimum length of" is set to 8 or more in the iOS security policy. Mark as a finding if the required rule is not set up on the MDM server. Note: If there is a finding, note the name of the policy in the Findings Details section in VMS/Component Provided Tracking Database.
Fix: F-27687r5_fix
Configure the mobile operating system to enforce a minimum length for the device unlock password. Where a security container application is used in lieu of mobile operating system protections, configure the security container application to enforce a minimum length password for entry into the application.
- RMF Control
- Severity
- L
- CCI
- Version
- WIR-MOS-iOS-G-014
- Vuln IDs
-
- V-25017
- Rule IDs
-
- SV-30793r3_rule
Checks: C-31211r7_chk
1. Make a list of all iOS security policies listed on the MDM server that have been assigned to iOS devices and review each policy. 2. Select each security policy iOS devices are assigned to and, in turn, verify the required settings are in the policy. Verify "Auto-lock" is set to a value other than "Never". If the required rule is not set up on the MDM server, this is a finding. Note: If there is a finding, note the name of the policy in the Findings Details section in VMS/Component Provided Tracking Database.
Fix: F-27688r4_fix
Set the CMD Auto-Lock to a value other than "Never". Five minutes or less is recommended.
- RMF Control
- Severity
- L
- CCI
- Version
- WIR-MOS-iOS-G-015
- Vuln IDs
-
- V-25018
- Rule IDs
-
- SV-30794r2_rule
Checks: C-31212r7_chk
Password history is only required if the DAA deems it necessary for passwords to expire due to the operational risk and mission need. If used, the recommended value is 3 or more. If used, verify the setting has been set correctly using the following procedure: 1. Make a list of all iOS security policies listed on the MDM server that have been assigned to iOS devices and review each policy. 2. Select each security policy iOS devices are assigned to, and in turn, verify the required settings are in the policy. Verify “Passcode history” is checked and set to 3 or more in the iOS security policy. Mark as a finding if the required rule is not set up on the MDM server, if the DAA requires this setting. Note: If there is a finding, note the name of the policy in the Findings Details section in VMS/Component Provided Tracking Database.
Fix: F-27689r4_fix
Set the mobile device passcode history setting to 3 or more if the DAA requires this setting.
- RMF Control
- Severity
- M
- CCI
- Version
- WIR-MOS-iOS-040-01
- Vuln IDs
-
- V-25019
- Rule IDs
-
- SV-34930r3_rule
Checks: C-31220r5_chk
The list of Bluetooth devices the iOS device has connected to should only contain authorized smart card readers (SCR) and headsets. Currently, only Bluetooth SCRs and headsets manufactured by Biometric Associates (BAI) have been approved. On a sample of site-managed iOS devices (pick 3-4 random devices), verify the iOS device has only been connected to authorized Bluetooth peripherals. -Have the user log into the device. -Go to Settings > Bluetooth. -Verify only approved devices are listed under “Devices”. Mark as a finding if unauthorized peripherals have been connected to the iOS device.
Fix: F-27690r3_fix
Train the user to not connect the iOS device to unauthorized Bluetooth peripherals.
- RMF Control
- Severity
- M
- CCI
- Version
- WIR-MOS-iOS-007
- Vuln IDs
-
- V-25022
- Rule IDs
-
- SV-30786r2_rule
Checks: C-31203r8_chk
The following banner is required: “I've read & consent to terms in IS user agreem't.” Check Procedure: On the iOS device, complete the following: Check a sample of devices (3-4). The procedure will vary, depending on the MDM server used. For iOS, the banner is only displayed when logging into the security container. The banner must exactly match the required phrase. Mark as a finding if the required banner is not configured to display during device unlock/logon. If the Good Technology MDM server is used, complete the following: 1. Make a list of all iOS security policies listed on the MDM server that have been assigned to iOS devices and review each policy. 2. Select each security policy iOS devices are assigned to, and in turn, verify the required settings are in the policy. Verify either password or CAC authentication has been enabled for the MDM agent. -Launch the Good Mobile Control Web console and click on the Policies tab. -Select a policy set to review and click on the policy. -On the left tab, select Compliance Manager. -Verify a "Custom" or "iOS DoD Login Banner" rule is listed. (Note the rule title does not have to be exact.) -Open the rule by checking the box next to the rule and then click Edit. -Verify "Failure Action" is set to "Quit Good for Enterprise". -Verify "Check Every" is set to "6 hours". -Verify Rule File = disclaimer.xml.
Fix: F-27693r1_fix
Display the required banner during device unlock/logon.
- RMF Control
- Severity
- L
- CCI
- Version
- WIR-MOS-iOS-G-018-01
- Vuln IDs
-
- V-25033
- Rule IDs
-
- SV-30834r2_rule
Checks: C-31256r5_chk
1. Make a list of all iOS security policies listed on the MDM server that have been assigned to iOS devices and review each policy. 2. Select each security policy iOS devices are assigned to, and in turn, verify the required settings are in the policy. Verify “Allow use of Safari” is not checked. Mark as a finding if the required rule is not set up on the MDM server. Note: If there is a finding, note the name of the policy in the Findings Details section in VMS/Component Provided Tracking Database.
Fix: F-27720r3_fix
Disable (uncheck) "Allow use of Safari" in the iOS policy on the MDM server.
- RMF Control
- Severity
- L
- CCI
- Version
- WIR-MOS-iOS-042
- Vuln IDs
-
- V-25051
- Rule IDs
-
- SV-34932r2_rule
Checks: C-31304r3_chk
Location based services is a User Based Enforcement (UBE) service. On a sample of 3-4 devices managed by the site, verify iOS Location Services is disabled for all applications unless the site has a letter/memo stating the DAA or the Command Application Configuration Control Board (CCB) has approved location-based services for specific applications (e.g., Google Maps, Camera, etc.). Go to Settings > Privacy > Location Services. Verify the service is off for all applications or off for unapproved applications. Mark as a finding if any application not authorized for location services has location services turned on.
Fix: F-27774r2_fix
Turn off location services during device provisioning and users will not enable the service unless approved for use.
- RMF Control
- Severity
- L
- CCI
- Version
- WIR-iOS-005
- Vuln IDs
-
- V-25092
- Rule IDs
-
- SV-31000r3_rule
Checks: C-31417r6_chk
On a sample of site-managed iOS devices (pick 3-4 random devices), have the user turn on and log into the device. -Go to Settings > Wi-Fi. -Touch Wi-Fi. -Check the setting of "Ask to Join Networks". Verify "Ask to Join Networks" is set to off (not selected). Mark as a finding if "Ask to Join Networks" is not set to off.
Fix: F-27875r4_fix
Set "Ask to Join Networks" to "Off".
- RMF Control
- Severity
- L
- CCI
- Version
- WIR-MOS-iOS-G-023
- Vuln IDs
-
- V-25755
- Rule IDs
-
- SV-32021r3_rule
Checks: C-32247r5_chk
1. Make a list of all iOS security policies listed on the MDM server that have been assigned to iOS devices and review each policy. 2. Select each security policy iOS devices are assigned to, and in turn, verify the required settings are in the policy. Verify “Allow In-App Purchases” is unchecked. Mark as a finding if the required rule is not set up on the MDM server. Note: If there is a finding, note the name of the policy in the Findings Details section in VMS/Component Provided Tracking Database.
Fix: F-28612r2_fix
Disable (uncheck) "Allow In-App Purchases" in the iOS policy on the MDM server.
- RMF Control
- Severity
- M
- CCI
- Version
- WIR-MOS-iOS-G-008
- Vuln IDs
-
- V-27635
- Rule IDs
-
- SV-35228r2_rule
Checks: C-35072r5_chk
1. Make a list of all iOS security policies listed on the MDM server that have been assigned to iOS devices and review each policy. 2. Select each security policy iOS devices are assigned to, and in turn, verify the required settings are in the policy. Verify the MDM has a setting that will wipe all data and non-core applications when a wipe commend is sent to managed mobile devices. Mark as a finding if the required rule is not set up on the MDM server. Note: If there is a finding, note the name of the policy in the Findings Details section in VMS/Component Provided Tracking Database. If the Good Technology MDM server is used, complete the following: -Verify "Enable remote full device wipe" is checked.
Fix: F-30358r2_fix
Enable remote full device wipe on iOS devices.
- RMF Control
- Severity
- M
- CCI
- Version
- WIR-MOS-iOS-50-02
- Vuln IDs
-
- V-32686
- Rule IDs
-
- SV-43032r1_rule
Checks: C-41051r5_chk
1. Make a list of all iOS security policies listed on the MDM server that have been assigned to iOS devices and review each policy. 2. Select each security policy iOS devices are assigned to, and in turn, verify the required settings are in the policy. Verify "Allow Siri" is not enabled. Mark as a finding if not set as required. Note: If there is a finding, note the name of the policy in the Findings Details section in VMS/Component Provided Tracking Database.
Fix: F-36587r1_fix
Disable Siri in the iOS security policy.
- RMF Control
- Severity
- M
- CCI
- Version
- WIR-MOS-iOS-50-03
- Vuln IDs
-
- V-32688
- Rule IDs
-
- SV-43034r1_rule
Checks: C-41052r5_chk
1. Make a list of all iOS security policies listed on the MDM server that have been assigned to iOS devices and review each policy. 2. Select each security policy iOS devices are assigned to, and in turn, verify the required settings are in the policy. Verify "Allow multiplayer gaming" is not enabled. Mark as a finding if not set as required. Note: If there is a finding, note the name of the policy in the Findings Details section in VMS/Component Provided Tracking Database.
Fix: F-36588r1_fix
Disable multiplayer gaming in the iOS security policy.
- RMF Control
- Severity
- M
- CCI
- Version
- WIR-MOS-iOS-50-04
- Vuln IDs
-
- V-32689
- Rule IDs
-
- SV-43035r1_rule
Checks: C-41053r5_chk
1. Make a list of all iOS security policies listed on the MDM server that have been assigned to iOS devices and review each policy. 2. Select each security policy iOS devices are assigned to, and in turn, verify the required settings are in the policy. Verify "Adding Game Center Friends" is not enabled. Mark as a finding if not set as required. Note: If there is a finding, note the name of the policy in the Findings Details section in VMS/Component Provided Tracking Database.
Fix: F-36589r1_fix
Disable Adding Game Center Friends in the iOS security policy.
- RMF Control
- Severity
- M
- CCI
- Version
- WIR-MOS-iOS-50-05
- Vuln IDs
-
- V-32690
- Rule IDs
-
- SV-43036r1_rule
Checks: C-41054r5_chk
1. Make a list of all iOS security policies listed on the MDM server that have been assigned to iOS devices and review each policy. 2. Select each security policy iOS devices are assigned to, and in turn, verify the required settings are in the policy. Verify "Allow iCloud Backup" is not enabled. Mark as a finding if not set as required. Note: If there is a finding, note the name of the policy in the Findings Details section in VMS/Component Provided Tracking Database.
Fix: F-36590r1_fix
Disable iCloud Backup in the iOS security policy.
- RMF Control
- Severity
- M
- CCI
- Version
- WIR-MOS-iOS-50-06
- Vuln IDs
-
- V-32691
- Rule IDs
-
- SV-43037r1_rule
Checks: C-41055r5_chk
1. Make a list of all iOS security policies listed on the MDM server that have been assigned to iOS devices and review each policy. 2. Select each security policy iOS devices are assigned to, and in turn, verify the required settings are in the policy. Verify "Allow Document Syncing" is not enabled. Mark as a finding if not set as required. Note: If there is a finding, note the name of the policy in the Findings Details section in VMS/Component Provided Tracking Database.
Fix: F-36591r1_fix
Disable Document Syncing in the iOS security policy.
- RMF Control
- Severity
- L
- CCI
- Version
- WIR-MOS-iOS-50-07
- Vuln IDs
-
- V-32693
- Rule IDs
-
- SV-43039r1_rule
Checks: C-41056r7_chk
1. Make a list of all iOS security policies listed on the MDM server that have been assigned to iOS devices and review each policy. 2. Select each security policy iOS devices are assigned to, and in turn, verify the required settings are in the policy. Verify "Allow Photo Stream" is not enabled. Mark as a finding if not set as required. Note: If there is a finding, note the name of the policy in the Findings Details section in VMS/Component Provided Tracking Database.
Fix: F-36592r1_fix
Disable Photo Stream in the iOS security policy.
- RMF Control
- Severity
- M
- CCI
- Version
- WIR-MOS-iOS-50-08
- Vuln IDs
-
- V-32695
- Rule IDs
-
- SV-43041r2_rule
Checks: C-41057r6_chk
1. Make a list of all iOS security policies listed on the MDM server that have been assigned to iOS devices and review each policy. 2. Select each security policy iOS devices are assigned to, and in turn, verify the required settings are in the policy. Verify "Allow Diagnostic Data to be Sent to Apple" is not enabled. Mark as a finding if not set as required. Note: If there is a finding, note the name of the policy in the Findings Details section in VMS/Component Provided Tracking Database.
Fix: F-36593r2_fix
Disable "Allow Diagnostic Data to be Sent to Apple" in the iOS security policy.
- RMF Control
- Severity
- M
- CCI
- Version
- WIR-MOS-iOS-034-05
- Vuln IDs
-
- V-32696
- Rule IDs
-
- SV-43042r1_rule
Checks: C-41058r4_chk
This check is not applicable if the installed VPN client is not used for remote access to DoD networks. Note: Use of a VPN to access DoD email on a mobile device is not required. Interview the IAO and/or site wireless device administrator and inspect a sample (3-4) of site devices. Review VPN client specification sheets. Verify the VPN client is configured to timeout an inactive session after a set period of inactivity. The check procedures will vary depending on the VPN client used. Mark as a finding if the VPN client is not configured to timeout after 4 hours.
Fix: F-36594r3_fix
Configure the VPN client to timeout a session after 4 hours of inactivity.
- RMF Control
- Severity
- M
- CCI
- Version
- WIR-MOS-iOS-034-06
- Vuln IDs
-
- V-32697
- Rule IDs
-
- SV-43043r1_rule
Checks: C-41059r3_chk
This check is not applicable if the installed VPN client is not used for remote access to DoD networks. Note: Use of a VPN to access DoD email on a mobile device is not required. Interview the IAO and/or site wireless device administrator and inspect a sample (3-4) of site devices. Review VPN client specification sheets. Verify the VPN client is inactive session timeout has been set to 2 hours or less, if this parameter is configurable. If the specification sheets do not provide evidence of this capability, authenticate the VPN, wait two hours, and verify the system prompts the user for fresh credentials. Mark as a finding if the timeout period is not set as required.
Fix: F-36595r2_fix
Configure the VPN client to timeout an inactive session of 2 hours or less.
- RMF Control
- Severity
- H
- CCI
- Version
- WIR-MOS-60
- Vuln IDs
-
- V-32698
- Rule IDs
-
- SV-43044r1_rule
Checks: C-41061r4_chk
Check the list of applications in Settings on a sample of 2-3 iOS devices. Verify an MDM, MAM, and integrity validation agent are installed on the device. Note that one or more agents may be used. Some agents may perform one or more of these functions. Ask the site for the name of the product(s) used. Mark as a finding if any of the required agent(s) are not installed.
Fix: F-36596r2_fix
Install MDM, MAM, and integrity validation agent(s) on the iOS device.
- RMF Control
- Severity
- H
- CCI
- Version
- WIR-MOS-iOS-65-01
- Vuln IDs
-
- V-32699
- Rule IDs
-
- SV-43045r2_rule
Checks: C-41062r6_chk
Apple iOS 6 meets this requirement if an MDM profile is used on the iOS device to manage the device security policy. Verify an MDM profile is installed on a sample of devices (3-4): Settings > General > Profiles. Mark as a finding if the site does not use an MDM profile to manage the security policy on site-managed iOS devices (it has already been verified that iOS 6 does not permit a user to modify the MDM profile).
Fix: F-36597r4_fix
Use an MDM profile to manage the security policy on site-managed iOS devices.
- RMF Control
- Severity
- H
- CCI
- Version
- WIR-MOS-iOS-65-02
- Vuln IDs
-
- V-32700
- Rule IDs
-
- SV-43046r1_rule
Checks: C-41063r5_chk
The link between iOS 6 and Apple meets this requirement for iOS updates from Apple. Review the software loading process between the mobile device and the provisioning server (MDM and/or MAM) to determine if it meets the necessary assurance for mutual authentication. Acceptable mutual authentication mechanisms may include PKI or shared secret based systems. A review of product documentation may be necessary. Mark as a finding if the trusted loading process does not meet the criteria.
Fix: F-36598r2_fix
Configure the mobile operating system to authenticate the provisioning server prior to accepting provisioned software.
- RMF Control
- Severity
- M
- CCI
- Version
- WIR-MOS-iOS-65-03
- Vuln IDs
-
- V-32701
- Rule IDs
-
- SV-43047r1_rule
Checks: C-41064r5_chk
The link between iOS 6 and Apple meets this requirement for iOS updates from Apple. Review system documentation and operating system configuration to determine if there is appropriate cryptography protecting the confidentiality of OTA provisioning between the mobile device and the provisioning server (MDM and/or MAM). AES encryption is one example of an acceptable cryptography. A review of product documentation may be needed. If the provisioning data is not protected by cryptographic means during an OTA provisioning procedure, this is a finding.
Fix: F-36599r1_fix
Configure the operating system to use cryptography providing confidentiality for provisioning downloads.
- RMF Control
- Severity
- M
- CCI
- Version
- WIR-MOS-iOS-65-04
- Vuln IDs
-
- V-32702
- Rule IDs
-
- SV-43048r1_rule
Checks: C-41065r4_chk
The link between iOS 6 and Apple meets this requirement for iOS updates from Apple. Review system documentation and operating system configuration to determine if there are appropriate integrity mechanisms protecting the confidentiality of OTA provisioning between the mobile device and the provisioning server (MDM and/or MAM). A review of product documentation may be needed. Appropriate integrity mechanisms generally involve the use of FIPS validated cryptographic modules implementing algorithms that provide integrity services. If there are no such mechanisms present, this is a finding.
Fix: F-36600r1_fix
Configure the operating system to use cryptography providing integrity for provisioning downloads.
- RMF Control
- Severity
- L
- CCI
- Version
- WIR-MOS-iOS-65-05
- Vuln IDs
-
- V-32703
- Rule IDs
-
- SV-43049r1_rule
Checks: C-41066r5_chk
Review system documentation and operating system configuration to determine if the system administrator has the ability to disable OTA provisioning on the MDM and/or MAM server. The Good Technology server meets this requirement.
Fix: F-36601r2_fix
Disable OTA provisioning if threat conditions warrant this action.
- RMF Control
- Severity
- M
- CCI
- Version
- WIR-MOS-iOS-65-08
- Vuln IDs
-
- V-32706
- Rule IDs
-
- SV-43052r2_rule
Checks: C-41069r8_chk
Review a sample of site-managed devices (3-4), interview the IAO, and review product documentation. Note: iOS does not currently provide a FIPS 140-2 validated cryptographic module for application services. Accordingly, third-party applications transmitting or receiving DoD sensitive information (MDM agent, email client, or browser) that leverage FIPS 140-2 validated cryptographic modules must be used to meet the requirement. VPN clients that do not possess the Apple VPN entitlement must also use a third-party FIPS 140-2 validated cryptographic module. If a site uses an application that transmits or receives sensitive DoD information, verify the application (MDM agent, email client, browser, or VPN client) leverages a FIPS 140-2 validated cryptographic module for this purpose. Review system documentation to identify the FIPS 140-2 certificate for the cryptographic module. Visit the NIST website at http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm to verify the certificate is still valid. If a site uses a third-party application that handles data in transit (MDM agent, email client, or browser) using cryptography that has not been FIPS 140-2 validated, this is a finding.
Fix: F-36604r4_fix
Stop using the operating system until the vendor has obtained FIPS validation, or install a third-party product that has a FIPS 140-2 validated cryptographic module.
- RMF Control
- Severity
- M
- CCI
- Version
- WIR-MOS-iOS-65-11
- Vuln IDs
-
- V-32711
- Rule IDs
-
- SV-43057r2_rule
Checks: C-41072r4_chk
Review the operating system and browser configuration to determine if traffic is forced through DoD proxy servers. If greater assurance is required, access a number of Internet web sites and verify traffic flows through a DoD proxy server by viewing the traffic using a network protocol analyzer or by communicating with personnel that manage the proxy server. Note: Although in iOS 6, Safari can be configured to meet this requirement, Safari encryption is not FIPS 140-2 validated and cannot be used in the DoD. Therefore, a third-party browser must be used. There are two acceptable implementations for this requirement. 1. The device uses a mobile VPN to route all data traffic to the DoD enclave, which forces all browser traffic to the DoD Internet gateway. 2. The device browser supports a proxy server setting that forces all traffic to a specified the proxy server when configured to do so. The configuration must be from an MDM server and not user modifiable. In some implementations, the user may enter a container application to access the browser functionality. Verify that none of the unauthorized browsers can be used. On a sample of 3-4 devices, identify the browsers on the device. If any are unauthorized, verify they are not functional. Mark as a finding if any non-compliant browser is functional.
Fix: F-36607r2_fix
Disable browsers that do not support a feature to direct all traffic to a DoD proxy server. Configure browsers that support this functionality to direct all traffic to a DoD proxy server.
- RMF Control
- Severity
- H
- CCI
- Version
- WIR-MOS-iOS-65-15
- Vuln IDs
-
- V-32716
- Rule IDs
-
- SV-43062r2_rule
Checks: C-41076r5_chk
The method for meeting this requirement using an iOS device is by implementing MDIS and MAM servers in the system architecture. Verify the site has implemented both the MDIS and MAM servers by reviewing system documentation and interviewing the IAO and verify the MDIS and MAM agents are installed on a sample (3-4) of site-managed devices. Mark as a finding if an MDIS and MAM server are not installed in the system architecture.
Fix: F-36611r2_fix
Install MDIS and MAM servers in the system architecture.
- RMF Control
- Severity
- M
- CCI
- Version
- WIR-MOS-iOS-70-01
- Vuln IDs
-
- V-34172
- Rule IDs
-
- SV-44625r1_rule
Checks: C-42133r2_chk
1. Make a list of all iOS security policies listed on the MDM server that have been assigned to iOS devices and review each policy. 2. Select each security policy iOS devices are assigned to, and in turn, verify the required settings are in the policy. Verify "Allow Shared Photo Stream" is not enabled. Mark as a finding if not set as required. Note: If there is a finding, note the name of the policy in the Findings Details section in VMS/Component Provided Tracking Database.
Fix: F-38082r1_fix
Disable Shared Photo Stream in the iOS security policy.
- RMF Control
- Severity
- M
- CCI
- Version
- WIR-MOS-iOS-70-02
- Vuln IDs
-
- V-34173
- Rule IDs
-
- SV-44626r1_rule
Checks: C-42134r1_chk
1. Make a list of all iOS security policies listed on the MDM server that have been assigned to iOS devices and review each policy. 2. Select each security policy iOS devices are assigned to, and in turn, verify the required settings are in the policy. Verify “Allow Passbook” is not enabled. Mark as a finding if not set as required. Note: If there is a finding, note the name of the policy in the Findings Details section in VMS/Component Provided Tracking Database.
Fix: F-38083r2_fix
Disable access to Passbook in the iOS security policy.
- RMF Control
- Severity
- M
- CCI
- Version
- WIR-MOS-iOS-70-03
- Vuln IDs
-
- V-34174
- Rule IDs
-
- SV-44627r1_rule
Checks: C-42135r2_chk
This is a User-Based Enforcement (UBE) control. On a sample of site-managed iOS devices (pick 3-4 random devices), check that no applications have been enabled for Bluetooth sharing. -Have the user log into the device. -Go to Settings > Privacy > Bluetooth Sharing. -Verify there are no applications listed. Mark as a finding if any applications are listed on the Bluetooth sharing screen.
Fix: F-38084r1_fix
Delete all applications listed on the Bluetooth sharing screen or disable sharing of these applications.
- RMF Control
- Severity
- M
- CCI
- Version
- WIR-MOS-iOS-70-04
- Vuln IDs
-
- V-34316
- Rule IDs
-
- SV-44841r2_rule
Checks: C-42310r2_chk
This check is not applicable if the site does not use any iOS devices from ATT. 1. Make a list of all iOS security policies listed on the MDM server that have been assigned to iOS devices and review each policy. 2. Select each security policy iOS devices are assigned to, and in turn, verify the required settings are in the policy. Verify a Wi-Fi profile has been set up in the security policy with the following features: •SSID: attwifi. •Passphrase: any eight-character or larger passphrase. •Auto-join: set to off. (Note: This setting effectively stops the iOS device from automatically connecting to the attwifi network when in range of a network access point and also disables the ability of a user from connecting the network.) Mark as a finding if the required Wi-Fi profile is not set up in the security policy and it does not have the required configuration. Note: If there is a finding, note the name of the policy in the Findings Details section in VMS/Component Provided Tracking Database. On the Good Technology MDM server, the Wi-Fi profile is found in the “WiFi” tab of the “iOS Configuration” section of the security policy.
Fix: F-38277r1_fix
Set up a Wi-Fi profile on the MDM server security policy to disable attwifi network connections.
- RMF Control
- Severity
- M
- CCI
- Version
- WIR-MOS-iOS-70-05
- Vuln IDs
-
- V-34322
- Rule IDs
-
- SV-44851r2_rule
Checks: C-42312r7_chk
Interview the site IAO and iOS device system administrator. Also, perform the following actions on a random sample of site-managed iOS devices (3-4 devices, iPhone and iPad). -Verify an iOS restriction has been placed on the iOS devices and the system administrator has assigned a four character passcode, so the user cannot remove it. The iOS Restriction passcode must meet the same complexity requirements as the device unlock passcode: no sequential numbers and no repeating numbers. *Have the site iOS system administrator show that a Restriction policy is on the device. Go to Settings > General > Restrictions. Mark as a finding if no Restriction exists. *Have the site iOS system administrator log into the Restriction policy. Mark as a finding if the restriction passcode is not 4 characters and does not meet the complexity requirements. *Interview several users and determine if they have been given the Restriction passcode by the system administrator. If yes, mark as a finding. -After the system administrator opens the Restriction, verify the following configuration setting has been set in the Restriction policy to disable the capability for a device wipe command to be initiated on the device when received from an iCloud account: ----Allow Changes > Accounts > Don't Allow Changes (If the DAA has not approved the use of personal email, this setting must be checked. If not checked, ask to see documentation showing DAA approval of personal email on site-managed iOS devices.) -If personal email is allowed, verify the following configuration setting has been set in the Restriction policy: ----Privacy > Location Services > Find My iPhone set to Off. Mark as a finding if any of these settings is not set as required.
Fix: F-38284r2_fix
Set up the required Restriction policy on each site-managed iOS device.
- RMF Control
- Severity
- L
- CCI
- Version
- WIR-MOS-iOS-70-06
- Vuln IDs
-
- V-35006
- Rule IDs
-
- SV-46252r1_rule
Checks: C-43430r1_chk
On a sample of site-managed iOS devices (pick 3-4 random devices), have the user turn on and log into the device. -Go to Settings > Messages > iMessage. -Check the setting of "iMessage". Verify "iMessage" is set to off (not selected). Mark as a finding if "iMessage" is not set to off.
Fix: F-39560r1_fix
Set "iMessage" to "Off".
- RMF Control
- Severity
- M
- CCI
- Version
- WIR-MOS-iOS-G-024
- Vuln IDs
-
- V-37769
- Rule IDs
-
- SV-49532r1_rule
Checks: C-45642r2_chk
1. Make a list of all iOS security policies listed on the MDM server that have been assigned to iOS devices and review each policy. 2. Select each security policy iOS devices are assigned to and, in turn, verify the required settings are in the policy. Verify "Alphanumeric” is checked in the policy. Mark as a finding if the required rule is not set up on the MDM server. Note: If there is a finding, note the name of the policy in the Findings Details section in VMS/Component Provided Tracking Database.
Fix: F-42656r1_fix
Select the “Alphanumeric” configuration setting in the MDM security policy.
- RMF Control
- Severity
- M
- CCI
- Version
- WIR-MOS-iOS-G-025
- Vuln IDs
-
- V-37770
- Rule IDs
-
- SV-49533r1_rule
Checks: C-45643r2_chk
1. Make a list of all iOS security policies listed on the MDM server that have been assigned to iOS devices and review each policy. 2. Select each security policy iOS devices are assigned to and, in turn, verify the required settings are in the policy. Verify "Minimum number of complex characters” is checked and at least “1 character” is selected in the iOS security policy. Mark as a finding if the required rule is not set up on the MDM server. Note: If there is a finding, note the name of the policy in the Findings Details section in VMS/Component Provided Tracking Database.
Fix: F-42657r1_fix
Select the “Minimum number of complex characters” and “1 character” configuration settings in the MDM iOS security policy.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- WIR-MOS-iOS-500
- Vuln IDs
-
- V-54983
- Rule IDs
-
- SV-69229r1_rule
Checks: C-55611r1_chk
Apple support for iOS6 ended 18 September 2013. If iOS6 is installed on a mobile device, this is a finding.
Fix: F-59847r1_fix
Upgrade iOS6 mobile devices to a supported operating system.