Apple iOS/iPad OS 16 MDFPP 3.3 BYOAD Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +1
Comparison against the immediately-prior release (V1R1). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 1
- V-274443 High All Apple iOS/iPadOS 16 BYOAD installations must be removed.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- AIOS-16-800020
- Vuln IDs
-
- V-257085
- Rule IDs
-
- SV-257085r959010_rule
Checks: C-60770r903998_chk
Verify the EMM system supporting the iOS/iPadOS 16 BYOAD has been configured to conduct autonomous monitoring, compliance, and validation to ensure security/configuration settings of mobile devices do not deviate from the approved configuration baseline. The exact procedure will depend on the EMM system used at the site. If the EMM system supporting the iOS/iPadOS 16 BYOAD has not been configured to conduct autonomous monitoring, compliance, and validation to ensure security/configuration settings of mobile devices, this is a finding.
Fix: F-60711r903999_fix
Configure the EMM system supporting the iOS/iPadOS 16 BYOAD to conduct autonomous monitoring, compliance, and validation to ensure security/configuration settings of mobile devices do not deviate from the approved configuration baseline. The exact procedure will depend on the EMM system used at the site.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- AIOS-16-800030
- Vuln IDs
-
- V-257086
- Rule IDs
-
- SV-257086r959010_rule
Checks: C-60771r904001_chk
Verify the EMM system supporting the iOS/iPadOS 16 BYOAD has been configured to initiate autonomous monitoring, compliance, and validation prior to granting the BYOAD access to DOD information and IT resources. The exact procedure will depend on the EMM system used at the site. If the EMM system supporting the iOS/iPadOS 16 BYOAD has not been configured to initiate autonomous monitoring, compliance, and validation prior to granting the BYOAD access to DOD information and IT resources, this is a finding.
Fix: F-60712r904002_fix
Configure the EMM system supporting the iOS/iPadOS 16 BYOAD to initiate autonomous monitoring, compliance, and validation prior to granting the BYOAD access to DOD information and IT resources. The exact procedure will depend on the EMM system used at the site.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- AIOS-16-800040
- Vuln IDs
-
- V-257087
- Rule IDs
-
- SV-257087r959010_rule
Checks: C-60772r904004_chk
Verify the EMM system supporting the iOS/iPadOS 16 BYOAD has been configured to detect if the BYOAD native security controls are disabled. The exact procedure will depend on the EMM system used at the site. If the EMM system supporting the iOS/iPadOS 16 BYOAD is not configured to detect if the BYOAD native security controls are disabled, this is a finding.
Fix: F-60713r904005_fix
Configure the EMM system supporting the iOS/iPadOS 16 BYOAD to detect if the BYOAD native security controls are disabled. The exact procedure will depend on the EMM system used at the site.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- AIOS-16-800050
- Vuln IDs
-
- V-257088
- Rule IDs
-
- SV-257088r959010_rule
Checks: C-60773r904007_chk
Verify an app vetting process is being used before managed apps are placed in the MDM app repository. If an app vetting process is not being used before managed apps are placed in the MDM app repository, this is a finding.
Fix: F-60714r904008_fix
Implement an app vetting process before managed apps are placed in the MDM app repository.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- AIOS-16-800060
- Vuln IDs
-
- V-257089
- Rule IDs
-
- SV-257089r959010_rule
Checks: C-60774r904010_chk
Review configuration settings to confirm "Allow Trusting New Enterprise App Authors" is disabled. This procedure is performed in the Apple iOS/iPadOS management tool and on the iPhone and iPad. Note: If an organization has multiple configuration profiles, the check procedure must be performed on the relevant configuration profiles applicable to the scope of the review. In the Management tool, verify "Allow Trusting New Enterprise App Authors" is disabled. On the iPhone and iPad: 1. Open the Settings app. 2. Tap "General". 3. Tap "Profiles & Device Management" or "Profiles". 4. Tap the Configuration Profile from the Apple iOS/iPadOS management tool containing the restrictions policy. 5. Tap "Restrictions". 6. Verify "Trusting enterprise apps not allowed" is listed. If "Allow Trusting New Enterprise App Authors" is not disabled in the iOS/iPadOS management tool or on the iPhone and iPad, this is a finding. Note: This requirement is the same as AIOS-16-707000 in the Apple iOS/iPadOS 16 BYOAD STIG.
Fix: F-60715r904011_fix
Install a configuration profile to disable "Allow Trusting New Enterprise App Authors". Note: This requirement is the same as AIOS-16-707000 in the Apple iOS/iPadOS 16 BYOAD STIG.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- AIOS-16-800070
- Vuln IDs
-
- V-257090
- Rule IDs
-
- SV-257090r959010_rule
Checks: C-60775r904013_chk
Verify the EMM detection/monitoring system is configured to use continuous monitoring of enrolled iOS/iPadOS 16 BYOAD. The exact procedure will depend on the EMM system used at the site. If the EMM detection/monitoring system is not configured to use continuous monitoring of enrolled iOS/iPadOS 16 BYOAD, this is a finding.
Fix: F-60716r904014_fix
Configure the EMM detection/monitoring system to use continuous monitoring of enrolled iOS/iPadOS 16 BYOAD. The exact procedure will depend on the EMM system used at the site.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- AIOS-16-800080
- Vuln IDs
-
- V-257091
- Rule IDs
-
- SV-257091r959010_rule
Checks: C-60776r904016_chk
Verify the EMM has been configured to either disable access to DOD data, IT systems, and user accounts on the iOS/iPadOS 16 BYOAD or wipe managed data and apps if it has been detected that native BYOAD security controls are disabled (e.g., jailbroken/rooted). When managed data and apps are wiped, all managed data and files in the Files app must be wiped as well. The exact procedure will depend on the EMM system used at the site. If the EMM has not been configured to either disable access to DOD data, IT systems, and user accounts on the iOS/iPadOS 16 BYOAD or wipe managed data and apps if it has been detected that native BYOAD security controls are disabled, this is a finding.
Fix: F-60717r904017_fix
Configure the EMM to either disable access to DOD data, IT systems, and user accounts on the iOS/iPadOS 16 BYOAD or wipe managed data and apps if it has been detected that native iOS/iPadOS 16 BYOAD security controls are disabled (e.g., jailbroken/rooted). The exact procedure will depend on the EMM system used at the site. Note: When managed data and apps are wiped, all managed data and files in the Files app must be wiped as well.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- AIOS-16-800090
- Vuln IDs
-
- V-257092
- Rule IDs
-
- SV-257092r959010_rule
Checks: C-60777r904019_chk
Verify the EMM system has been configured to either disable access to DOD data, IT systems, and user accounts or wipe managed data and apps if it has detected the iOS/iPadOS 16 BYOAD device has known malicious, blocked, or prohibited managed applications or is configured to access nonapproved third-party applications stores for managed apps. When the Work profile is wiped, all managed data and files in the Files app must be wiped as well. The exact procedure will depend on the EMM system used at the site. If the EMM system has not been configured to either disable access to DOD data, IT systems, and user accounts or wipe managed data and apps if it has detected the iOS/iPadOS 16 BYOAD device has known malicious, blocked, or prohibited managed applications or is configured to access nonapproved third-party applications stores for managed apps, this is a finding.
Fix: F-60718r904020_fix
Configure the EMM system to either disable access to DOD data, IT systems, and user accounts or wipe managed data and apps if it has detected the iOS/iPadOS 16 BYOAD device has known malicious, blocked, or prohibited managed applications or is configured to access nonapproved third-party applications stores for managed apps. Note: When managed data and apps are wiped, all managed data and files in the Files app must be wiped as well. The exact procedure will depend on the EMM system used at the site.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- AIOS-16-800100
- Vuln IDs
-
- V-257093
- Rule IDs
-
- SV-257093r959010_rule
Checks: C-60778r904022_chk
Verify the EMM system is configured to wipe managed data and apps if the iOS/iPadOS 16 BYOAD is no longer receiving security or software updates. When managed data and apps are wiped, all managed data and files in the Files app must be wiped as well. The exact procedure will depend on the EMM system used at the site. If the EMM system is not configured to wipe managed data and apps if the iOS/iPadOS 16 BYOAD is no longer receiving security or software updates, this is a finding.
Fix: F-60719r904023_fix
Configure the EMM system so managed data and apps are removed if the iOS/iPadOS 16 BYOAD is no longer receiving security or software updates. Note: When managed data and apps are wiped, all managed data and files in the Files app must be wiped as well. The exact procedure will depend on the EMM system used at the site.
- RMF Control
- AC-3
- Severity
- H
- CCI
- CCI-000213
- Version
- AIOS-16-800110
- Vuln IDs
-
- V-257094
- Rule IDs
-
- SV-257094r958472_rule
Checks: C-60779r904025_chk
Verify the EMM system and DOD enterprise have been configured to limit iOS/iPadOS 16 BYOAD access to only AO-approved enterprise IT resources. The exact procedure will depend on the EMM system used and IT resources at the site. If the EMM system and DOD enterprise have not been configured to limit iOS/iPadOS 16 BYOAD access to only AO-approved enterprise IT resources, this is a finding.
Fix: F-60720r904026_fix
Configure the EEM system and DOD enterprise to limit iOS/iPadOS 16 BYOAD access to only AO-approved enterprise IT resources. The exact procedure will depend on the EMM system used and IT resources at the site.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- AIOS-16-800120
- Vuln IDs
-
- V-257095
- Rule IDs
-
- SV-257095r959010_rule
Checks: C-60780r904028_chk
Verify the EMM system has been configured to limit access to unmanaged data and apps on the iOS/iPadOS 16 BYOAD to protect users' privacy, personal information, and applications. The exact procedure will depend on the EMM system used at the site. If the BYOAD has not been configured to limit access to unmanaged data and apps on the iOS/iPadOS 16 BYOAD, this is a finding.
Fix: F-60721r904029_fix
Configure the EMM system to limit access to unmanaged data and apps on the iOS/iPadOS 16 BYOAD to protect users' privacy, personal information, and applications. The exact procedure will depend on the EMM system used at the site.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- AIOS-16-800130
- Vuln IDs
-
- V-257096
- Rule IDs
-
- SV-257096r959010_rule
Checks: C-60781r904031_chk
Verify the EMM system administrators supporting the iOS/iPadOS 16 BYOAD have been trained to only wipe managed data and apps when the user's access is revoked or terminated, the user no longer has the need to access DOD data or IT, or the user reports a registered device as lost, stolen, or showing indicators of compromise. If the EMM system administrators supporting the iOS/iPadOS 16 BYOAD have not been trained to only wipe managed data and apps, this is a finding.
Fix: F-60722r904032_fix
Train EMM system administrators supporting the iOS/iPadOS 16 BYOAD to only wipe managed data and apps when the user's access is revoked or terminated, the user no longer has the need to access DOD data or IT, or the user reports a registered device as lost, stolen, or showing indicators of compromise.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- AIOS-16-800150
- Vuln IDs
-
- V-257097
- Rule IDs
-
- SV-257097r958472_rule
Checks: C-60782r904034_chk
Verify iOS/iPadOS 16 BYOAD has been deployed in Device Enrollment mode or User Enrollment mode. This procedure is performed on the iPhone and iPad. For Device Enrollment: 1. On the device, go to Settings >> General >> VPN & Device Management. 2. Verify a Mobile Device Management profile is installed on the device. For User Enrollment: 1. On the device, go to Settings >> General >> VPN & Device Management. 2. Verify a Mobile Device Management profile is installed on the device. 3. On the device, go to "Settings" and click on the User icon. 4. Verify a work AppleID is listed. If the iOS/iPadOS 16 BYOAD has not been deployed in Device Enrollment mode or User Enrollment mode, this is a finding.
Fix: F-60723r904035_fix
Deploy iOS/iPadOS 16 BYOAD in Device Enrollment mode or User Enrollment mode. The exact procedure will depend on the EMM system used at the site.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-002218
- Version
- AIOS-16-800160
- Vuln IDs
-
- V-257098
- Rule IDs
-
- SV-257098r987865_rule
Checks: C-60783r904037_chk
Note: If an organization has multiple configuration profiles, the check procedure must be performed on the relevant configuration profiles applicable to the scope of the review. In the iOS management tool, verify "Require managed pasteboard" is set to "True". If "Require managed pasteboard" is not set to "True", this is a finding. Note: This requirement is the same as AIOS-16-714600 in the Apple iOS/iPadOS 16 BYOAD STIG.
Fix: F-60724r904038_fix
Configure the Apple iOS configuration profile to disable copy/paste of data from managed to unmanaged applications. The procedure for implementing this control will vary depending on the MDM/EMM used by the mobile service provider. In the MDM console, set "Require managed pasteboard" to "True". Note: This requirement is the same as AIOS-16-714600 in the Apple iOS/iPadOS 16 BYOAD STIG.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- AIOS-16-800200
- Vuln IDs
-
- V-257100
- Rule IDs
-
- SV-257100r959010_rule
Checks: C-60785r904043_chk
Verify the EMM system supporting the iOS/iPadOS BYOAD is NIAP validated (included on the NIAP list of compliant products or products in evaluation). If it is not, verify the DOD CIO has granted an approved E2P. Note: For a VMI solution, both the client and server components must be NIAP compliant. If the EMM system supporting the iOS/iPadOS BYOAD is not NIAP validated (included on the NIAP list of compliant products or products in evaluation) and the DOD CIO has not granted an approved E2P, this is a finding.
Fix: F-60726r904044_fix
Only use an EMM system supporting the iOS/iPadOS 16 BYOAD that is NIAP validated (included on the NIAP list of compliant products or products in evaluation) unless the DOD CIO has granted an approved E2P. Note: For a VMI solution, both the client and server components must be NIAP compliant.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- AIOS-16-800210
- Vuln IDs
-
- V-257101
- Rule IDs
-
- SV-257101r959010_rule
Checks: C-60786r904046_chk
Verify the user agreement includes a description of what personal data and information is being monitored, collected, or managed by the EMM system or deployed agents or tools. If the user agreement does not include a description of what personal data and information is being monitored, collected, or managed by the EMM system or deployed agents or tools, this is a finding.
Fix: F-60727r904047_fix
Include a description in the user agreement of what personal data and information is being monitored, collected, or managed by the EMM system or deployed agents or tools.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- AIOS-16-800220
- Vuln IDs
-
- V-257102
- Rule IDs
-
- SV-257102r958480_rule
Checks: C-60787r904049_chk
Verify the DOD Mobile Service Provider or information system security officer (ISSO)/information system security manager (ISSM) do not allow BYOADs in facilities where personally owned mobile devices are prohibited. If the DOD Mobile Service Provider or ISSO/ISSM allows BYOADs in facilities where personally owned mobile devices are prohibited, this is a finding.
Fix: F-60728r904050_fix
Do not allow BYOADs in facilities where personally owned mobile devices are prohibited.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- AIOS-16-800230
- Vuln IDs
-
- V-257103
- Rule IDs
-
- SV-257103r958480_rule
Checks: C-60788r904052_chk
Verify iOS/iPadOS 16 BYOADs are prohibited in DOD facilities that prohibit mobile devices with cameras and microphones. Refer to the site Facility Security Standard Operating Procedure (SOP) to determine site requirements. If for DOD sites that prohibit mobile devices with cameras and microphones, the ISSO/ISSM has not prohibited iOS/iPadOS 16 BYOADs from the facility, this is a finding.
Fix: F-60729r904053_fix
Do not allow iOS iPadOS 16 BYOADs in DOD facilities where mobile phone cameras and/or microphones are prohibited. Refer to the site Facility Security SOP to determine site requirements.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- AIOS-16-800280
- Vuln IDs
-
- V-257136
- Rule IDs
-
- SV-257136r959010_rule
Checks: C-60821r904454_chk
Verify the mobile device used for BYOAD is NIAP validated (included on the NIAP list of compliant products or products in evaluation). If the mobile device used for BYOAD is not NIAP validated (included on the NIAP list of compliant products or products in evaluation), this is a finding.
Fix: F-60762r904455_fix
Use only mobile devices for BYOAD that are NIAP validated (included on the NIAP list of compliant products or products in evaluation).
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- AIOS-16-800100
- Vuln IDs
-
- V-274443
- Rule IDs
-
- SV-274443r1099858_rule
Checks: C-78535r1099856_chk
Verify there are no installations of Apple iOS/iPadOS 16 BYOAD at the site. If Apple iOS/iPadOS 16 BYOAD is being used at the site, this is a finding.
Fix: F-78440r1099857_fix
Remove all installations of Apple iOS/iPadOS 16 BYOAD.