From Apple iOS 11 Security Technical Implementation Guide
Part of PP-MDF-301050
Associated with: CCI-000044
The more attempts an adversary has to guess a password, the more likely the adversary will enter the correct password and gain access to resources on the device. Setting a limit on the number of attempts mitigates this risk. Setting the limit at 10 or less gives authorized users the ability to make a few mistakes when entering the password but still provides adequate protection against dictionary or brute force attacks on the password.
Review configuration settings to confirm that consecutive failed authentication attempts is set to "10" or fewer.
This procedure is performed in the Apple iOS management tool and on the Apple iOS device.
Note: If an organization has multiple configuration profiles, the check procedure must be performed on the relevant configuration profiles applicable to the scope of the review.
In the Management tool, verify the "Maximum number of failed attempts" value is set to "10" or fewer.
Alternatively, verify the text "
Install a configuration profile to allow only 10 or fewer consecutive failed authentication attempts.
Lavender hyperlinks in small type off to the right (of CSS
class id
, if you view the page source) point to
globally unique URIs for each document and item. Copy the
link location and paste anywhere you need to talk
unambiguously about these things.
You can obtain data about documents and items in other
formats. Simply provide an HTTP header Accept:
text/turtle
or
Accept: application/rdf+xml
.
Powered by sagemincer