From Apple iOS 12 Security Technical Implementation Guide
Part of PP-MDF-991000
Associated with: CCI-000366 CCI-000370 CCI-000381
The security posture on iOS devices requires the device user to configure several required policy rules on their device. User Based Enforcement (UBE) is required for these controls. In addition, if the AO has approved users' full access to the Apple App Store, than users must receive training on risks. If a user is not aware of their responsibilities and does not comply with UBE requirements, the security posture of the iOS mobile device may become compromised and DoD sensitive data may become compromised.
Review a sample of site User Agreements of iOS device users or similar training records and training course content. Verify iOS device users have completed required training. If any iOS device user is found to not have completed required training, this is a finding.
Have all iOS device users complete training on the following topics. Users should acknowledge they have received training via a signed User Agreement or similar written record. Training Topics: -Operational security concerns introduced by unmanaged applications including applications utilizing global positioning system (GPS) tracking -Need to ensure no DoD data is saved in an unmanaged app or transmitted from a personal app (for example, from personal email) -If the Purebred key management app is used, users are responsible for maintaining positive control of their credentialed device at all times. The DoD PKI certificate policy requires subscribers to maintain positive control of the devices that contain private keys, and to report any loss of control so that the credentials can be revoked. Upon device retirement, turn in, or reassignment, ensure a factory data reset is performed prior to device hand off. Follow Mobility service provider decommissioning procedures as applicable. -How to configure the following User Based Enforcement (UBE) controls (users must configure the control) and other controls on the iOS device: **Remove Family Sharing **Disable Shared Location **Disable Wi-Fi Assist **Use AirPrint only with AO-approved printers and print servers (see the Multifunction Device STIG for requirements) **Turn off “Apps” under “AUTOMATIC DOWNLOADS” in the “iTunes & App Store” section of the Settings app on the Apple iOS device **Secure use of Calendar Alarm **Do not configure a DoD network (work) VPN profile on any third-party unmanaged VPN app **iOS device radios should be disabled using controls under "Settings" instead of "Control Center" -AO guidance on acceptable use and restrictions, if any, on downloading and installing personal apps and data (music, photos, etc.)
Lavender hyperlinks in small type off to the right (of CSS
class id
, if you view the page source) point to
globally unique URIs for each document and item. Copy the
link location and paste anywhere you need to talk
unambiguously about these things.
You can obtain data about documents and items in other
formats. Simply provide an HTTP header Accept:
text/turtle
or
Accept: application/rdf+xml
.
Powered by sagemincer